Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Back to Threat Counter
74%

of breaches involve human error

Human Error
The Weakest Link

Firewalls can't stop a convincing email. Encryption won't help if someone hands over the password. Human psychology is the most exploited vulnerability in cybersecurity.

Attack Vectors

How humans are exploited

Phishing Attacks

36%

Deceptive emails that trick employees into revealing credentials or downloading malware. Attackers impersonate trusted sources like executives, IT support, or vendors.

CEO fraud emailsFake invoice attachmentsPassword reset scams

Weak Passwords

81%

Password123, company name + year, or reused credentials across systems. Weak passwords can be cracked in seconds, giving attackers full system access.

Password reuse across sitesSimple dictionary passwordsDefault credentials left unchanged

Social Engineering

98%

Manipulation tactics that exploit human psychology. Attackers build trust, create urgency, or impersonate authority figures to bypass security measures.

Pretexting calls to help deskTailgating into buildingsBaiting with infected USB drives

Insider Threats

34%

Employees, contractors, or partners with legitimate access who misuse it, whether maliciously or through negligence.

Disgruntled employee data theftAccidental data sharingShadow IT usage
Real Cases

Billion-dollar companies, simple mistakes

These weren't sophisticated zero-day exploits. They were phone calls and emails.

MGM Resorts

£79 million2023

A 10-minute phone call to the help desk. Attackers impersonated an employee using LinkedIn info to reset credentials.

Uber

57M users exposed2016

Social engineering attack on a contractor. The hacker simply asked for access and was given it.

Twitter

£200K+ in Bitcoin stolen2020

Spear phishing employees via phone, convincing them to hand over internal tool access.

You can't train away
human nature

Awareness training helps, but it cannot eliminate mistakes. The only way to fully protect data from human error is to remove human access by taking it offline.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy