Dallas-based restaurant chain hacked and customer debit/credit card stolen @ Brinker International and Chili's Grill & Bar

In May 2018, the restaurant company disclosed a data breach of customers’ credit and debit cards. The breach was believed to have been caused by hackers installing malware on their systems to access guests’ payment card information. The company sa...

Employee's email account compromised exposing sensitive patient information @ The Oregon Clinic

In April 2018, the clinic disclosed that an unauthorised party had accessed an employee's email account and gained unauthorised access to patient information. The exposed information included names, dates of birth and certain medical information (...

Child tracker outfit admits data breach but starts row with security researcher who discovered it @ uKnow.com, Inc and uKnowKids

In Feburary 2016, the social media monitoring service company disclosed a data breach after unauthorized access to one of their databases containing "customer data, business data, trade secrets and proprietary algorithms" over the course of 26 hours o...

500,000 patients may have had their personal information exposed @ Lifebridge Health, Inc. and 2 more...

In May 2018, the healthcare company disclosed that 500,000 patients have been exposed in a data breach. The cyber attack was discovered in March 2018 but the breach itself occurred back in September of 2016, which means that the patient records were ...

35,000 patients' personal information compromised after hackers accessed employees' email accounts @ ATI Physical Therapy

In March 2018, the healthcare company disclosed that they had suffered a data breach where several employee email accounts were hacked by a phishing scam. The company notified 35,136 patients of the breach which was initially discovered in January. ...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...