Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

10 Data Security Stories to Know About (March 2026)

By Security Staff
Keyboard
Vikas Harijan via Unsplash
April 1, 2026

Data security stories in March saw cybercriminal hackings, data accessed under false pretenses, and legal data purchases that leave some concerned. Here, Security magazine reviews 10 events that made headlines last month in the data security and privacy world. 

1. Foster City Cyberattack

Foster City, California experienced a cyberattack on Mar. 19. This was reportedly a ransomware attack affecting almost all municipal services, and it caused city officials to declare a state of emergency. 

At this time, it is unknown if citizen data was impacted. Given the reports that this was a ransomware attack, it is possible that some data was compromised. 

Learn more about the Foster City cyberattack. 

2. FBI Purchases Data, Confirmed 

During a Senate hearing on Mar. 18, FBI Director Kash Patel revealed has been buying data to track a person’s movement and location history. Patel stated that this purchased data falls in line with Electronic Communications Privacy Act and is commercially available. While some support the FBI’s purchase of data, others express concern about data protection and privacy. 

Learn more about the FBI’s data purchasing. 

3. Former Trump Official Investigated for Potential Leak 

Joe Kent, the former top counter-terrorism official for President Trump, is being investigated for potential leaks of classified information. According to an individual close to the situation, this investigation predates Kent’s departure. 

Learn more about the investigation into Kent. 

4. Verizon Retail Customer Breach

Russell Cellular, a Verizon Authorized Retailer, had a customer database allegedly uploaded to a hacker's forum. The database contains records of more than 6.3 million customers and contains personal data such as names, email addresses, phone numbers and more. 

Learn more about the Russell Cellular breach. 

5. GuardDog Telehealth Accessing Records Under False Pretenses 

GuardDog Telehealth requested patient healthcare data and claimed to utilize it for treatment purposes, but in reality, the organization was selling the information. Sometimes, this data was sold to attorneys seeking clients with specific injuries. 

Learn more about the GuardDog Telehealth situation. 

6. Targeted Activity Against Salesforce

After the breach in October 2025, Salesforce issued a warning on Mar. 7 about a rise in threat actor activity against misconfigured, publicly accessible sites. This activity opened up a broader question: why are platform ecosystems — like Salesforce — so often targeted? 

Learn more about the threats against Salesforce and other platform ecosystems. 

7. Intuitive Data Breach 

Biotech company Intuitive was breached due to a targeted phishing attack. By compromising an employee’s access to the business administration internal network, a malicious actor was able to access: 

  • Customer contact information
  • Customer business data 
  • Intuitive corporate and employee data 

Learn more about the Intuitive breach. 

8. 3.7 Million Records Exposed 

Three publicly exposed databases leaked 3.7 million records. Exposed information includes: 

  • Transcriptions of phone calls
  • Audio recordings 
  • Transcriptions of chat logs

At this time, it is unknown how long the data was exposed for or if a malicious actor accessed it prior to discovery. 

Learn more about the exposure. 

9. University of Hawaii Breach 

The University of Hawaiʻi Cancer Center’s Epidemiology Division faced a data breach after files related to epidemiology studies and recruitment initiatives were exfiltrated. Information impacted may include: 

  • Social Security numbers (SSNs)
  • Voter registration records (for City and County of Honolulu) 
  • Driver’s license numbers

Learn more about the university breach. 

10. Crunchyroll Breach 

100GB of user data was extracted from streaming service Crunchyroll. This data may include:

  • IP addresses 
  • Email addresses 
  • Customer analytics data 
  • Credit card details 

Learn more about the Crunchyroll breach. 

KEYWORDS: data breach data breaches data privacy data protection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Half open laptop

    4 Data Security Incidents to Know About (February 2026)

    See More
  • Laptop with coding on ground

    7 Data Breaches, Exposures to Know About (January 2026)

    See More
  • cloud-cyber

    What Every Small Business Owner Should Know About Data Backup and Recovery

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing