{"id":32977,"date":"2023-01-12T15:33:20","date_gmt":"2023-01-12T15:33:20","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=32977"},"modified":"2026-03-18T05:05:23","modified_gmt":"2026-03-18T05:05:23","slug":"top-cybersecurity-and-email-security-breaches-of-2022","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/","title":{"rendered":"Top Cybersecurity and Email Security Breaches of 2022"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">2022 was a challenging year for cybersecurity and email security. More sophisticated attacks emerged, causing greater damage to organizations big and small. Cybersecurity threats have also become increasingly targeted.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Individuals, businesses, and governments continue to fall victim to malicious activities. Indeed, data breaches, <\/span><a href=\"https:\/\/easydmarc.com\/blog\/ransomware-attacks-a-complete-guide\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">ransomware attacks<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/easydmarc.com\/blog\/phishing-attacks-recognize-and-avoid-email-phishing\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">phishing scams<\/span><\/a><span style=\"font-weight: 400;\">, malware campaigns, and other such incidents are showing no signs of slowing down.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we explore the top cybersecurity and email security breaches of 2022. You\u2019ll also discover the impact of such cybersecurity incidents on businesses. Finally, you\u2019ll see how EasyDMARC can help!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But first, let\u2019s take a closer look at what cybersecurity and email security mean and the associated threats.<\/span><\/p>\n<h2><b>Cybersecurity and Email Security: Definition and Dangers<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cybersecurity broadly describes the measures taken to protect networks, computers, programs, and data from unauthorized access, exploitation, or attack. It encompasses both hardware and software technologies used to protect networks and systems from malicious attacks.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/4-email-security-best-practices-to-protect-your-organization-in-2021\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Email security<\/span><\/a><span style=\"font-weight: 400;\"> is a subset of cybersecurity that focuses on safeguarding emails and associated information from malicious actors. Electronic mail is a primary means of communication for many businesses and organizations. Such messages often contain sensitive information that must be protected from unauthorized access, hence the need for robust email security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The dangers associated with a lack of email security include phishing attacks, spam campaigns, malware infection, and <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-data-breach\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">data breaches<\/span><\/a><span style=\"font-weight: 400;\">. Here\u2019s a quick breakdown of what each of these risks entail:<\/span><\/p>\n<ul>\n<li><b>Phishing <\/b><span style=\"font-weight: 400;\">is a social engineering attack that attempts to trick victims into installing malware or divulging sensitive information. Fraudsters accomplish this by masquerading as a trustworthy entity or person.\u00a0<\/span><\/li>\n<li><b>Spam emails <\/b><span style=\"font-weight: 400;\">are unsolicited messages sent in bulk to large numbers of recipients. They often contain phishing links or infected attachments.<\/span><\/li>\n<li><b>Malware<\/b><span style=\"font-weight: 400;\"> is malicious software designed to gain unauthorized access to, damage, or disrupt computer systems, clients, servers, or networks.\u00a0<\/span><\/li>\n<li><b>Data breaches<\/b><span style=\"font-weight: 400;\"> are incidents where unauthorized parties gain access to confidential or sensitive information.<\/span><\/li>\n<\/ul>\n<h3><b>The Importance of Understanding Cyberattack Risks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The only way to mitigate cyberattack risks is by understanding them first. Only then can organizations create and implement effective cybersecurity policies and procedures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, understanding cyberattack risks helps organizations identify weaknesses in their security systems and make appropriate changes to strengthen them. Armed with the necessary knowledge, organizations can also respond quickly and effectively when an attack does occur.<\/span><\/p>\n<h3><b>Three Common Cybersecurity and Email Security Breaches<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Cybersecurity is an expanding concern for individuals and organizations. Email security breaches are a significant part of this. Malicious actors often use emails to access sensitive information or spread malware.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware, malware, and phishing are three common types of online threats that are the most dangerous. Although they\u2019ve been around for years, these attacks have become increasingly sophisticated.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All three can be deployed via email. They can be devastating to an organization, often leading to the loss of financial or informational assets. The <\/span><a href=\"https:\/\/easydmarc.com\/blog\/reputational-cost-of-a-data-breach\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">reputational cost of a data breach<\/span><\/a><span style=\"font-weight: 400;\"> is also significant, with persistent damages that are difficult to remedy.<\/span><\/p>\n<h4><b>Phishing<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Phishing attackers typically use fraudulent emails or messages to trick their victims. The goal is to get users to divulge sensitive data such as passwords or credit card numbers, or click on a malicious link.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some statistics proving how dangerous phishing attacks can be:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Globally, 96% of phishing attacks arrive by email.