Breach language Incident / compromise CVEs, KEV, elevated notes Not flagged
| 1Password | Incident signal |
I did not find credible public signals in the Jan. 21–May 21, 2026 window of a 1Password data breach, ransomware event, platform compromise, or CISA KEV-type product exploitation. The official 1Password Status page showed all systems operational at review time; recent entries I saw were scheduled Events API/reporting maintenance and a May 16 SaaS Manager performance degradation, not a security incident or data-loss notice. 1Password’s security page continues to describe its dual-key/end-to-end security model, SOC 2 posture, audits, and bug bounty program, but it did not surface an incident notice in the target window. General web/news searches mostly returned product/security announcements such as 1Password Unified Access for AI agent security, not breach reporting. |
|
|---|---|---|---|
| Cursor | Breach signal |
Within the roughly Jan. 21–May 21, 2026 window, I found credible vulnerability signals but no confirmed public breach of Cursor customer data. Cursor published a Feb. 13, 2026 GitHub advisory for CVE-2026-26268 / GHSA-8pcm-8jpx-hv8r, a high-severity sandbox-escape/RCE path via Git hooks, fixed in Cursor 2.5. Separately, LayerX published an Apr. 28, 2026 report called CursorJacking alleging that malicious Cursor extensions could read locally stored API keys/session tokens and that the issue was not fixed as of publication; treat this as a credible third-party vulnerability report rather than a confirmed breach. Cursor’s own security page was updated Apr. 24, 2026 and says critical incidents are communicated to affected users, but I did not find a public Cursor breach notice in this window. |
|
| Gat+ | Breach signal |
I did not find credible public signals in the Jan. 21–May 21, 2026 window of a Gat+ / GAT Labs breach, ransomware incident, widespread security compromise, or CISA KEV-relevant exploited product vulnerability. The official GAT Labs status page showed all systems operational and listed no incidents on recent checked dates, while the vendor’s Security Policy Statement describes SOC 2 Type II status, Google Workspace metadata handling, HTTPS transport, and encryption controls. The main GAT Labs product page and search results during the window were security-marketing/product content rather than incident disclosures. No reputable breach tracker/news source I found tied Gat+ to a current-window data leak or customer-data exposure. |
|
| GitHub, Inc. | Incident signal |
GitHub has a current-window confirmed security incident: on May 20, 2026, GitHub said it was investigating unauthorized access to GitHub-owned/internal repositories after a compromised employee device involving a poisoned third-party VS Code extension; GitHub said attacker claims of about 3,800 internal repositories were directionally consistent, but that it had no evidence of impact to customer enterprises, organizations, or repositories outside GitHub-internal repos. GitHub also said it rotated critical secrets and was continuing log analysis and monitoring. A second relevant signal is GitHub’s Apr. 28, 2026 post on CVE-2026-3854, a critical git-push RCE vulnerability, where GitHub reported rapid remediation on GitHub.com/GitHub Enterprise Cloud and said its investigation found no exploitation and no customer data accessed, modified, or exfiltrated. The GitHub Status page showed multiple operational incidents in May, but the relevant confirmed security signal is the May 20 repository-access investigation rather than ordinary availability degradation. |
|
| Jetbrains | Breach signal |
I found a current-window JetBrains security advisory, but not a confirmed breach of JetBrains customer data. JetBrains disclosed a high-severity TeamCity On-Premises issue, CVE-2026-44413, affecting TeamCity On-Premises versions through 2025.11.4; JetBrains said the issue could let an authenticated user expose some parts of the TeamCity server API to unauthorized users, was reported privately on Apr. 30, 2026, and was fixed in TeamCity 2026.1 with a security patch plugin available for older versions. JetBrains stated TeamCity Cloud was not affected and that Cloud environments were verified as not impacted. I did not find a CISA KEV/public active-exploitation advisory or credible breach report tied to this 2026 issue during the review window; however, internet-facing TeamCity On-Prem customers should treat the vendor advisory as a relevant patch-priority signal. |
|
Breach signal |
I did not find a confirmed LinkedIn data breach or ransomware incident in the Jan. 20–May 20, 2026 window, but I did find a notable security/privacy controversy: on Apr. 3, 2026, BleepingComputer reported that it independently observed LinkedIn JavaScript checking for 6,236 Chromium extensions and collecting device/browser telemetry, while LinkedIn said the detection is used to protect the platform, users, privacy, data, and site stability and denied inferring sensitive information: BleepingComputer report. Because this is disputed and framed as extension detection/fingerprinting rather than unauthorized access to LinkedIn-hosted data, I would treat it as a privacy/security posture signal rather than a confirmed breach. LinkedIn’s own public status page showed “All Systems Operational” and no recent incidents in the visible May 2026 history: LinkedIn status. I also checked the CISA KEV catalog and did not find a LinkedIn product KEV signal in scope. |
||
| SimpliContract | Breach signal |
I did not find credible public reporting, vendor disclosures, breach-notification items, ransomware/leak-site coverage, or CISA KEV entries tying SimpliContract to a security incident in the Jan. 20–May 20, 2026 window. I checked the vendor’s public site and platform pages, which describe the product as an AI contract intelligence/CLM platform and advertise “Enterprise-Grade Security and Privacy” with ISO 27001 and SOC 2 Type 2 badges, but I did not find a recent incident notice or status/security advisory there: SimpliContract homepage and SimpliContract platform/security section. I also checked the CISA Known Exploited Vulnerabilities catalog and found no SimpliContract-specific KEV signal in scope. |
|
| Fathom | No strong signal |
I did not find a credible, on-topic public breach, leak, ransomware, auth-bypass, or security-related regulatory action involving Fathom’s AI notetaker platform in the Jan. 20–May 20, 2026 window. Fathom’s own materials state it is SOC 2 Type II audited/HIPAA compliant and describe encryption, monitoring, third-party security testing, and customer-data handling: Fathom overview/security claims and Fathom security FAQ. Its official status page showed “All Systems Operational” with recent uptime history rather than a security incident notice: Fathom status. I also checked the CISA KEV catalog and did not find a Fathom-specific exploited-vulnerability signal. |
|
| Granola | Breach signal |
I found a credible security/privacy signal in scope, but not a confirmed ransomware-style breach: on Apr. 2, 2026, The Verge reported that Granola notes were viewable to “anyone with the link” by default and that AI training was enabled by default for non-enterprise users, with Granola providing a statement that links are unlisted and full transcripts are not accessible unless explicitly shared: The Verge report. Granola’s own security page says notes are “private by default,” says users control who sees notes, and says enterprise users have model training off by default; those claims are worth validating against current tenant settings and contract terms: Granola security page. I did not treat Granola’s older 2025 AssemblyAI API-key exposure as current risk because the vendor’s post-mortem says it was fixed in 2025 and I did not find a new Jan. 20–May 20, 2026 development tying it to active exploitation: Granola AssemblyAI post-mortem. I also checked the CISA KEV catalog and found no Granola-specific KEV item. |
|
| Spokenly | Incident signal |
I did not find credible public reporting of a breach, leak, ransomware event, major compromise, or security-related regulatory action involving Spokenly in the Jan. 20–May 20, 2026 window. The vendor’s product page describes Spokenly as an AI dictation app for Mac, iPhone, and Windows with local Whisper/Parakeet offline transcription and a local-only mode that blocks network requests: Spokenly product page. Its privacy policy says local-model audio/transcriptions stay on-device, while cloud models send audio to Spokenly’s backend and third-party transcription providers without permanent server copies, which is a data-flow item to review but not itself an incident: Spokenly privacy policy. I also checked the CISA KEV catalog and did not find a Spokenly-specific exploited-vulnerability signal. |
|
| CodeRabbit | Incident signal |
I did not find a credible public signal from roughly Jan. 19–May 19, 2026 showing a CodeRabbit data breach, leak, ransomware event, widespread compromise, or CISA KEV-relevant product exploitation. Public monitoring did show reliability incidents, such as an April 15, 2026 login/reviews outage and several short April app/review outages, but the pages characterize these as availability incidents rather than security events: IsDown CodeRabbit incident and StatusGator CodeRabbit status. I also checked CodeRabbit’s own recent security-related content; its April post discusses the Vercel breach as a supply-chain lesson, not a CodeRabbit compromise: CodeRabbit Vercel breach blog. Older 2025 reporting about a CodeRabbit RCE was outside the requested window and I did not treat it as current risk absent a new 2026 development. |
|
| Digicert | No strong signal |
DigiCert had credible, on-topic certificate-authority security/compliance signals in the window. In an April 2026 Mozilla Bugzilla incident report, DigiCert said a threat actor sent a malicious ZIP/.scr through support chat, compromised a support analyst endpoint, accessed an internal support portal function, obtained initialization codes for approved EV code-signing orders, and DigiCert revoked 60 code-signing certificates, 27 explicitly linked to the actor: Mozilla Bug 2033170. DigiCert’s own May 4 blog separately stated a Microsoft Defender detection was a false positive and said the April code-signing misissuance had no evidence of broader impact to customer certificates, accounts, data, or DigiCert systems: DigiCert blog. A second February 2026 CA-compliance incident involved CAA processing during an MPIC service disruption, leading DigiCert to identify and revoke 41,105 affected DV/OV/EV TLS certificates and implement fail-closed CAA validation: Mozilla Bug 2017185. DigiCert also published CT-logging enforcement changes for June 2026, but that appears to be ecosystem compliance hardening rather than a breach: DigiCert CT logging alert. |
|
| Google Suite | Breach signal |
For Google Suite / Google Workspace, I found a credible security-adjacent authentication outage but not a confirmed Google breach of Workspace customer data in the window. Google’s official Workspace status dashboard JSON shows an April 10, 2026 Admin Console service disruption where Workspace users using Google IdP could not sign in with security keys and hardware-based passkeys; Google said the issue was resolved after suspected changes were rolled back: Google Workspace status JSON and the Workspace Status Dashboard. A separate April 2026 Vercel incident is relevant to Workspace tenant risk but is not a Google breach: TechCrunch reported that attackers used a Context AI OAuth connection to take over a Vercel employee’s Google-hosted corporate account and access Vercel internal systems, while Tom’s Hardware similarly described broad OAuth permissions in Vercel’s enterprise Google Workspace as part of the attack chain: TechCrunch and Tom’s Hardware. Google’s Workspace Updates blog in the same period emphasized audit-log and developer-security enhancements, which are hardening updates rather than incident disclosures: Google Workspace Updates. |
|
| HISAC | Breach signal |
I did not find a credible public signal from roughly Jan. 19–May 19, 2026 indicating HISAC itself suffered a breach, leak, ransomware event, platform compromise, or regulatory security action. The recent public material I found is Health-ISAC threat-intelligence and sector guidance, not an incident notice about HISAC: its Jan. 26, 2026 release says the organization published a health-sector threat landscape report covering ransomware, third-party compromise, phishing, and zero-days: Health-ISAC press release. The underlying report highlights healthcare-sector risks such as third-party breaches and ransomware trends, but it does not disclose a compromise of HISAC’s own systems: 2026 Health Sector Cyber Threat Landscape PDF. I also checked the Health-ISAC homepage, which showed current advisory/media content such as Stryker attack discussion and AI supply-chain transparency guidance, again not a HISAC breach notice: Health-ISAC homepage. |
|
| Hubspot | Breach signal |
I did not find a credible current public signal from roughly Jan. 19–May 19, 2026 showing a new Hubspot data breach, leak, ransomware incident, or CISA KEV-relevant product exploitation. HubSpot’s official Feb. 25, 2026 incident report describes a permissions-configuration rollout that locked users out of certain workflow UI views for about 37 minutes; HubSpot says backend automations continued and no customer data was lost, so I would treat it as a reliability/access-control incident rather than a breach: HubSpot Feb. 25 incident report. HubSpot’s status page showed recent May 2026 availability incidents, including a May 12 database impairment and a May 7 AWS-related degradation, but they were not clearly security-related: HubSpot status. I also checked HubSpot’s March 2026 transparency report; it is about legal requests for customer data, not a security incident: HubSpot transparency report. Search results surfaced claims that resembled HubSpot’s March 2022 crypto-customer incident, but that event is outside the requested window and was omitted as stale absent a new 2026 development. |
|
| Atlassian | No strong signal |
I found no credible public signal from roughly Jan. 18–May 18, 2026 indicating a new Atlassian data breach, ransomware event, or customer-data leak; recent Atlassian status/outage items I found appear operational rather than security-related. The main relevant signal is patch-management risk for self-managed Atlassian products: Atlassian’s Apr. 21, 2026 Security Bulletin fixed 31 high-severity vulnerabilities and 7 critical-severity third-party dependency vulnerabilities across Data Center/Server products, including Confluence and Jira-related dependency issues. Canada’s Cyber Centre also reposted the Apr. 21 advisory as an Atlassian security advisory affecting multiple products (AV26-375). Atlassian’s broader Security Advisories & Bulletins page shows monthly 2026 bulletins, but I did not find a new CISA KEV addition or active-exploitation advisory for Atlassian in this four-month window; older Atlassian KEV items should not be treated as current risk absent new exploitation evidence. |
|
| Datadog | Incident signal |
I found no credible, on-topic public signal from roughly Jan. 18–May 18, 2026 indicating a Datadog data breach, ransomware event, hosted customer-data leak, or security-related regulatory action. Datadog’s US1 status page lists recent operational incidents such as delayed metrics, monitor notifications, and upstream-provider-related processing delays, but those entries do not describe a security compromise. Datadog’s public Security documentation describes its security products and data-handling features, not a current breach. Public searches and CISA/KEV-oriented checks did not surface a recent credible Datadog platform exploitation or breach signal in the requested window. |
|
| Google Chrome Extensions | Issues / advisories |
I found multiple credible recent signals indicating elevated extension-ecosystem risk, though they are not a single Google corporate data breach. On Feb. 12, 2026, LayerX reported the “AiFrame” campaign: over 30 fake AI-assistant Chrome extensions affecting more than 260,000 users, using shared code/infrastructure and remote iframes to access sensitive browser capabilities (LayerX report, Tom’s Guide coverage). On Apr. 14–15, 2026, Socket-linked reporting described 108 malicious Chrome Web Store extensions stealing Google/Telegram data and routing to common C2 infrastructure, with about 20,000 installs (Cybernews, Infosecurity Magazine, Bitdefender). Separately, Unit 42 disclosed CVE-2026-0628, a high-severity Chrome/Gemini Live panel issue where malicious extensions could hijack privileged access paths; coverage notes Google patches were published (Unit 42, Malwarebytes). |
|
| SmartSheet | Incident signal |
I found no credible, on-topic public signal from roughly Jan. 18–May 18, 2026 indicating a Smartsheet data breach, customer-data leak, ransomware event, or security-related regulatory action. Smartsheet’s public status page showed availability incidents in the window, such as an Apr. 22 Workspace panel issue and Apr. 17 Resource Management loading issue, but the descriptions are operational and do not indicate compromise or data exposure. I also checked Smartsheet’s published Security Practices and its March 2026 Security Capabilities, Practices, and Safeguards, which describe breach notification and controls but do not disclose a current incident. I did not find a relevant recent CISA KEV/advisory signal tied to Smartsheet as a shipped product vendor. |
|
| ZoomInfo | Incident signal |
I found no credible, on-topic public signal from roughly Jan. 18–May 18, 2026 indicating a ZoomInfo breach, hosted customer-data leak, ransomware event, or security-related regulatory action. ZoomInfo’s public status page showed the platform as operational with scheduled maintenance and routine status entries, not a security event. I also checked recent company/security-related public materials, including ZoomInfo’s 2026 SEC-filed 2025 Annual Report, which contains generic cybersecurity risk language rather than disclosure of a current incident. Public searches for ZoomInfo breach/security-incident reporting in the window did not surface a credible confirmed incident. |
|
| Amazon Web Services, Inc. | Breach signal |
In the last ~4 months, I found security-relevant AWS signals, but not a confirmed breach of AWS’s own infrastructure. AWS published a May 2026 bulletin for CVE-2026-31431, a Linux kernel local-privilege-escalation issue affecting Amazon Linux, Bottlerocket, ECS/EKS-related images, EMR, Fargate, and some SageMaker/DLAMI contexts; CISA added that CVE to KEV on May 1, 2026, and NVD also marks it as in the CISA KEV catalog. AWS’s April security roundup listed multiple AWS product/software bulletins, including ECS Agent, WorkSpaces Skylight Agent, Firecracker, EFS CSI Driver, and AWS Encryption SDK issues, indicating patch-management attention rather than a known AWS platform breach (AWS April 2026 security roundup). At the edge of the review window, AWS also addressed the CodeBuild “CodeBreach” research in an AWS security bulletin, saying project-specific AWS-managed GitHub repository misconfigurations were remediated, no inappropriate code was introduced, and no AWS customer environments/services were impacted; Wiz’s write-up provides the researcher perspective (Wiz CodeBreach report). Separately, the European Commission disclosed a March 2026 cyberattack on cloud infrastructure for Europa.eu, and reporting tied it to a compromised AWS account/API key, but available reporting and AWS statements characterize it as a customer-environment/credential compromise rather than an AWS infrastructure breach (European Commission press release, TechCrunch follow-up). |
|
| Conga | Incident signal |
I did not find credible public reporting in the last ~4 months of a Conga data breach, ransomware event, platform-wide compromise, or CISA KEV item specifically tied to Conga products. The Conga status page showed routine product incidents/maintenance and, around May 2026, items such as Conga Contracts/Sign issues and maintenance; those entries did not indicate unauthorized access, data exposure, or a security incident. One May 9 maintenance entry referenced “essential security updates,” but it was framed as scheduled maintenance rather than an incident. I also checked the CISA Known Exploited Vulnerabilities catalog and did not find an on-topic Conga vendor/product KEV signal in the reviewed window. |
|
| OpenAI/ChatGPT | Breach signal |
In the last ~4 months, OpenAI disclosed two software-supply-chain security events but stated it found no evidence that ChatGPT/OpenAI user data, production systems, intellectual property, or shipped software were compromised. On May 13, 2026, OpenAI said the TanStack npm / “Mini Shai-Hulud” attack affected two employee devices, with limited credential material exfiltrated from internal source repositories; OpenAI is rotating signing certificates and requiring macOS app updates by June 12, 2026. On April 10, 2026, OpenAI separately disclosed an Axios developer-tool compromise involving a macOS app-signing workflow, again saying it saw no evidence of user-data access or software alteration and requiring macOS app updates by May 8, 2026. I did not find a credible public report in this window of a confirmed ChatGPT customer-data breach; OpenAI’s current security page and security news index show security posture updates and the above disclosures rather than a customer-data compromise. |
|
| TrustCloud Corporation | Issues / advisories |
I did not find credible public reporting in the last ~4 months of a TrustCloud Corporation breach, ransomware event, customer-data leak, or exploited product vulnerability. The official TrustCloud status page listed all systems operational and 100% uptime over the past 90 days for TrustCloud, TrustOps, TrustShare, TrustRegister, and TrustLens, with no recent incidents shown in the visible incident history. General searches turned up TrustCloud product/security-assurance marketing pages rather than incident disclosures, and no on-topic TrustCloud entry surfaced in the CISA Known Exploited Vulnerabilities catalog. Based on public sources checked, there is no credible current security-risk signal to report for this period. |
|
| Rotation.App | Issues / advisories |
I did not find credible public reporting in the last ~4 months of a Rotation.App breach, ransomware event, customer-data leak, or active exploitation of its Slack app. The public Rotation.App site and its Terms of Service describe a Slack on-call scheduling app and customer-data safeguards, while the Privacy Policy says Rotation.App will comply with applicable data-breach notification laws; these are policy statements, not incident notices. The Slack Marketplace listing lists a security contact/vulnerability disclosure program, but I found no recent advisory or breach disclosure tied to it. I also checked the CISA Known Exploited Vulnerabilities catalog and did not find an on-topic Rotation.App KEV signal. |
|
| Auth0 | Issues / advisories |
I found no credible public signal in the Jan. 16–May 16, 2026 window of an Auth0 data breach, ransomware event, customer-data leak, or CISA KEV-listed Auth0 product vulnerability. I checked Auth0’s official status page, which showed all regions operational as of May 16, 2026, and its incident history; third-party status aggregators recorded several Auth0 availability incidents in March–May 2026, including elevated errors across public-cloud regions, but I did not find evidence those were security-related rather than operational outages (Auth0 status, Auth0 incident history, IsDown Auth0 outage history). I also checked Auth0’s public guidance on monitoring service status, which did not disclose a security event (Auth0 status documentation). I did not find a current Auth0-specific product entry in the CISA Known Exploited Vulnerabilities catalog. |
|
| Bamboo Health, Inc | Breach signal |
I found no credible public signal in the Jan. 16–May 16, 2026 window of a Bamboo Health, Inc data breach, ransomware event, customer-data leak, regulatory action, or security-related outage. I checked Bamboo Health’s public privacy/security FAQ, which describes breach-management procedures, HIPAA compliance, annual third-party assessments/penetration tests, and security review materials, but it does not announce a recent breach (Bamboo Health Privacy and Security FAQs). I also checked the HHS OCR breach portal for healthcare breach reporting context and did not find a Bamboo Health item in the surfaced results (HHS OCR breach portal); searches instead surfaced unrelated 2026 healthcare/vendor incidents involving other companies. A recent UpGuard profile exists, but it is an external attack-surface/security-rating page rather than a confirmed breach report (UpGuard Bamboo Health profile). I did not find a Bamboo Health-specific entry in the CISA KEV catalog. |
|
| Okta Inc. | Incident signal |
I found a credible, current security signal involving Okta’s platform ecosystem, but not evidence that Okta Inc. itself was breached in the last four months. On Jan. 22, 2026, Okta Threat Intelligence published an advisory/blog on custom vishing-oriented phishing kits that target Okta, Google, Microsoft, and crypto accounts, can intercept credentials/MFA, and can defeat non-phishing-resistant MFA (Okta threat-intelligence blog). BleepingComputer reported the same day that these attacks were being used to steal Okta SSO credentials for data theft/extortion, and Mandiant reporting described ShinyHunters-style activity abusing Okta/Microsoft/Google SSO dashboards as launchpads into SaaS apps (BleepingComputer Jan. 22 report, BleepingComputer/Mandiant Jan. 31 report). Okta’s public status page showed service incidents in the period, but I did not see a status item indicating an Okta-side security compromise (Okta status). I also did not find a current Okta-specific product entry in the CISA KEV catalog. |
|
| WebFlow | Issues / advisories |
I found no credible public signal in the Jan. 16–May 16, 2026 window of a Webflow data breach, ransomware event, customer-data leak, or CISA KEV-listed Webflow product vulnerability. The main relevant item was Webflow’s April 14, 2026 outage: Webflow’s CTO said a CMS database cluster failure caused downtime affecting hosted sites, Dashboard, Canvas, forms, and APIs, but explicitly stated it was “not caused by a security vulnerability” or malicious attack, and that service was restored with no CMS data loss (Webflow incident report, Webflow status page). I also checked Webflow’s current status/history and its April 2026 DNS/Cloudflare migration guidance, which describes security/reliability improvements and DDoS mitigation rather than an incident (Webflow Cloudflare migration help article). I did not find a Webflow entry or current relevant advisory in the CISA Known Exploited Vulnerabilities catalog. |
|
| V0 | Incident signal |
I found no separate public breach notice specifically naming V0/v0 customer data in the Jan. 16–May 16, 2026 window, but V0 is closely tied to Vercel, and Vercel disclosed a material April 2026 security incident that should be treated as relevant vendor-risk context. Vercel’s official bulletin, last updated April 24, 2026, says attackers gained unauthorized access to certain internal Vercel systems through a compromised Context.ai OAuth app used by a Vercel employee, and that a limited subset of customers had non-sensitive environment variables compromised; Vercel advised affected customers to rotate credentials (Vercel April 2026 security bulletin). Vercel’s Trust Center also references the same incident and says Vercel was engaging impacted customers directly; the same Trust Center describes Vercel as the team behind v0 and lists new subprocessors being added to support the v0 product (Vercel Trust Center). v0’s own security documentation says v0 is included in Vercel’s SOC 2 Type 2 attestation and directs vulnerability reports to Vercel security, reinforcing that Vercel’s security posture is relevant to V0 monitoring (v0 security docs). I did not find a V0-specific CISA KEV entry in the CISA KEV catalog. |
|
| HITRUST Services Corp | Breach signal |
For the Jan. 15-May 15, 2026 window, I did not find credible public reporting that HITRUST Services Corp itself suffered a breach, ransomware incident, customer-data leak, security-related outage, or regulatory action. Recent HITRUST publications in the window are industry/security-assurance materials rather than incident disclosures, including the April 7, 2026 2026 HITRUST Trust Report announcement, the report page, and the April 30, 2026 Q1 2026 Cyber Threat Adaptive analysis announcement. I also checked the CISA KEV catalog and Privacy Rights Clearinghouse Data Breach Chronology and found no credible recent vendor-specific breach signal. |
|
| Insperity | No strong signal |
For the Jan. 15-May 15, 2026 window, I did not find a credible public report of a new Insperity data breach, ransomware event, customer-data leak, or security-related enforcement action. Insperity’s Feb. 10, 2026 SEC 10-K includes a current cybersecurity section describing board/management oversight, incident-response processes, vendor-risk processes, and states that prior cybersecurity incidents have not had a material adverse effect; see the SEC filing’s Item 1C Cybersecurity section. I also reviewed Insperity’s official Security and privacy and Security Statement pages, plus the CISA KEV catalog and Privacy Rights Clearinghouse Data Breach Chronology, and found no on-topic recent incident signal. |
|
| Loom | Breach signal |
For the Jan. 15-May 15, 2026 window, I did not find a credible public report of a Loom-specific data breach, ransomware/extortion incident, customer-data leak, or security-related regulatory action. I checked Atlassian/Loom official sources: the Loom status page shows a May 8, 2026 multi-Atlassian-service incident attributed to a public-cloud infrastructure outage and resolved, not a security event; Atlassian’s security advisories page lists 2026 security bulletins primarily for Atlassian Data Center products, not a Loom breach; and Atlassian’s security practices page includes Loom among cloud services covered by Atlassian security controls. I also checked the CISA KEV catalog and Privacy Rights Clearinghouse Data Breach Chronology and found no on-topic recent Loom incident signal. |
|
| ZipCodeApi.com | No strong signal |
For the Jan. 15-May 15, 2026 window, I did not find credible public reports of a ZipCodeApi.com data breach, ransomware/extortion claim, security-related outage, regulatory action, or active exploitation tied to its platform. I checked general web/news results plus the official ZipCodeAPI homepage, privacy policy, and customer contract/security language. I also checked the CISA KEV catalog and a public breach-tracking source, the Privacy Rights Clearinghouse Data Breach Chronology, and found no on-topic vendor signal in this recent window. |
|
| SpockOffice | Breach signal |
For the Jan. 15-May 15, 2026 window, I did not find credible public reports of a SpockOffice breach, leak, ransomware incident, platform compromise, or security-related regulatory action. I checked official SpockOffice materials including its features/security page, privacy policy, and data processing agreement, which identify data processed for the Slack leave-management service but do not disclose a recent incident. I also checked the CISA KEV catalog and the Privacy Rights Clearinghouse Data Breach Chronology and found no credible vendor-specific signal in the recent window. |
|
| Anthropic | Breach signal |
In the Jan. 15-May 15, 2026 window, Anthropic had multiple credible public security signals, though not a confirmed customer-data breach. On March 31, reporting said a Claude Code npm release accidentally included a source map exposing internal Claude Code source; Anthropic's statement to VentureBeat said no sensitive customer data or credentials were exposed and called it a release-packaging error, not a breach (VentureBeat). On April 21-22, TechCrunch reported Anthropic was investigating alleged unauthorized access to Claude Mythos Preview through a third-party vendor environment, with Anthropic saying it had no evidence its own systems were impacted (TechCrunch). Separately, OX Security disclosed a systemic Model Context Protocol issue that it attributed to MCP's architecture and Anthropic-maintained SDK design, creating downstream RCE-style risk across MCP implementations (OX Security, Tom's Hardware). |
|
| JetBrains | Breach signal |
JetBrains had credible TeamCity security signals in the window, but I did not find a confirmed JetBrains customer-data breach. On May 11, 2026, JetBrains disclosed CVE-2026-44413, a high-severity post-authentication TeamCity On-Premises vulnerability that could let authenticated users expose parts of the TeamCity server API to unauthorized users; JetBrains said TeamCity Cloud was not affected and urged on-prem users to update to 2026.1 (JetBrains TeamCity blog). In addition, the older TeamCity CVE-2024-27199 became newly relevant because CISA added it to KEV on April 20, 2026, with a May 4, 2026 remediation due date, indicating active exploitation within the review window (NVD/CISA KEV entry). This is a vendor-product exposure risk for self-hosted TeamCity environments rather than an incident affecting JetBrains' own cloud service based on the sources checked. |
|
| Looker | Breach signal |
Looker had a credible vulnerability signal in the window: Tenable disclosed LeakyLooker on March 10, 2026, a set of nine cross-tenant Google Looker Studio vulnerabilities that could have allowed attackers to exfiltrate, insert, or delete data in victims' connected Google Cloud services (Tenable). Google's Cloud security bulletin says Looker Studio fixed vulnerabilities reported via the Google/Alphabet VRP and found no evidence of exploitation, with no customer action required; the same bulletin page also notes separate Looker fixes for Looker-hosted and self-hosted customers (Google Cloud security bulletins). This appears to be a serious product vulnerability disclosure/remediation event, not a confirmed breach of Looker-hosted customer data. I did not find a CISA KEV entry for these Looker/Looker Studio issues in the sources checked. |
|
| Renovate Bot | No strong signal |
I did not find a credible public report in the Jan. 15-May 15, 2026 window of a Renovate Bot breach, hosted-customer data leak, ransomware event, or CISA KEV entry specifically for Renovate Bot. I checked Renovate's own security/permissions documentation, which describes disclosure and self-hosting security considerations rather than a recent incident (Renovate Docs). I also reviewed the Renovate GitHub release stream, which showed frequent signed releases in May 2026 but no on-page security incident notice in the material checked (GitHub releases). Some broader 2026 npm/supply-chain discussions mention Renovate as an automation tool that could propagate dependency updates, but I did not treat those third-party package incidents as Renovate Bot vendor incidents absent evidence Renovate itself was compromised. |
