Advanced persistent threat that began with phishing email @ EMC Corporation and RSA Security LLC

Two separate hacker groups worked in collaboration with a foreign government to launch a series of phishing attacks against RSA employees, posing as people the employees trusted, to penetrate the company's network. The impact of the cyberattack that ...

Cybercriminals stole the data of 500 million customers @ Marriott International

One of the biggest data breaches ever. In November 2018, the company disclosed that the data of up to 500 million guests who had booked reservations at its properties were compromised after attackers breached its network for at least four years. Th...

1.1 million customer credit card details stolen from US retailer @ Neiman Marcus

In January 2014, the retail company disclosed they had suffered a breach where hackers accessed the debit and credit card information of customers who shopped between 16th July to 30th October 2013. The breach occurred when malicious software was inst...

Wealth Fund Loses $10 million in "data breach" @ Norfund

In April 2020, the world's largest sovereign wealth fund discovered that they had been defrauded of over $10 million after falling victim to a business email compromise scam during communications about a transfer which was intended for a micro-finance...

Medical centre experiences costly ransomware attack @ Erie County Medical Center

In April 2017, the healthcare company disclosed that it had suffered a ransomware attack which was discovered when a member of their clinical staff saw an electronic ransom note on a workstation at around 2am on 9th April 2017. The ransom demanded...

Browse visualisations from our proprietary data set


Visualise cyber events by industry sector.


Net Costs

Visualise net costs by industry sector.


Global Cyber Event Taxonomy

Visualise the key attributes we capture.


Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...