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EasyDMARC communicated with over 40,000 information security and cybersecurity professionals. Over 80% stated that <\/span><a href=\"https:\/\/easydmarc.com\/blog\/phishing-attacks-recognize-and-avoid-email-phishing\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">phishing attacks<\/span><\/a><span style=\"font-weight: 400;\"> represent a top security concern.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Other statistics show that 93% of successful cyberattacks worldwide begin with a spear phishing email.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EasyDMARC\u2019s <\/span><a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/ransomware-attack-statistics\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">phishing email statistics<\/span><\/a><span style=\"font-weight: 400;\"> identified over 9 billion phishing emails in 2022.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">While the <\/span><a href=\"https:\/\/easydmarc.com\/blog\/12-types-of-phishing-attacks-and-how-to-identify-them\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">types of phishing attacks<\/span><\/a><span style=\"font-weight: 400;\"> vary, their risks to small, medium, and large enterprises remain significant.<\/span><\/p>\n<h4><b>Malware<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Malware is malicious software designed to harm, disrupt, or access a system, server, or network. It can be used to steal data, alter or delete files, or even take control of a computer.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Malware attacks are one of the leading <\/span><a href=\"https:\/\/easydmarc.com\/blog\/8-most-common-causes-of-a-data-breach\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">causes of a data breach<\/span><\/a><span style=\"font-weight: 400;\">. They can be executed through email, websites, downloads, or even physical objects. The malware types include viruses, worms, trojans, spyware, ransomware, and adware.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some key <\/span><a href=\"https:\/\/dataprot.net\/blog\/malware-statistics\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">malware statistics<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">560,000 new pieces of malware are detected daily.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">There are now more than one billion existing malware programs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Every minute, four companies fall victim to ransomware attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Trojans account for 58% of all computer malware.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Organizations must continually develop policies and adopt stringent protocols to <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-to-prevent-malware-attacks-in-2022\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">prevent malware attacks<\/span><\/a><span style=\"font-weight: 400;\"> and keep their IT infrastructure safe. In today\u2019s threat landscape, it\u2019s become a necessity.<\/span><\/p>\n<h4><b>Ransomware<\/b><\/h4>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/ransomware-attacks-a-complete-guide\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Ransomware<\/span><\/a><span style=\"font-weight: 400;\"> is a type of malicious software used to encrypt files and data on a computer or network. Threat actors then demand a ransom payment for the files and data to be decrypted and accessible again. It\u2019s typically spread through malicious emails, websites, downloads, and other online sources. Ransomware can have serious consequences, such as financial damages, data loss, and disruption of services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware attacks have been on the rise in recent years; here are some <\/span><a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/ransomware-attack-statistics\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">statistics<\/span><\/a> <span style=\"font-weight: 400;\">you might be interested in:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">A ransomware attack occurs every 2 seconds.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">According to Verizon\u2019s 2022 data breach report, ransomware attacks saw a 13% increase in the past five years.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">The first half of 2022 had 236.7 million ransomware attacks worldwide.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ransomware accounts for 10% of all breaches.<\/span><\/span><\/li>\n<\/ul>\n<h2><b>Top Cybersecurity Breaches of 2022\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The unauthorized access, destruction, theft, or use of information assets are types of cybersecurity breach incidents. These can occur due to malicious attackers, system errors, or human error. Weak or outdated security protocols and procedures are also a major contributing factor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The past year saw a boom in cyberattacks and <a href=\"https:\/\/easydmarc.com\/blog\/security-incidents-in-education\/\">cybersecurity incidents<\/a>. Let&#8217;s look into the top cybersecurity incidents of 2022.<\/span><\/p>\n<h3><b>1) The Russia-Ukraine Cyberwar<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The Russia-Ukraine Cyberwar continued throughout 2022. Every month, there was a new cyberattack. Threat actors targeted the Russian and Ukrainian governments, military, and civilian infrastructure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attacks included distributed denial of service (DDoS), website defacement, malware, phishing, and other malicious activities. They were aimed at disrupting services, stealing data, and damaging critical infrastructure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some of the top cyberattacks during those months:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In February, Anonymous, a decentralized international activist and hacktivist collective, declared a &#8216;Cyber War&#8217; against Russia.