Electronic learning products company breaches children's data @ VTech

In 2015 this event was considered the fourth largest consumer data breach ever... In November 2015, the personal data on millions of parents and children was exposed after a hacker gained access to the server of the electronic toy manufacturing com...

150 players directly attacked via credential stuffing and 10.5 million players told to change their passwords @ Camelot Group and National Lottery

In November 2016, the company disclosed that they had suffered a credential stuffing attack on their platform and that 26,500 users' accounts could have been exposed to hackers. 10.5 million players were told to change their passwords in response to t...

Data exposed by intrusion into hotel reservations system @ Sabre Global Distribution System and Sabre Holdings

In May 2017, a tech company that provides reservation system services for more than 36,000 properties, revealed a breach that allowed hotel customer payment information to be compromised. The unauthorized access was shut off and the company did no...

Paid ransom to have the hijacked data destroyed by the cybercriminals @ Blackbaud and Blackbaud Inc.

In July 2020, the company, which provides hundreds of non-profits and educational facilities with customer relationship management services, disclosed that they had suffered a ransomware attack. More than 120 education and third-sector organisations m...

Personal information of social media giant's users was 'misused' by customer @ Cambridge Analytica and Facebook, Inc.

In March 2018, it was disclosed that over 50 million users of the social media company had their personal information compromised by a third party, Global Science Research, who had legitimate access to the data for academic purposes but they passed th...

Browse visualisations from our proprietary data set

Sectors

Visualise cyber events by industry sector.

View

Net Costs

Visualise net costs by industry sector.

View

Global Cyber Event Taxonomy

Visualise the key attributes we capture.

View

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...