Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

10 Data Security Stories to Know About (March 2026)

By Security Staff
Keyboard
Vikas Harijan via Unsplash
April 1, 2026

Data security stories in March saw cybercriminal hackings, data accessed under false pretenses, and legal data purchases that leave some concerned. Here, Security magazine reviews 10 events that made headlines last month in the data security and privacy world. 

1. Foster City Cyberattack

Foster City, California experienced a cyberattack on Mar. 19. This was reportedly a ransomware attack affecting almost all municipal services, and it caused city officials to declare a state of emergency. 

At this time, it is unknown if citizen data was impacted. Given the reports that this was a ransomware attack, it is possible that some data was compromised. 

Learn more about the Foster City cyberattack. 

2. FBI Purchases Data, Confirmed 

During a Senate hearing on Mar. 18, FBI Director Kash Patel revealed has been buying data to track a person’s movement and location history. Patel stated that this purchased data falls in line with Electronic Communications Privacy Act and is commercially available. While some support the FBI’s purchase of data, others express concern about data protection and privacy. 

Learn more about the FBI’s data purchasing. 

3. Former Trump Official Investigated for Potential Leak 

Joe Kent, the former top counter-terrorism official for President Trump, is being investigated for potential leaks of classified information. According to an individual close to the situation, this investigation predates Kent’s departure. 

Learn more about the investigation into Kent. 

4. Verizon Retail Customer Breach

Russell Cellular, a Verizon Authorized Retailer, had a customer database allegedly uploaded to a hacker's forum. The database contains records of more than 6.3 million customers and contains personal data such as names, email addresses, phone numbers and more. 

Learn more about the Russell Cellular breach. 

5. GuardDog Telehealth Accessing Records Under False Pretenses 

GuardDog Telehealth requested patient healthcare data and claimed to utilize it for treatment purposes, but in reality, the organization was selling the information. Sometimes, this data was sold to attorneys seeking clients with specific injuries. 

Learn more about the GuardDog Telehealth situation. 

6. Targeted Activity Against Salesforce

After the breach in October 2025, Salesforce issued a warning on Mar. 7 about a rise in threat actor activity against misconfigured, publicly accessible sites. This activity opened up a broader question: why are platform ecosystems — like Salesforce — so often targeted? 

Learn more about the threats against Salesforce and other platform ecosystems. 

7. Intuitive Data Breach 

Biotech company Intuitive was breached due to a targeted phishing attack. By compromising an employee’s access to the business administration internal network, a malicious actor was able to access: 

  • Customer contact information
  • Customer business data 
  • Intuitive corporate and employee data 

Learn more about the Intuitive breach. 

8. 3.7 Million Records Exposed 

Three publicly exposed databases leaked 3.7 million records. Exposed information includes: 

  • Transcriptions of phone calls
  • Audio recordings 
  • Transcriptions of chat logs

At this time, it is unknown how long the data was exposed for or if a malicious actor accessed it prior to discovery. 

Learn more about the exposure. 

9. University of Hawaii Breach 

The University of Hawaiʻi Cancer Center’s Epidemiology Division faced a data breach after files related to epidemiology studies and recruitment initiatives were exfiltrated. Information impacted may include: 

  • Social Security numbers (SSNs)
  • Voter registration records (for City and County of Honolulu) 
  • Driver’s license numbers

Learn more about the university breach. 

10. Crunchyroll Breach 

100GB of user data was extracted from streaming service Crunchyroll. This data may include:

  • IP addresses 
  • Email addresses 
  • Customer analytics data 
  • Credit card details 

Learn more about the Crunchyroll breach. 

KEYWORDS: data breach data breaches data privacy data protection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Half open laptop

    4 Data Security Incidents to Know About (February 2026)

    See More
  • Laptop with coding on ground

    7 Data Breaches, Exposures to Know About (January 2026)

    See More
  • cloud-cyber

    What Every Small Business Owner Should Know About Data Backup and Recovery

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing