Popular fitness tracking app suffers unauthorized access that exposed 150 million users @ MyFitnessPal and Under Armour, Inc.

One of the largest cyberattacks on record. According to USA Today, it is the 4th-biggest reported data breach of all time, after two separate Yahoo! hacks in 2016 and the May 2016 MySpace hack. Narrowly beating Equifax from September 2017 and eBay fro...

Developers used real data in test environment which was hacked exposing customers' data @ Kiddicare

In May 2016, hackers stole nearly 800,000 customers' data from a online child products retail company after their developers used real customer data for testing within a test web development site. Website and software developers often use real data to...

Media company hacked by hacktivists @ Financial Times

Contradicting conventional wisdom that only 'non-technical' individuals fall prey to a phishing attack, technologist Andrew Betts of FT Labs inadvertently provided his credentials to the attackers. He was one of several employees who did so. This ...

Online note-taking service leak results in large-scale customer password reset request @ Evernote

The biggest loss of data disclosed in 2014 with 50 million records exposed. In February 2013, an online note-taking and archiving service disclosed that it has suffered a serious security breach that saw hackers steal usernames, email addresses an...

Data potentially breached during a months-long phishing attack @ Hematology Oncology Associates

In May 2019, the healthcare company disclosed a data breach affecting employees and patients after an unauthorized person gained access to some employee email accounts in December 2018 and again in February 2019. The company's investigation determi...

Browse visualisations from our proprietary data set


Visualise cyber events by industry sector.


Net Costs

Visualise net costs by industry sector.


Global Cyber Event Taxonomy

Visualise the key attributes we capture.


Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...