Customer records illegitimately accessed at online homeloan broker @ LendingTree

An employee at this financial company conspired with third parties to provide both customer and administrator access credentials to their IT systems. This permitted the third parties to access confidential customer details and use this information to ...

Australian car sharing service defrauded and customer data exposed to hacker @ CarShare Australia Pty Ltd. and GoGet CarShare

As more goods and services become facilitated through internet-enabled devices, security at a distance whilst maintaining optimal levels of customer service becomes part of the challenge. In June 2017, a malicious third party accessed the company'...

2.2 million patients of US cancer treatment centre suffer data breach @ 21st Century Oncology of Fort Myers

In March 2015, the US cancer care provider announced that a data breach had exposed 2.2 million patients' data based across all 50 states and internationally. The company said that hackers broke into a company database in October 2014 and accessed...

Cyber bank robbery at British bank @ Tesco Bank and 3 more...

As the English saying goes, remember, remember the 5th of November! Tesco bank will, that's the date they experienced Britain's first cyber bank robbery. Customer funds were stolen by a group who were able to organise the theft from thousands of a...

Hackers accessed computers with sensitive records of 4.5 million people @ The University of California, Los Angeles and UCLA

In July 2015, the healthcare company disclosed that an attacker had accessed parts of their network that contained the personal information of 4.5 million individuals. At that time it was the fourth-biggest healthcare data breach of all time. There w...

Browse visualisations from our proprietary data set

Sectors

Visualise cyber events by industry sector.

View

Net Costs

Visualise net costs by industry sector.

View

Global Cyber Event Taxonomy

Visualise the key attributes we capture.

View

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...