Adultery site hacked 37 million user details exposed @ Ashley Madison Agency and 3 more...

In July 2015, a cyber attacker group called Impact Team stole the controversial dating site's user database by identifying weaknesses in password encryption and used these to crack the bcrypt-hashed passwords to gain access. The attackers tried to...

143 million customer records stolen at credit reference agency @ Equifax Inc.

In September 2017, one of the big three credit reference agencies disclosed they had suffered a data breach which exposed personally identifiable information for 143 million US customers along with other customers around the world. The attackers expl...

Data breach exposes 3.5 million users @ U.S. Postal Service

In November 2014, the postal service disclosed that they had suffered a data breach affecting 800,000 employees and 2.9 million customers. The service discovered the breach in mid-September but didn’t publicly announce it until early November. Unf...

Cyber­ attack disrupted the worldwide operations @ Merck & Co., Inc.

In June 2017, the company disclosed that it had suffered a "network cyber ­attack" resulting in the disruption of its worldwide operations, including manufacturing, research and sales operations. It was reported that as many as 30,000 laptops/desktop...

Malware and ransom cyber attack at utility company @ The Lansing Board of Water and Light

US utility company falls victim to a ransomware attack which initially costs the business just $25k. However, improving its control environment and implementing new security infrastructure ends up costing the business over $2 million. The event act...

Browse visualisations from our proprietary data set

Sectors

Visualise cyber events by industry sector.

View

Net Costs

Visualise net costs by industry sector.

View

Global Cyber Event Taxonomy

Visualise the key attributes we capture.

View

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...