|
| SonarCloud | Incident signal |
I did not find a credible public report in the Jan. 15-May 15, 2026 window of a SonarCloud breach, customer-data leak, ransomware event, or CISA KEV-listed SonarCloud vulnerability. Sonar's official trust center explains that SonarQube Cloud receives recent scan source code but says it does not store all repository source code, only source code from the most recent scans; it also points customers to the SonarQube Cloud status page for incidents (Sonar Trust Center). The SonarQube/SonarCloud status page material checked showed no incidents reported for the visible recent dates (SonarQube Status). Search results in the period were mainly product-security feature announcements, not vendor compromise signals. |
|
| KnowBe4 | Breach signal |
I found no credible public report in the Jan. 14–May 14, 2026 window of a KnowBe4 customer-data breach, ransomware incident, widespread compromise, or CISA KEV-listed exploited vulnerability affecting KnowBe4 products. KnowBe4’s official status page did show service-access and functionality incidents in May 2026, including KnowBe4 Academy access issues and Secure Workspace upload issues, but these were availability/functionality items and not described as security compromises or data exposures (KnowBe4 status). KnowBe4’s public security statement describes SOC 2 coverage and security/compliance artifacts, but it does not disclose a current breach in the period reviewed (KnowBe4 security statement). Searches of major security/news sources and the CISA KEV catalog did not surface an on-topic KnowBe4 incident in the roughly four-month window. |
|
| Lucidchart | Incident signal |
I found no credible public signal in the Jan. 14–May 14, 2026 window of a Lucidchart/Lucid Software data breach, ransomware event, widespread compromise, or security-related regulatory action. Searches of public news/security sources and the CISA KEV catalog did not surface Lucidchart-specific exploited-vulnerability or breach items in scope. I checked Lucid’s public security materials, which describe its security program, encryption, compliance posture, and vulnerability reporting path, but they do not disclose a current incident (Lucid security page). I also checked Lucid’s official status/history area for service incidents, and did not find a clearly security-related event in the retrieved public status content (Lucid status history). |
|
| Salesforce | No strong signal |
Within the Jan. 14–May 14, 2026 window, I found credible, on-topic security signals for Salesforce Experience Cloud customer environments. Salesforce published a March 7, 2026 post, updated March 11, warning that a known threat actor was mass-scanning public Experience Cloud sites and using a modified Aura Inspector tool to extract data where guest-user profiles were overly permissive; Salesforce characterized this as a customer configuration issue, not an inherent platform vulnerability (Salesforce advisory). FINRA separately alerted member firms that ShinyHunters was actively exploiting misconfigured Salesforce Experience Cloud instances to access organizational data (FINRA cyber alert). Reputable security reporting also covered ShinyHunters claims of ongoing Salesforce Aura/Experience Cloud data theft campaigns and noted Salesforce’s position that the issue was misconfiguration rather than a platform flaw (BleepingComputer, ITPro). I did not find a CISA KEV entry tying this to a Salesforce CVE in the period; the public record points to SaaS configuration exposure rather than a patched exploited vulnerability. |
|
| Zendesk Inc. | Breach signal |
Within the Jan. 14–May 14, 2026 window, I found credible Zendesk-related security-abuse signals, though not a confirmed Zendesk platform breach. Zendesk’s own notice says bad actors were sending relay spam through Zendesk by creating fake tickets in customer instances that allowed unverified users; Zendesk said personal information was not accessed or exposed through Zendesk and advised customers to change settings to reduce abuse (Zendesk spam notice). BleepingComputer reported the same January 2026 global spam wave and said Zendesk introduced new safety features to detect and stop this type of spam (BleepingComputer). Separately, ManoMano confirmed a January 2026 third-party customer-service provider incident affecting customer data, and reporting said unconfirmed information pointed to a compromised Zendesk environment/account at a subcontractor; this is relevant third-party SaaS risk, but the public reporting does not establish a Zendesk core-platform breach (BleepingComputer ManoMano report). Zendesk also posted a January 28, 2026 outage affecting Analytics, Chat, Admin Center, and related functions due to an internal access-service update mistake; it was an availability/access incident, not reported as a data compromise (Zendesk incident report). |
|
| Coderpad.io | Breach signal |
I found no confirmed, credible public report in the Jan. 14–May 14, 2026 window of a CoderPad platform breach, ransomware incident, customer-data leak, or CISA KEV item affecting CoderPad-shipped software. CoderPad’s official status page was operational when checked and showed recent daily entries with no reported incidents in the visible May 2026 history (CoderPad status). CoderPad’s official security page describes SOC 2 Type 2, annual penetration testing, vulnerability scanning, bug bounty, encryption, SSO, and internal MFA controls, but does not disclose a current incident (CoderPad security); its vulnerability disclosure policy was updated in March 2026, which appears to be program documentation rather than an incident notice (Vulnerability disclosure policy). One automated vendor-risk page dated April 2026 reported infostealer malware associated with the organization, but it did not establish a confirmed CoderPad breach or customer-data compromise, so I would treat it as a low-confidence monitoring lead rather than an incident finding (UpGuard CoderPad profile). |
|
| Amplitude | Breach signal |
No credible reports of an Amplitude (the product analytics vendor) breach, ransomware event, or actively exploited platform vulnerability surfaced in roughly the previous four months. UpGuard's continuously updated vendor profile, refreshed in April 2026, does not list any new disclosed breach for Amplitude (UpGuard – Amplitude security report). Amplitude's own Trust, Security and Privacy hub and security FAQ describe ongoing SOC 2 Type 2 / ISO 27001 / ISO 27018 attestations but do not announce a new advisory in this window. Older, still-active items remain non-security in nature (the 2024–2025 privacy class-action over embedded SDK data collection in apps like DoorDash, now headed to arbitration), and we did not find a fresh 2026 development on that thread that would constitute a security incident. Net: no actionable third-party security signal against Amplitude in the last ~4 months. |
|
| Sigma | Incident signal |
No new credible security incident involving Sigma Computing surfaced in roughly the December 2025 – April 2026 window. Sigma was one of hundreds of organizations swept up in the August 2025 Salesloft Drift OAuth token supply-chain compromise (threat actor UNC6395), but that event predates the 4-month window; follow-on analysis has continued into 2026 without new material impact to Sigma's own platform, per their statements. Sigma's Trust Center and status history show no newly disclosed security events in this window. For context on the Drift campaign that did touch them, see UpGuard's Drift breach recap and CyberScoop's root-cause coverage. |
|
| Warp.dev | Incident signal |
No credible, on-topic security breach, CVE, or incident attributable to Warp.dev (the agentic terminal) was found in the roughly December 2025 – April 2026 window. Warp's public status page showed no reported incidents in recent weeks leading up to the review date, and Warp's security documentation and enterprise security overview remained the primary references, with no new advisories. Older community debate from 2024–2025 about telemetry and an LLM-consent issue exists but is outside the 4-month window and has no newly disclosed follow-up. Net: no credible new signals. |
|
| CultureAmp | Issues / advisories |
No credible breach, ransomware, regulatory action, or security-related major outage involving Culture Amp surfaced in the ~4-month window (late Dec 2025 – Apr 2026). Culture Amp proactively posted on their Security Trust Centre that their infrastructure is not impacted by the widely-exploited CVE-2025-55182 "React2Shell" RCE in React Server Components (disclosed Dec 3, 2025 and under active exploitation per AWS/Microsoft threat intel), and they similarly noted no Ivanti exposure. Third-party risk sources including UpGuard's Culture Amp security rating and Nudge Security's profile show no new incidents in the window. No CISA advisories or CVEs were identified referencing Culture Amp's platform directly in this period. |
|
| Mosaic | Incident signal |
No credible breach, ransomware, or security-related regulatory action tied to Mosaic (the strategic-finance / FP&A SaaS, mosaic.tech / mosaic.pe) surfaced in the ~4-month window (late Dec 2025 – Apr 2026). Mosaic's Trust Center at trust.mosaic.pe and its security overview page continue to list SOC 2 Type II and ISO 27001 posture, and vendor references note a recent Zaviant web-app pen test with zero findings. Note that search results surface a separate, name-collision incident — the Mosaic Life Care healthcare breach tied to the Oracle Health/Cerner third-party compromise — but that unauthorized-access event dates to Jan–Apr 2025 and was disclosed in June 2025, which is outside this window and is an unrelated entity. No CISA KEV entries, CVEs, or new advisories reference the SaaS vendor Mosaic in this window. |
|
| Metaplane Inc. | No strong signal |
No credible public security incidents, breaches, or regulatory actions involving Metaplane were found in roughly the previous 4 months. Metaplane continues to operate as Metaplane by Datadog following Datadog's April 2025 acquisition, and its security documentation reiterates SOC 2 Type II, GDPR/CCPA/HIPAA alignment, and a metadata-only access posture (no PII ingested). Datadog's own 2026 news cycle was dominated by its State of DevSecOps report rather than any self-disclosed incident. I also checked the Metaplane homepage and general breach trackers and found nothing on-topic in the window. Residual risk to monitor: because Metaplane's control plane is now folded into Datadog infrastructure, any future Datadog-level incident would likely affect Metaplane tenants as well. |
|
| Mozilla Firefox Extensions | No strong signal |
In December 2025, Koi Security disclosed the GhostPoster campaign — 17 malicious Firefox add-ons with over 50,000 cumulative downloads that used steganography to hide JavaScript payloads inside the extensions' PNG icons, enabling affiliate-link hijacking, tracking injection, and ad/click fraud (The Hacker News, Dec 2025, Koi Security write-up). A follow-up investigation in late December attributed GhostPoster to a broader Chinese-linked threat cluster called DarkSpectre, whose cross-browser extension campaigns (ShadyPanda, GhostPoster, Zoom Stealer) collectively reached roughly 8.8M users across Chrome, Edge, and Firefox over ~7 years (The Hacker News DarkSpectre coverage, Malwarebytes, Jan 2026). Mozilla removed and blocklisted the identified add-ons (disabling them in installed Firefox profiles), and Mozilla's security advisories page continued routine Firefox CVE publishing through the window (e.g., MFSA 2026-06). Takeaway for vendor risk: the AMO store's review pipeline was bypassed for months via image-embedded code, so any internal reliance on Firefox extensions should include a review of whether any flagged IDs were installed. |
|
| Rocketreach | No strong signal |
No credible RocketReach-specific breach, leak, or regulatory action was reported in the last ~4 months. UpGuard's vendor risk report for RocketReach shows no recent security news items, and RocketReach did not appear in mainstream 2026 breach roundups such as Security Magazine's January 2026 list, Security Boulevard's February 2026 roundup, or Security Magazine's March 2026 list. The standing risk profile is privacy/compliance rather than breach: RocketReach aggregates scraped contact data from public web sources, and prior class-action allegations around unlawful use of personal information (Top Class Actions summary) remain the more relevant diligence angle. No CISA KEV entries reference RocketReach products. |
|
| ScormHero | No strong signal |
No credible public security signals were found for ScormHero in roughly the previous 4 months — no breach disclosures, CVE/KEV entries, or reputable news coverage tied to this vendor specifically turned up in news or breach-tracker searches. ScormHero is a small SaaS that converts PowerPoint/PDF/video into SCORM packages and has a minimal public footprint; its own site (scormhero.com) does not appear to publish a formal trust/security page or status page, which itself is a diligence gap worth flagging. For context, the only recent SCORM-ecosystem security research in the window applies to the unrelated Rustici Software / SCORM Cloud product line (Tenable TRA-2022-21 on Rustici) rather than to ScormHero. Recommend requesting a SOC 2 or equivalent attestation from ScormHero directly, since automated monitoring has little to reference. |
|
| Fillout | No strong signal |
No confirmed data breaches, cybersecurity incidents, or regulatory actions were identified for Fillout in the December 2025 – April 2026 window. Their security page lists SOC 2 Type 2 certification, TLS encryption in transit and at rest, AWS/Render.com hosting with US and EU regions, and a bug bounty program — with no disclosed incidents. One user-reported concern surfaced in approximately March 2026 on Trustpilot and Airtable Community forums: Fillout's "Update" form feature, when integrated with Airtable or Notion, reportedly allows authenticated users to view records they should not access by manipulating record IDs in the URL, potentially exposing PII; Fillout reportedly responded that this is intentional by design and advised against using the feature with sensitive data. No CVE was issued for this design-level authorization concern. Searches of major breach trackers including Breachsense, Tech.co, and the CISA KEV catalog returned no results for Fillout. |
|
| Aikido | Incident signal |
No live web searches could be performed (all web-access tools were permission-blocked), and the requested window (Dec 2025–Apr 2026) falls mostly after the training-data cutoff (May 2025). The most notable Aikido-related event near the window boundary was in April 2025, when Aikido Security's malware-detection system publicly identified a supply-chain compromise of the official |
|
| Calamari.io | Breach signal |
No live web searches could be performed (all web-access tools were permission-blocked), and the requested window (Dec 2025–Apr 2026) falls after the training-data cutoff (May 2025). As of mid-2025, no publicly reported data breaches, CVEs, or security incidents involving Calamari.io (the Polish HR/leave-management and time-tracking SaaS platform) were found in available training data. Calamari is a niche, smaller vendor with limited security-news footprint, so the absence of reported incidents is not strong evidence of no incidents — it more likely reflects limited coverage. The company advertises GDPR compliance and hosts on AWS. Verify current status at Calamari.io's security page and check general breach trackers such as Have I Been Pwned. Because live searches could not be completed, incidents between December 2025 and April 2026 may have been missed entirely. |
|
| Pave.com | No strong signal |
No credible public security signals — including confirmed data breaches, ransomware incidents, authentication bypasses, regulatory actions, or CISA KEV entries — were identified for Pave.com in the December 2025 through April 2026 review window. Web search tools were unavailable during this research session, so live verification against news outlets, breach trackers, and government advisories could not be completed. Pave.com is a relatively small compensation-benchmarking SaaS vendor and does not appear in historical CISA KEV entries or major breach databases. Their security page and trust center should be checked directly for any recent disclosures or advisories covering this period. |
|
| Jellyfish | No strong signal |
No confirmed data breaches, cybersecurity incidents, or regulatory actions involving Jellyfish (the engineering management platform at jellyfish.co) were identified in public reporting through early 2025. Jellyfish advertises SOC 2 Type II compliance and standard enterprise security controls (encryption in transit/at rest, SSO/SAML). The company does not appear in the CISA Known Exploited Vulnerabilities catalog, and no CVEs have been publicly assigned to the Jellyfish platform. Note: live web searches for the period mid-2025 through April 2026 could not be completed due to tool-access restrictions in this session; manual verification of the Jellyfish trust/security page and breach-tracker sites is recommended to confirm continued clean status. |
|
| Snowflake | No strong signal |
Snowflake experienced a significant security event in mid-2024 when threat actor UNC5537 used credentials stolen via infostealer malware to access approximately 165 customer Snowflake environments that lacked MFA, leading to high-profile data thefts at AT&T (~110 million records), Ticketmaster/Live Nation, Santander Bank, and others, as detailed in Mandiant's UNC5537 analysis. Snowflake emphasized its own infrastructure was not compromised and responded by rolling out mandatory MFA enforcement and enhanced authentication policies. Canadian authorities arrested suspect Alexander Moucka in late 2024, and U.S. DOJ brought related charges. Multiple class-action lawsuits were filed, and affected companies made SEC cyber-incident disclosures. No new Snowflake platform breach was reported through early 2025, and Snowflake does not appear in the CISA KEV catalog. Live searches for mid-2025 through April 2026 could not be completed; checking the Snowflake Trust Center and BleepingComputer Snowflake coverage is advised for the latest status. |
|
| JetBrains AI | Issues / advisories |
No confirmed data breach involving JetBrains AI Assistant specifically was found, but several related security signals warrant attention. JetBrains continues to disclose high-volume security vulnerabilities across its product line via its security bulletin page, including multiple high-severity TeamCity CVEs in 2025. The CISA KEV catalog contains two JetBrains entries from the critical March 2024 TeamCity authentication bypass chain (CVE-2024-27198 and CVE-2024-27199), which were actively exploited by APT29/Midnight Blizzard; while these predate the 12-month window, TeamCity remains a high-value target for nation-state actors. Regarding AI-specific risks, the JetBrains AI Assistant routes code context and prompts to cloud-hosted LLMs (including third-party providers), and JetBrains' AI terms of service state data is not used for model training — though some organizations have restricted the feature over code privacy concerns about sub-processor data handling. No new CISA KEV additions for JetBrains were confirmed in 2025, and no regulatory actions were identified. Note: live web search was unavailable — manual verification for late 2025 through April 2026 is recommended. |
|
| DocuSign | No strong signal |
No confirmed breach of DocuSign's own platform infrastructure was found in the review period, but DocuSign remains one of the most impersonated brands in phishing campaigns. The most significant recent development was documented by Wallarm security researchers in late 2024: threat actors began abusing legitimate DocuSign accounts and the DocuSign API to send convincing phishing invoices at scale, bypassing email security tools because the messages originated from real DocuSign infrastructure — a significant escalation beyond generic brand spoofing. DocuSign maintains a trust center with SOC 2 Type II and ISO 27001 certifications. No DocuSign-specific CVEs with widespread exploitation were identified, and DocuSign does not appear in the CISA KEV catalog. No regulatory enforcement actions against DocuSign related to data security were found. Note: live web search was unavailable during this check — manual verification of the DocuSign trust center and recent news for the most recent months is recommended. |
|
| Availity | No strong signal |
No research notes yet. |
|
| Definitive Healthcare LLC | No strong signal |
No research notes yet. |
|
| Dovetail | No strong signal |
No research notes yet. |
|
| Riverside.fm | No strong signal |
No research notes yet. |
|
| Boomband | No strong signal |
No research notes yet. |
|
| Ordway | No strong signal |
No research notes yet. |
|
| Beeceptor | No strong signal |
No research notes yet. |