Documents leaked from a passwordless backup drive exposed thousands of documents relating to the TSA's activities at Stewart, an international airport about 60 miles north of Manhattan. One of the documents revealed how the airport's security screeners failed to check names against the government's "no-fly" list.
As many as 14 million records of Verizon subscribers who called the phone giant's customer services this year were found on an unprotected Amazon S3 storage server controlled by a third-party firm working for Verizon.
Credit rating agency Equifax was hit by the mother of all hacks. As many as 143 million consumers -- mostly Americans, but some UK and Canadian residents -- were affected by a data breach involving highly sensitive and personal information. Not to be outdone, the company fumbled its incident response and remediation effort. Its support website looked like a phishing site, Its data breach checking tool didn't work, and the company was forced to pull a clause from its site that effectively prevented aggrieved customers from suing the company.
Bell Canada, Canada's largest teleco, was hacked in May. The company declined to pay the hacker to stop the release of the 1.9 million customer records stolen. A portion of the data was later leaked online.
Thousands had a 50-50 chance of being infected with a remote access trojan in early May after HandBrake, the video encoder for Macs, was infected with malware. The malware could steal passwords from their Mac's keychain.
A historical hack from 2015 finally came to light in February, after a hacker targeted PoliceOne, a law enforcement forum used by police and federal agents. As many as 715,000 accounts were stolen, including those from the the FBI and DHS. The stolen passwords were easy to decipher.
Thought to the be the biggest ransomware attack of its kind, the WannaCry ransomware was only successful thanks to the NSA losing control of its key hacking tools. That led the hackers to install backdoors that channeled the ransomware on millions of computers. Days later, Congress introduced a bill that would prevent the government from stockpiling cyberweapons.
US-based private security firm TigerSwan made headlines after resumes of prospective employees were found on a public, unlisted Amazon Web Services storage server. The exposed documents list a range of personal information, including an applicant's home address, phone numbers, email addresses, driver's license and passport numbers, and social security numbers.
Only after a management shakeup, Uber revealed a data breach from over a year earlier, affecting 57 million users. The company's security chief is said to have covered up the breach, and was later fired from the company.
Cellebrite, the world's most notorious iPhone and device cracker, was hacked in January, leading to the theft of hundreds of gigabytes of sensitive corporate files. Vice's Motherboard, which obtained some of the data, the stolen data includes a list of who bought the company's phone cracking technology, databases, and a vast amount of technical data regarding Cellebrite's products.
Sabre systems, a reservation software company, quietly revealed that it had been attacked earlier this year. The company's software is used by hundreds of airlines and thousands of hotels to manage passenger and guest reservations, revenue management, and human resources. Several major companies -- including Google, Hard Rock Hotels, Loews, and some Trump properties -- have revealed that they had data stolen as a result of the Sabre breach.
Personal information, including geolocation, on more than 31 million users of a virtual keyboard, ai.type, leaked earlier this year when the company failed to put a password on its database server, anyone to access the company's database of user records, totaling more than 577 gigabytes of sensitive data.
An unsecured backup drive exposed thousands of US Air Force documents. The discovery was found in March. The files included the completed SF-86 applications for renewed national security clearances for two US four-star generals, both of whom recently had top US military and NATO positions.
The hacker "gained access to... login information and passwords" that employees use to access Virgin America's corporate network, according to a letter sent to staff. The company confirmed that 3,120 employees and contractors had their login information compromised, while 110 additional employees may have had personal information stolen.
Tax and auditing giant Deloitte has confirmed it was hit by a cyberattack, resulting in the theft of confidential documents and emails. It's said that an attacker gained access to the email server's administrator account, giving the attacker unfettered access to the company's Microsoft-hosted email mailboxes.
Font-sharing site DaFont was breached by a bored hacker in May. Usernames, email addresses, and hashed passwords of 699,000 user accounts were stolen in the breach. The passwords were so bad that more than 98 percent of the passwords were cracked.
More than 60 universities and US federal government organizations were compromised with SQL injections. The hacker, known as Rasputin, attacked Oxford, Cambridge, and New York University, as well as the US National Oceanic and Atmospheric Administration.
It was the biggest hack that wasn't, but many were affected nonetheless. Hackers had collected hundreds of different previously breached databases and matched up records it thought were also iCloud accounts, and threatened to wipe millions of accounts if Apple didn't pay up. In the end, the hacker group failed to carry out its threat.
In April, every outdoor emergency siren in Dallas, Texas was set off at the same time, sending some into a panic. It turns out hackers carried out a "radio replay" attack, which involves recording the radio signal that was broadcast during the latest monthly test of the emergency siren system and playing it back repeatedly.
Password manager and single sign-on provider OneLogin was hacked in late May by an unknown attacker. The company added that although it encrypts "certain sensitive data at rest," it could not rule out the possibility that the hacker "also obtained the ability to decrypt data."