Technology

Major Data Breaches Expose Millions Across Multiple Sectors

A surge of cyberattacks in early 2026 has compromised sensitive information at Betterment, Line TV, Conduent, MedRevenu, and Flickr, highlighting vulnerabilities in technology, healthcare, and entertainment industries.

6 min read

It’s been a bruising start to 2026 for millions of people whose personal information was swept up in a wave of high-profile data breaches affecting companies across industries—from fintech and healthcare to entertainment and photography. As the dust settles, the scale and complexity of these incidents are coming into sharper focus, raising urgent questions about digital trust, corporate responsibility, and the evolving tactics of cybercriminals.

On January 9, 2026, Betterment, a major automated investment platform, fell victim to a sophisticated social engineering attack that compromised the personal details of roughly 1.4 million customers. According to Betterment’s official incident report, the breach didn’t stem from a technical flaw, but rather from attackers manipulating employees with convincing phishing lures. Gaining access to third-party platforms used for marketing and customer support, the hackers launched a fraudulent cryptocurrency campaign, urging users to transfer digital funds to wallets under their control.

Forensic experts from CrowdStrike, engaged by Betterment, confirmed that while passwords, account balances, and transactional data remained untouched, a trove of personally identifiable information (PII) was exfiltrated. The stolen data included full names, dates of birth, email addresses, phone numbers, physical addresses, employer names, job titles, device metadata, and geographic location information. The leaked dataset surfaced on Have I Been Pwned (HIBP) on February 5, 2026, sparking widespread concern about potential phishing, identity theft, and business email compromise risks.

Adding to the chaos, Betterment suffered a denial-of-service (DDoS) attack on January 13, suspected by investigators to be a diversionary tactic as the data exfiltration unfolded. In response, the company revoked all unauthorized session tokens, conducted advanced access management reviews, and brought in a third-party analytics firm to assess downstream privacy risks. As Betterment continues to work with federal authorities and cybersecurity experts, officials are urging affected users to verify account communications only through Betterment’s official domain and to enable multi-factor authentication. The company is also retraining employees on social engineering resistance and tightening the vetting of all third-party SaaS tools.

But Betterment’s woes are hardly unique. The entertainment sector was also rocked in late January when Choco Media Entertainment Co., a partner company of Line TV, a video streaming platform with over 6 million users, discovered unauthorized access to user data between January 24 and 26. The breach, which Choco Media says did not affect the separate Line messaging app or its related services, exposed user IDs, email addresses, phone numbers, hashed passwords, encrypted addresses, birthdays, nicknames, profile photos, and order records. Thankfully, no financial information such as bank account or credit card details was compromised.

After discovering the breach on January 26, Choco Media activated its highest-level emergency response, notified authorities, patched the vulnerability, and enlisted a professional cybersecurity firm to bolster data protection and assess additional risks. In a bid to restore goodwill, the company is offering free Line TV users who registered before February 6 a 14-day free access code, while VIP users receive two 30-day free access codes. “We have taken immediate steps to secure our systems and are committed to keeping our users informed,” the company stated, emphasizing its ongoing efforts to strengthen defenses.

Meanwhile, the scale of the Conduent breach—a saga that began more than a year ago—continues to expand. Conduent, a government technology giant whose services touch over 100 million Americans, suffered a ransomware attack in January 2025 that disrupted operations for days and resulted in the theft of over 8 terabytes of sensitive data. Initial reports suggested 4 million Texans were affected, but as TechCrunch later revealed, the number has ballooned to at least 15.4 million in Texas alone, with another 10.5 million in Oregon and hundreds of thousands more across Delaware, Massachusetts, New Hampshire, and beyond.

The stolen data includes names, Social Security numbers, medical records, and health insurance information—a veritable goldmine for identity thieves and fraudsters. The Safeway ransomware gang claimed responsibility, and Conduent has since been engaged in a protracted process of notifying affected individuals, with plans to complete notifications by early 2026. “We are conducting a detailed analysis of the affected files to identify the personal information taken in the breach,” said company spokesperson Sean Collins, though the company has released few specifics about the total scope or timeline.

Healthcare data was also at risk in a breach affecting MedRevenu, LLC, a billing services provider for hospitals and clinics. Around December 12, 2024, MedRevenu detected a network disruption that, upon investigation, revealed unauthorized access to files potentially exposing names, birth dates, Social Security numbers, driver’s license and government ID numbers, health insurance and medical information, financial account and payment card numbers, and access credentials. Not every individual had all data types exposed, but the breadth of compromised information is alarming. Notification efforts concluded in October 2025, and attorneys are now investigating the potential for a class action lawsuit on behalf of affected patients. MedRevenu responded by securing its network and engaging cybersecurity experts, but the legal and reputational fallout is just beginning.

Even in the world of online photography, cracks in the digital armor have appeared. On February 5, 2026, Flickr—one of the globe’s largest photo-sharing communities—was alerted to a vulnerability in a third-party email service provider that may have exposed user real names, email addresses, IP addresses, and account activity. Flickr, which boasts 35 million monthly users and 800 million monthly page views, quickly shut down access to the affected system and began a thorough investigation. The company insists that passwords and payment card numbers were not compromised, but it has advised users to review their account settings for unexpected changes, remain vigilant against phishing emails, and update passwords if they reuse their Flickr credentials elsewhere.

“We sincerely apologize for this incident and for the concern it may cause,” Flickr wrote in emails to affected users. “We take the privacy and security of your data extremely seriously, and we are taking immediate action to prevent any similar issues by conducting a thorough investigation, strengthening our system architecture, & further enhancing our monitoring of third-party service providers.”

What unites these incidents is not just the diversity of targets—from fintech and entertainment to healthcare and photography—but the growing sophistication of attackers and the complex web of third-party services that underpin modern digital businesses. Whether it’s a phishing lure that tricks an employee, a ransomware gang exploiting a weak link in the supply chain, or a vulnerability in an external email provider, the consequences for individuals are all too real: exposure to fraud, identity theft, and a lingering sense of vulnerability in an increasingly connected world.

For consumers, the message is clear: stay vigilant, use strong and unique passwords, enable multi-factor authentication, and be wary of unsolicited communications—especially those that request sensitive information. For companies, the lesson is even starker: robust cybersecurity isn’t just about technology, but about people, processes, and the careful management of every link in the digital chain. The breaches of early 2026 have shown just how high the stakes have become.

Sources