<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel xmlns:atom="http://www.w3.org/2005/Atom">
    <title>Have I Been Pwned latest breaches</title>
    <link>https://haveibeenpwned.com/</link>
    <description>The latest publicly leaked data breaches to hit Have I Been Pwned</description>
    <atom:link href="https://haveibeenpwned.com/feed/breaches/" rel="self" type="application/rss+xml" />
    <item>
      <guid isPermaLink="false">Crunchyroll</guid>
      <link>https://haveibeenpwned.com/Breach/Crunchyroll</link>
      <title>Crunchyroll - 1,195,684 breached accounts</title>
      <description>In March 2026, the anime streaming service &lt;a href="https://www.bleepingcomputer.com/news/security/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/" target="_blank" rel="noopener"&gt;Crunchyroll suffered a data breach alleged to have impacted 6.8M users&lt;/a&gt;. The exposed data is reported to have originated from the company's Zendesk support system where "name, login name, email address, IP address, general geographic location and the contents of the support tickets" were exposed. &lt;a href="https://x.com/IntCyberDigest/status/2040197865369125022" target="_blank" rel="noopener"&gt;A subset of 1.2M email addresses from an alleged 2M record dataset being sold was later provided to HIBP.&lt;/a&gt;</description>
      <pubDate>Sat, 04 Apr 2026 04:47:29 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">SongTrivia2</guid>
      <link>https://haveibeenpwned.com/Breach/SongTrivia2</link>
      <title>SongTrivia2 - 291,739 breached accounts</title>
      <description>In April 2026, the music trivia platform &lt;a href="https://x.com/DarkWebInformer/status/2039804363225391147" target="_blank" rel="noopener"&gt;SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum&lt;/a&gt;. The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt password hashes. The data also included names, usernames and avatars.</description>
      <pubDate>Sat, 04 Apr 2026 01:59:01 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">SUCCESS</guid>
      <link>https://haveibeenpwned.com/Breach/SUCCESS</link>
      <title>SUCCESS - 253,510 breached accounts</title>
      <description>In March 2026, the personal development and achievement media brand &lt;a href="https://x.com/DarkWebInformer/status/2039094399594897818" target="_blank" rel="noopener"&gt;SUCCESS suffered a data breach&lt;/a&gt;. The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders containing physical addresses and the payment method used. In &lt;a href="https://www.success.com/inside-success/security-update" target="_blank" rel="noopener"&gt;SUCCESS' disclosure notice&lt;/a&gt;, they advised their system had also been abused to send offensive newsletters with quotes falsely attributed to contributors.</description>
      <pubDate>Wed, 01 Apr 2026 06:51:14 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">CutiesAI</guid>
      <link>https://haveibeenpwned.com/Breach/CutiesAI</link>
      <title>Cuties AI - 144,250 breached accounts</title>
      <description>In March 2026, the NSFW AI companion platform &lt;a href="https://x.com/DarkWebInformer/status/2036476854958178811" target="_blank" rel="noopener"&gt;Cuties AI suffered a data breach that was subsequently published to a public hacking forum&lt;/a&gt;. The incident exposed 144k unique email addresses along with display names, avatars, prompts and descriptions used to generate AI adult images, as well as URLs to the generated content. The data also included the account that created the content and a stated "preference" of either female or trans.</description>
      <pubDate>Tue, 31 Mar 2026 06:52:52 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">BreachForumsV5</guid>
      <link>https://haveibeenpwned.com/Breach/BreachForumsV5</link>
      <title>BreachForums Version 5 - 339,778 breached accounts</title>
      <description>In March 2026, &lt;a href="https://x.com/DarkWebInformer/status/2037305685965148419" target="_blank" rel="noopener"&gt;a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed&lt;/a&gt;. The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.</description>
      <pubDate>Fri, 27 Mar 2026 02:19:23 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">ScufGaming</guid>
      <link>https://haveibeenpwned.com/Breach/ScufGaming</link>
      <title>Scuf Gaming - 128,683 breached accounts</title>
      <description>In June 2015, custom gaming controller maker &lt;a href="https://www.malwarebytes.com/blog/news/2015/06/up-down-left-right-hack" target="_blank" rel="noopener"&gt;Scuf Gaming suffered a data breach&lt;/a&gt;. The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.</description>
      <pubDate>Thu, 26 Mar 2026 05:31:26 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">SoundRadix</guid>
      <link>https://haveibeenpwned.com/Breach/SoundRadix</link>
      <title>Sound Radix - 292,993 breached accounts</title>
      <description>In March 2026, the audio production tools company &lt;a href="https://support.soundradix.com/support/solutions/articles/5000900043" target="_blank" rel="noopener"&gt;Sound Radix disclosed a data breach that they subsequently self-submitted to HIBP&lt;/a&gt;. The incident impacted 293k unique email addresses and names. Sound Radix advised that it is possible that additional data including hashed passwords may have been exposed, and that no financial or credit card information was impacted.</description>
      <pubDate>Thu, 26 Mar 2026 00:06:29 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">RSBoards</guid>
      <link>https://haveibeenpwned.com/Breach/RSBoards</link>
      <title>RuneScape Boards - 222,762 breached accounts</title>
      <description>In around 2011, the now defunct RuneScape Boards forum (also known as RSBoards) suffered a data breach &lt;a href="https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/" target="_blank" rel="noopener"&gt;that was later redistributed as part of a larger corpus of data&lt;/a&gt;. The vBulletin-based service exposed 223k unique email addresses along with usernames, IP addresses and salted MD5 password hashes.</description>
      <pubDate>Mon, 23 Mar 2026 21:40:06 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Aura</guid>
      <link>https://haveibeenpwned.com/Breach/Aura</link>
      <title>Aura - 903,080 breached accounts</title>
      <description>In March 2026, &lt;a href="https://www.aura.com/press/release/statement-on-exposure-of-customer-information" target="_blank" rel="noopener"&gt;the online safety service Aura disclosed a data breach that exposed 900k unique email addresses&lt;/a&gt;. The data was primarily associated with a marketing tool from a previously acquired company, with fewer than 20k active Aura customers affected. Exposed data included names, phone numbers, physical and IP addresses, and customer service notes. Aura advised that no Social Security numbers, passwords or financial information were compromised.</description>
      <pubDate>Wed, 18 Mar 2026 05:29:58 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">DivineSkins</guid>
      <link>https://haveibeenpwned.com/Breach/DivineSkins</link>
      <title>Divine Skins - 105,814 breached accounts</title>
      <description>In March 2026, &lt;a href="https://discord.com/channels/1272878928368762996/1272879634488496138/1482141964559319210" target="_blank" rel="noopener"&gt;the League of Legends custom skins service Divine Skins suffered a data breach&lt;/a&gt;. The incident was disclosed via the service's Discord server, where Divine Skins stated that an unauthorised third party accessed part of its systems, deleted all skins from the database and exposed email addresses and usernames. The data also contained a history of purchases made by users.</description>
      <pubDate>Sun, 15 Mar 2026 05:18:40 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Baydoner</guid>
      <link>https://haveibeenpwned.com/Breach/Baydoner</link>
      <title>Baydöner - 1,266,822 breached accounts</title>
      <description>In March 2026, &lt;a href="https://dailydarkweb.net/baydoner-data-breach-exposes-3-7-million-customer-records/" target="_blank" rel="noopener"&gt;the Turkish restaurant chain Baydöner suffered a data breach which was subsequently published to a public hacking forum&lt;/a&gt;. The incident exposed over 1.2M unique email addresses along with names, phone numbers, cities of residence and plaintext passwords. A small number of records also included Turkish national ID number and date of birth. In &lt;a href="https://www.baydoner.com/duyurular" target="_blank" rel="noopener"&gt;their disclosure notice&lt;/a&gt;, Baydöner stated that payment and financial data was not affected.</description>
      <pubDate>Sun, 15 Mar 2026 03:36:43 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Provecho</guid>
      <link>https://haveibeenpwned.com/Breach/Provecho</link>
      <title>Provecho - 712,904 breached accounts</title>
      <description>In early 2026, data purportedly sourced from the recipe and meal planning service Provecho was alleged to have been obtained in a breach. The exposed data included 713k unique email address along with username and the creator account holders followed. Provecho has been notified and is aware of the claims surrounding the incident.</description>
      <pubDate>Tue, 03 Mar 2026 06:40:50 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Lovora</guid>
      <link>https://haveibeenpwned.com/Breach/Lovora</link>
      <title>Lovora - 495,556 breached accounts</title>
      <description>In February 2026, the couples and relationship app Lovora allegedly suffered a data breach that exposed 496k unique email addresses. The data also included users’ display names and profile photos, along with other personal information collected through use of the app. The app’s maker, Plantake, did not respond to multiple attempts to contact them about the incident.</description>
      <pubDate>Mon, 02 Mar 2026 07:23:06 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Quitbro</guid>
      <link>https://haveibeenpwned.com/Breach/Quitbro</link>
      <title>Quitbro - 22,874 breached accounts</title>
      <description>In February 2026, the porn addiction app Quitbro allegedly suffered a data breach that exposed 23k unique email addresses. The data also included users’ years of birth, responses to questions within the app and their last recorded relapse time. The app’s maker, Plantake, did not respond to multiple attempts to contact them about the incident.</description>
      <pubDate>Mon, 02 Mar 2026 05:27:11 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">KomikoAI</guid>
      <link>https://haveibeenpwned.com/Breach/KomikoAI</link>
      <title>KomikoAI - 1,060,191 breached accounts</title>
      <description>In February, the AI-powered comic generation platform &lt;a href="https://x.com/troyhunt/status/2028273847376765139" target="_blank" rel="noopener"&gt;KomikoAI suffered a data breach&lt;/a&gt;. The incident exposed 1M unique email addresses along with names, user posts and the AI prompts used to generate content. The exposed data enables the mapping of individual AI prompts to specific email addresses.</description>
      <pubDate>Mon, 02 Mar 2026 01:31:29 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Odido</guid>
      <link>https://haveibeenpwned.com/Breach/Odido</link>
      <title>Odido - 6,077,025 breached accounts</title>
      <description>In February 2026, Dutch telco &lt;a href="https://www.rtl.nl/nieuws/binnenland/artikel/5571885/odido-data-dark-web-oud-klanten-shinyhunters" target="_blank" rel="noopener"&gt;Odido was the victim of a data breach and subsequent extortion attempt&lt;/a&gt;. Shortly after, a total of 6M unique email addresses were published across four separate data releases over consecutive days. The exposed data includes names, physical addresses, phone numbers, bank account numbers, dates of birth, customer service notes and passport, driver’s licence and European national ID numbers. &lt;a href="https://www.odido.nl/veiligheid" target="_blank" rel="noopener"&gt;Odido has published a disclosure notice&lt;/a&gt; including an FAQ to support affected customers.</description>
      <pubDate>Thu, 26 Feb 2026 23:25:29 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">CanadianTire</guid>
      <link>https://haveibeenpwned.com/Breach/CanadianTire</link>
      <title>Canadian Tire - 38,306,562 breached accounts</title>
      <description>In October 2025, &lt;a href="https://www.montechnicien.com/en/canadian-tire-in-crisis-42-million-accounts-exposed/" target="_blank" rel="noopener"&gt;retailer Canadian Tire was the victim of a data breach&lt;/a&gt; that exposed almost 42M records. The data contained 38M unique email addresses along with names, phone numbers and physical addresses. Passwords were stored as PBKDF2 hashes and for a subset of records, dates of birth and partial credit card data were also included (card type, expiry and masked card number). In &lt;a href="https://corp.canadiantire.ca/English/Cyber-Incident/default.aspx" target="_blank" rel="noopener"&gt;its disclosure notice&lt;/a&gt;, Canadian Tire advised that the incident did not impact bank account information or loyalty program data.</description>
      <pubDate>Wed, 25 Feb 2026 06:53:25 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">CarGurus</guid>
      <link>https://haveibeenpwned.com/Breach/CarGurus</link>
      <title>CarGurus - 12,461,887 breached accounts</title>
      <description>In February 2026, &lt;a href="https://www.theregister.com/2026/02/18/shinyhunters_cargurus_breach/" target="_blank" rel="noopener"&gt;the automotive marketplace CarGurus was the target of a data breach attributed to the threat actor ShinyHunters&lt;/a&gt;. Following an attempted extortion, the data was published publicly and contained more than 12M email addresses across multiple files including user account ID mappings, finance pre-qualification application data and dealer account and subscription information. Impacted data also included names, phone numbers, physical and IP addresses, and auto finance application outcomes.</description>
      <pubDate>Sun, 22 Feb 2026 04:43:54 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">CarMax</guid>
      <link>https://haveibeenpwned.com/Breach/CarMax</link>
      <title>CarMax - 431,371 breached accounts</title>
      <description>In January 2026, &lt;a href="https://undercodenews.com/massive-carmax-data-breach-sparks-alarm-across-us-500000-records-stolen-by-shinyhunters/" target="_blank" rel="noopener"&gt;data allegedly sourced from US automotive retailer CarMax was published online following a failed extortion attempt&lt;/a&gt;. The data included 431k unique email addresses along with names, phone numbers and physical addresses.</description>
      <pubDate>Fri, 20 Feb 2026 03:48:30 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Figure</guid>
      <link>https://haveibeenpwned.com/Breach/Figure</link>
      <title>Figure - 967,178 breached accounts</title>
      <description>In February 2026, &lt;a href="https://techcrunch.com/2026/02/13/fintech-lending-giant-figure-confirms-data-breach/" target="_blank" rel="noopener"&gt;data obtained from the fintech lending platform Figure was publicly posted online&lt;/a&gt;. The exposed data, dating back to January 2026, contained over 900k unique email addresses along with names, phone numbers, physical addresses and dates of birth. Figure confirmed the incident and attributed it to a social engineering attack in which an employee was tricked into providing access.</description>
      <pubDate>Wed, 18 Feb 2026 01:11:11 Z</pubDate>
    </item>
  </channel>
</rss>