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Later in February, there were ghostwriter threats and phishing campaigns against Ukrainian organizations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A massive attack on Ukraine\u2019s educational institutions resulted in at least 30 compromised Ukrainian university websites in March.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">On March 28, Ukraine&#8217;s state-owned telecommunications company Ukrtelecom experienced a disturbance in internet service after a cyberattack.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Russian TV was disrupted by hackers hijacking anti-Russian slogans on &#8216;Victory Day&#8217; in May.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The largest Russian video platform &#8216;RuTube&#8217; was also hacked in May.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Russian hackers allegedly targeted Ukraine&#8217;s most prominent private energy firm in July.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In September, the Russian Yandex taxi app was hacked, causing a massive traffic jam in Moscow.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The conflict eventually died by the end of the year as both sides seemed to reach a stalemate. As of December 2022, neither side has reported significant cyberattacks since September. However, tensions remain high between the two countries, and both countries are still actively monitoring each other&#8217;s networks for potential threats.<\/span><\/p>\n<h3><b>2) Qubit DeFi Platform Suffered a Cryptocurrency Attack Costing $80 Million\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The Qubit DeFi platform suffered a significant cyberattack in January 2022, losing $80 million in cryptocurrency. The attack was conducted by a group of hackers who targeted the platform\u2019s smart contracts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The hackers used a technique called \u201creentrancy\u201d to exploit a flaw in the smart contract code. This allowed them to siphon funds from the platform.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Qubit attack underscores the importance of secure coding practices and proper auditing. Smart contracts are designed to execute specific instructions; if they aren\u2019t coded correctly, they can be exploited.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Auditing is a critical step in the development process. It helps identify any security flaws and vulnerabilities before they can be used. Qubit has since taken steps to address the issue and has reimbursed users for their losses.\u00a0<\/span><\/p>\n<h3><b>3) <\/b><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-march-2022\/\" target=\"_blank\" rel=\"noopener\"><b>100,000+ Google Play Users Downloaded an Infected Application<\/b><\/a><\/h3>\n<p><span style=\"font-weight: 400;\">In March 2022, a cybersecurity company alerted the Google Play team about a malicious mobile application. It was distributed on the app store and downloaded by 100,000+ users.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers implanted an Android trojan called \u201cFacestealer\u201d in the Craftsart Cartoon Photo Tools app that steals Facebook credentials.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once downloaded, the cartoonifying app presents users with a fake Facebook login page. Bad actors then get full access to victims\u2019 Facebook data, credit card details, private conversations, searches, etc. This mobile application was on Google Play, but has since been banned.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The app simulates a popular photo editing application to reach immense fame and hide its illicit actions. Although Google took action and notified users, this Android trojan remains prevalent. Hackers can easily embed it into other legitimate-looking mobile applications.<\/span><\/p>\n<h3><b>4) <\/b><a href=\"https:\/\/easydmarc.com\/blog\/category\/news\/\" target=\"_blank\" rel=\"noopener\"><b>260,000 Confidential Attorney Discipline Records Posted After a Data Breach<\/b><\/a><\/h3>\n<p><span style=\"font-weight: 400;\">Another massive data breach occurred in March 2022 when a\u00a0 website published 260,000 confidential attorney discipline records. After the State Bar of California disclosed the breach, the website deleted the records. Called &#8220;The People&#8217;s Database,&#8221; it initially published the records of California lawyers who were disciplined for misconduct over the past decade.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The group said it removed the records out of respect for the privacy of lawyers and their clients. They also wanted to avoid potential legal action.\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The State Bar launched an investigation into the breach and took steps to secure its network. However, it was later revealed that the breach was the result of a security vulnerability, and not an intentional or malicious hack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The previously unknown vulnerability was discovered in the case management platform provided by Tyler Technologies Odyssey. It allowed confidential records to be unintentionally gathered by judyrecords.com when accessing public records, according to the State Bar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The breach exposed sensitive personal data like names, dates of birth, addresses, Social Security numbers, etc. The People&#8217;s Database said it had taken steps to protect the data, including encrypting and obscuring some of it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It also worked with the State Bar to ensure that the private records were permanently removed from the website.<\/span><\/p>\n<h3><b>5) 8.2 million U.S. Cash App Users Targeted by a Data Breach<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In April 2022, Cash App announced that it suffered a data breach. The incident occurred in December 2021 after a disgruntled ex-employee accessed confidential customer records in the act of revenge.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ex-employee had access to financial reports during the execution of their daily duties. After termination on December 10, 2021, the former Cash App worker downloaded these records without authorization. The act resulted in 8.2 million U.S. Cash App users\u2019 data exposed, including:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Full names<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Stock trading activity<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Brokerage account numbers<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Portfolio holdings and values<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Only the data of customers utilizing the app\u2019s stock function were compromised. However, Cash App notified such users four months after the incident occurred. The delay and negligent control of ex-employee access to confidential data wasn\u2019t taken lightly.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A class action was filed against Cash App Investing and its parent company, Block, for their failure to secure customers\u2019 data. This incident highlights the dire <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-are-the-consequences-of-a-data-breach\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">consequences of a data breach<\/span><\/a><span style=\"font-weight: 400;\"> that include possible legal action. It also illustrates the importance of implementing safety controls to mitigate unauthorized access to sensitive records.<\/span><\/p>\n<h3><b>6) <\/b><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-may-2022\/\" target=\"_blank\" rel=\"noopener\"><b>General Motors Cyberattack Exposed Customer Data<\/b><\/a><\/h3>\n<p><span style=\"font-weight: 400;\">American automotive manufacturing company General Motors witnessed suspicious logins to certain GM online accounts in April 2022. This led to unauthorized redemptions of customer reward points for gift cards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Later investigations revealed that hackers gained access to customer accounts via a cyberattack on a third-party IT services provider of General Motors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">General Motors stopped gift card redemptions in response to the suspicious activity and notified affected customers, suggesting they change passwords.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The exposed data included addresses, first and last names, email addresses, and search and destination information. The cybercriminals also accessed data like vehicle service details, mileage history, emergency contacts, and in-car Wi-Fi data.<\/span><\/p>\n<h3><b>7) <\/b><b>Flagstar Bank Data Breach Affected 1.5 Million Customers<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Flagstar Bank reported a cyberattack that impacted more than 1.5 million customers. The incident occurred in early December 2021, but was only discovered in June 2022. Forensic investigations revealed that a bad actor gained unauthorized access to the bank&#8217;s systems. The hacker remains unidentified.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Flagstar said the attack was contained and that no customer information was breached. However, consumers were warned to watch their accounts for any suspicious activity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Michigan-based bank took steps to assist affected customers. It offered free credit monitoring and identity protection services for two years. Still, this incident happened on the heels of another cyberattack that occurred just 14 months prior, costing Flagship $5.9 million.<\/span><\/p>\n<h3><b>8) <\/b><a href=\"https:\/\/easydmarc.com\/blog\/category\/news\/\" target=\"_blank\" rel=\"noopener\"><b>Google Forced to Pay AUD 60 Million Fine for Data Violation\u00a0<\/b><\/a><\/h3>\n<p><span style=\"font-weight: 400;\">Google made headlines in August 2022 when it was fined $60 million (AUD). The penalty came after a long-running court fight with the Australian Competition and Consumer Commission. The battle revolved around Google collecting personal location data without permission.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The court found the tech giant guilty of breaking Australian consumer laws by misleading Android users about their geo-data. Specifically, how the information was collected and used for targeted advertising.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The penalty is the largest-ever fine imposed by the ACCC, which Google LLC agreed to pay during federal court proceedings.<\/span><\/p>\n<h2><b>Top Email Security Breaches of 2022\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Email security breaches remain prolific threats to industries across the board. These exploits commonly include malicious activities, such as phishing attacks, malware and spam campaigns, ransomware attacks, and other fraudulent schemes.<\/span><\/p>\n<p><a href=\"https:\/\/www.proofpoint.com\/us\/tessian-is-now-proofpoint\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Statistics<\/span><\/a><span style=\"font-weight: 400;\"> show that nearly 63% of security leaders said their staff exfiltrated data over email in 2022. Meanwhile, 92% of companies experienced a data breach caused by an end-user making a mistake in their email.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following these crazy stats, it\u2019s time to discover the top email security incidents of 2022.<\/span><\/p>\n<h3><b>1) <\/b><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-may-2022\/\" target=\"_blank\" rel=\"noopener\"><b>U.S. Department of Defense Lost $23M in Elaborate Phishing Attack<\/b><\/a><\/h3>\n<p><span style=\"font-weight: 400;\">In late April 2022, a Californian man was convicted due to a massive phishing scam resulting in the theft of $23 million. The victims? The U.S. Department of Defense and a DoD vendor.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sercan Oyuntur, a Northridge resident, was found guilty on various counts relating to identity theft, wire, mail, and bank fraud. According to prosecutors, Oyuntur conspired with others to defraud the U.S. Department of Defense through a complex phishing scheme.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They targeted a DoD contractor responsible for supplying jet fuel to U.S. troops in Southeast Asia. By posing as a legitimate New Jersey employee, the threat actors stole over $23 million intended for the victim corporation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Oyuntur and his co-conspirators created fraudulent email accounts and phishing sites impersonating the General Services Administration\u2019s (GSA) website. They then sent phishing emails to various DoD contractors, including the New Jersey employee who represented the victim corporation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The emails appeared to originate from the U.S. DoD and contained phishing links that prompted recipients to enter their login credentials.\u00a0 The compromised accounts were then used to make changes in the government systems and ultimately divert large sums of money.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Oyuntur\u2019s convictions carry more than 50 years imprisonment. One co-conspirator, Hurriyet Arslan, also pleaded guilty to money laundering, conspiracy, and bank fraud.\u00a0<\/span><\/p>\n<h3><b>2)<\/b><b> City Loses $1.4 Million in Business Email Compromise Scam<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In April 2022, hackers defrauded the City of Portland in Oregon via a <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-business-email-compromise-bec\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Business Email Compromise<\/span><\/a><span style=\"font-weight: 400;\"> scheme. They made off with $1.4 million after impersonating a non-profit organization via fraudulent emails. The city\u2019s treasury flagged the requested wire transfer as the account name didn\u2019t match.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, municipal employees asked the intended recipient, Central City Concern, for confirmation via email. The threat actors, pretending to be the non-profit, confirmed the details and the wire transfer was made.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Portland city officials only discovered the exploit after the bad actors attempted a second fraudulent wire transfer a few weeks later. IT employees then uncovered that the hijacked email account had been accessed from various regions, including Nigeria, Texas, and Germany.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The city has since taken steps to improve its security, including implementing a multi-factor authentication system and increasing cybersecurity training.\u00a0<\/span><\/p>\n<h3><b>3) <\/b><b>Over 70,000 Patients Affected by Kaiser Permanente Data Breach<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Up to 70,000 Kaiser Permanente patients&#8217; healthcare and personal data were exposed following unauthorized access to an employee\u2019s emails. The data breach incident occurred in April 2022, potentially exposing patients&#8217; full names, medical record numbers, dates of service, and laboratory test results.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the healthcare provider, the breach didn\u2019t expose financially sensitive information (Social Security numbers and credit card details). Although the incident was contained within a few hours, the exposed health data remains at risk.\u00a0<\/span><\/p>\n<h3><b>4) <\/b><b>Email Accounts of OpenSea Users Leaked<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In June 2022, NFT marketplace OpenSea was a victim of a data breach via one of its vendors. An employee of its email delivery vendor, Customer.io,\u00a0 stole email addresses linked with OpenSea accounts and newsletter subscriptions. The data was then shared with an unknown third party.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company&#8217;s head of security, Cory Hardman, warned that any OpenSea account holder or newsletter subscriber should assume their email address was among those impacted.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While no damage beyond the leaked email addresses was reported, the number of people likely affected by the breach is notable. 1.8 million users made purchases through the Ethereum network on OpenSea, according to data from Dune Analytics.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It later emerged that the employee responsible for the data breach was a senior engineer at Customer.io. The email addresses of five other companies\u2019 customers were also exposed in the incident.<\/span><\/p>\n<h3><b>5) 70,000 <\/b><b>Mental Health App Users\u2019 Email Addresses Exposed<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A vulnerability was discovered in the Feelyou mental health app, owned by the Japan-based company Bajji, in July 2022. The issue exposed 78,000 users\u2019 email addresses across more than 170 countries.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bajji founder Noritaka Kobayashi stated that the app doesn\u2019t collect the personal information of its users, like names, phone numbers, credit card info, etc. However, the app\u2019s GraphQL API didn\u2019t require access authentication, leaving it open to cyber actors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Daily Dot informed the company of the vulnerability and the issue was fixed within 72 hours.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bajji took further steps to protect user data. These measures include two-factor authentication and encryption of user data, as well as enhanced monitoring of its systems.<\/span><\/p>\n<h3><b>Other Notable Data Breaches in 2022<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The above-mentioned email security and cybersecurity breaches were among the top incidents in 2022. But there were many more. Here are a few other famous data breaches of 2022:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/nato-documents-stolen-in-breach-of-portuguese-armed-forces-found-for-sale-on-dark-web\/#:~:text=5%20min%20read-,NATO%20Documents%20Stolen%20in%20Breach%20of%20Portuguese%20Armed%20Forces,for%20Sale%20on%20Dark%20Web&amp;text=A%20theft%20of%20NATO%20documents,be%20accessible%20via%20the%20internet.\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">NATO Documents Stolen and Sold on the Dark Web<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-october-2022\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Binance Bridge Vulnerability Exploited, Causing $566M Theft<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-october-2022\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">2.2M MyDeal Users&#8217; Data Compromised<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-october-2022\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Medibank Breach Exposes 3.9 Million Customers&#8217; Data<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-november-2022\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Huge Phishing Attack Campaign Executed Via 42,000 Imposter Domains\u00a0<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-november-2022\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Chegg Inc. Leaked 40 Million Personal Records<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/hackread.com\/fox-news-exposed-13-million-sensitive-records-online\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Millions of Fox News Records Exposed<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-may-2022\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Over 1.8 Million Texan\u2019s Sensitive Information Exposed by a Massive Data Breach<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/email-security-news-round-up-may-2022\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">U.S. Government Announced Illicit Actions of North Korean I.T. Workers<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The overwhelming number of cybersecurity and email security incidents in 2022 makes one&#8217;s head spin. Unfortunately, threat actors and cyberattacks aren\u2019t going anywhere. If anything, they\u2019re only becoming more sophisticated and complex.<\/span><\/p>\n<h2><b>The Impact of Major Cybersecurity and Email Security Breaches on Businesses\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The impact of cybersecurity and email security breaches on businesses can be severe. Cybersecurity incidents can lead to the loss of sensitive data, financial loss, reputational damage, and even legal action. Businesses may suffer from decreased customer trust and loyalty, increased costs to remedy the breach, and even potential prosecution.\u00a0<\/span><\/p>\n<h3><b>Confidential Information Loss<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Confidential information loss refers to the unauthorized disclosure, destruction, or loss of business information. This includes customer data, trade secrets, financial records, and intellectual property. The impact of such losses can result in legal action and may shut down a business indefinitely.<\/span><\/p>\n<h3><b>Financial Loss\u00a0\u00a0\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The cost of a cyberattack depends on its type, size, and the organization affected. For example, a distributed-denial-of-service (DDoS) attack could cost a business anywhere from a few thousand to millions of dollars in lost revenue. Similarly, data breaches can cost hundreds of dollars in lost information, hefty fines, litigation expenses, and productivity loss.<\/span><\/p>\n<h3><b>Damage to Reputation<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A cybersecurity or email security incident can also cause severe damage to a business&#8217;s reputation. Customers may become wary of the company if they hear about the attack, fearing their data isn\u2019t secure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Reputation is one of the most critical assets for a business, and it can be easily injured. Damage to a business&#8217;s reputation can have far-reaching consequences, from lost customers and revenue to diminished employee morale. It can also lead to a decrease in market value, investor confidence, and potential legal and financial issues. <\/span><\/p>\n<h2><b>How Can EasyDMARC Protect Your Business Reputation?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">EasyDMARC offers a unique email security solution that gives businesses the tools to protect their reputations. Our all-in-one platform provides authenticated domain protection, email authentication, and DMARC enforcement, among other easy-to-use features.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our platform helps ensure that emails are sent from legitimate sources, preventing them from being blocked or marked as spam. It also provides visibility into any malicious activity, allowing businesses to take action and mitigate any potential damage to their reputation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To help protect your domain from malicious emails, spam, phishing, and other threats, EasyDMARC also provides a range of security features, including a <a href=\"https:\/\/easydmarc.com\/tools\/dmarc-record-generator\">DMARC generator<\/a>, DMARC record monitoring, email authentication, and threat analysis.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These features can help protect your business from phishing scams, spoofing, and other email-borne threats. With EasyDMARC, you can prevent your domain being used for malicious purposes while increasing the deliverability of legitimate emails.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Stop financial, data, and customer loss, and be one step ahead in securing your business by signing up to EasyDMARC today!<\/span><\/p>\n<p style=\"text-align: center;\"><a class=\"maxbutton-1 maxbutton maxbutton-sign-up\" title=\"SIGN UP FREE\" href=\"https:\/\/app.easydmarc.com\/register\"><span class='mb-text'>Sign Up Free<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2022 was a challenging year for cybersecurity and &#8230;<\/p>\n","protected":false},"author":6,"featured_media":32978,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,202],"tags":[],"class_list":["post-32977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-news-round-up"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top Cybersecurity and Email Security Breaches of 2022 | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Discover the top cybersecurity &amp; email security breaches of 2022, gain a deeper understanding of their impact on businesses, and see how EasyDMARC can help!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Cybersecurity and Email Security Breaches of 2022\" \/>\n<meta property=\"og:description\" content=\"Discover the top cybersecurity &amp; email security breaches of 2022, gain a deeper understanding of their impact on businesses, and see how EasyDMARC can help!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-12T15:33:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T05:05:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2023\/01\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Knarik Petrosyan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Knarik Petrosyan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/\"},\"author\":{\"name\":\"Knarik Petrosyan\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1274541880d815d0b03dcd039ddac923\"},\"headline\":\"Top Cybersecurity and Email Security Breaches of 2022\",\"datePublished\":\"2023-01-12T15:33:20+00:00\",\"dateModified\":\"2026-03-18T05:05:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/\"},\"wordCount\":3517,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg\",\"articleSection\":[\"Blog\",\"News Round-Up\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/\",\"name\":\"Top Cybersecurity and Email Security Breaches of 2022 | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg\",\"datePublished\":\"2023-01-12T15:33:20+00:00\",\"dateModified\":\"2026-03-18T05:05:23+00:00\",\"description\":\"Discover the top cybersecurity & email security breaches of 2022, gain a deeper understanding of their impact on businesses, and see how EasyDMARC can help!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg\",\"width\":1440,\"height\":910},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-cybersecurity-and-email-security-breaches-of-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News Round-Up\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/news-round-up\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Top Cybersecurity and Email Security Breaches of 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1274541880d815d0b03dcd039ddac923\",\"name\":\"Knarik Petrosyan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g\",\"caption\":\"Knarik Petrosyan\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/knarik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top Cybersecurity and Email Security Breaches of 2022 | EasyDMARC","description":"Discover the top cybersecurity & email security breaches of 2022, gain a deeper understanding of their impact on businesses, and see how EasyDMARC can help!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/","og_locale":"en_US","og_type":"article","og_title":"Top Cybersecurity and Email Security Breaches of 2022","og_description":"Discover the top cybersecurity & email security breaches of 2022, gain a deeper understanding of their impact on businesses, and see how EasyDMARC can help!","og_url":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2023-01-12T15:33:20+00:00","article_modified_time":"2026-03-18T05:05:23+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2023\/01\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg","type":"image\/jpeg"}],"author":"Knarik Petrosyan","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Knarik Petrosyan","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/"},"author":{"name":"Knarik Petrosyan","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1274541880d815d0b03dcd039ddac923"},"headline":"Top Cybersecurity and Email Security Breaches of 2022","datePublished":"2023-01-12T15:33:20+00:00","dateModified":"2026-03-18T05:05:23+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/"},"wordCount":3517,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2023\/01\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg","articleSection":["Blog","News Round-Up"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/","url":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/","name":"Top Cybersecurity and Email Security Breaches of 2022 | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2023\/01\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg","datePublished":"2023-01-12T15:33:20+00:00","dateModified":"2026-03-18T05:05:23+00:00","description":"Discover the top cybersecurity & email security breaches of 2022, gain a deeper understanding of their impact on businesses, and see how EasyDMARC can help!","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2023\/01\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2023\/01\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg","width":1440,"height":910},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/top-cybersecurity-and-email-security-breaches-of-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"News Round-Up","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/news-round-up\/"},{"@type":"ListItem","position":4,"name":"Top Cybersecurity and Email Security Breaches of 2022"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1274541880d815d0b03dcd039ddac923","name":"Knarik Petrosyan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g","caption":"Knarik Petrosyan"},"url":"https:\/\/easydmarc.com\/blog\/author\/knarik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2023\/01\/Top-Cybersecurity-and-Email-Security-Breaches-of-2022.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/32977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=32977"}],"version-history":[{"count":9,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/32977\/revisions"}],"predecessor-version":[{"id":59899,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/32977\/revisions\/59899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/32978"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=32977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=32977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=32977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}