What is a data breach ,You might have expected the cybersecurity landscape to calm down after a turbulent 2025. However, January clearly had other plans.
According to the latest findings from the Identity Theft Resource Center (ITRC), 2025 set a new record for the sheer volume of data breaches. Yet, here is an interesting twist: while the number of breaches rose, the actual number of victim notices dropped by nearly 80%. What does this tell us? It suggests that cybercriminals are shifting tactics. Furthermore, they are moving away from the “spray and pray” mega-breaches of the past. Instead, they are launching highly precise, targeted attacks on valuable data sources.
Whether this surgical approach becomes the norm for 2026 remains to be seen. Nevertheless, with the first month of the year already in the books, we are looking back at seven significant data incidents that dominated the headlines in January.

1. Target: The Source Code Heist
On January 13, the retail giant Target found itself in a precarious position. Unlike typical breaches that aim for customer credit card numbers, this incident struck at the company’s operational heart. Specifically, employees confirmed that thieves stole approximately 860 GB of internal code and developer documentation.
Reports indicate that the attackers dumped the repositories on Gitea, an open-source coding platform. While customer data appears safe for now, the theft of source code poses a more dangerous long-term threat. Consequently, it gives bad actors a blueprint of the retailer’s digital infrastructure, which potentially reveals vulnerabilities they could exploit later.
2. BreachForums: The Hackers Get Hacked
Ironically, platforms dedicated to leaking data sometimes leak data themselves. On January 9, BreachForums—a notorious hotspot for trading stolen information—suffered a breach.
The incident exposed the metadata of roughly 324,000 users. In fact, the leak included usernames, email addresses, IP addresses, and registration dates. For the cybercriminals frequenting the site, this exposure strips away their anonymity. As a result, law enforcement may now possess a treasure trove of leads.
3. ICE: A Double Whammy
U.S. Immigration and Customs Enforcement (ICE) endured a particularly rough month. First, the agency experienced a massive data leak after someone publicly uploaded an online database containing sensitive details on 2,000 agents and 150 supervisors. Reports suggest this might represent the largest exposure of department staff in history.
To make matters worse, the story didn’t end with the leak. On January 13, a separate cyberattack hit the very database that exposed these agents, effectively compounding the security failure.
4. Monroe University: The Delayed Notification
Timing is everything in data breach response, and Monroe University currently faces heat for its timeline. Although administrators finally sent mail notices to victims on January 2, 2026, the breach actually occurred back in December 2024.
The university realized that hackers compromised the files in September 2025 but took months to notify the 320,000 affected individuals. The exposed data is highly sensitive, covering driver’s license numbers, medical insurance data, and Social Security numbers. Attorneys have since filed a class-action lawsuit, alleging negligence in how the university handled the delay.
5. DHS: A Tale of Two Incidents
State-level Departments of Human Services (DHS) suffered two hits in January. These involved two distinct incidents at different state departments. Officials attributed one to accidental data leakage—a reminder that human error remains a top threat—while an unauthorized user maliciously conducted the other.
Combined, these incidents impacted nearly 1 million individuals. Unfortunately, this exposes vulnerable populations to potential fraud.
6. Under Armour: Old Breach, New Leak
Under Armour’s security headaches resurfaced on January 21, 2026. Even though the retailer experienced a security incident in November 2025, hackers just released a massive dataset from that event on a forum.
The leak exposed 72 million email addresses, along with names, purchase histories, and birth dates. Security experts warn that the email addresses themselves aren’t the only problem; rather, the concern is how criminals might target Under Armour customers next. Phishing campaigns often follow these dumps because scammers use the leaked purchase history to create convincing, fraudulent emails.
7. The 96GB Mystery Database
In a massive discovery, cybersecurity researcher Jeremiah Fowler stumbled upon an exposed database containing 149 million credentials. The dataset, totaling 96 GB, included emails, usernames, and passwords collected from people all over the world.
What made this discovery particularly chilling was the inclusion of URL links alongside the credentials, leading directly to the login sites for the stolen data. In some cases, this included banking and financial logins. The owner of the database remains a mystery, which raises the question: who was hoarding this massive collection of digital keys?
Also Read : Donald Trump Launches $499 ‘Made in USA’ Phone
