Data Breaches in 2012

20 data breaches were reported in 2012. This historical archive captures the complete breach landscape for the year, including incidents that may have been disclosed months after they occurred.

Reviewing historical breach data helps identify long-term trends in cybercriminal tactics, measure the effectiveness of security investments over time, and provide context for current threat assessments. Many compliance frameworks require historical breach analysis for risk evaluation.

The 2012 data includes breaches across all industries and geographies. Filter by industry to see sector-specific incidents, by country for regional analysis, or by incident type to focus on specific attack methods. For the most recent activity, visit the latest breaches page.

Full year archive: Complete dataset for 2012. Data is final and includes late-reported incidents.
20
Breaches in 2012
~2
Per Month Average
Date Company Type Industry Country Severity Source
Dec 17, 2012 Heroes of Newerth unauthorized access - - 8/10 View
Nov 5, 2012 BookCrossing unauthorized access - - 8/10 View
Nov 1, 2012 Netlog unauthorized access - - 9/10 View
Aug 24, 2012 Lookbook unauthorized access - - 8/10 View
Aug 12, 2012 The Botting Network unauthorized access - - 6/10 View
Aug 1, 2012 Xiaomi unauthorized access - - 8/10 View
Jul 11, 2012 Yahoo web app exploit - - 7/10 View
Jul 4, 2012 War Inc. unauthorized access - - 8/10 View
Jul 1, 2012 Dropbox web app exploit - - 9/10 View
Jul 1, 2012 Disqus unauthorized access - - 9/10 View
Jun 11, 2012 League of Legends unauthorized access - - 7/10 View
May 21, 2012 WHMCS unauthorized access - - 7/10 View
May 5, 2012 LinkedIn unauthorized access - - 10/10 View
Mar 22, 2012 Last.fm unauthorized access - - 9/10 View
Mar 7, 2012 JobStreet unauthorized access - - 8/10 View
Mar 1, 2012 Gamigo unauthorized access - - 8/10 View
Feb 21, 2012 YouPorn unauthorized access - - 8/10 View
Jan 1, 2012 VK unauthorized access - - 9/10 View
Jan 1, 2012 Taobao unauthorized access - - 9/10 View
Jan 1, 2012 126 unauthorized access - - 8/10 View

Unlock Full Breach Intelligence

Get complete access to our breach database with advanced search, API integration, threat actor attribution, and real-time monitoring for your security operations.

Full historical archive API access Real-time alerts Threat actor data Export to CSV/JSON

Contact access@breachsignal.com for enterprise pricing.