Researchers use this information about breaches to learn and better their systems. If a breach were to happen, it would expose confidential data to the public, ruining a company. Researchers can study this information on how it happens, where the weak points in the system are, and how to prevent these things from happening again.