Chicken restaurant warns customers of a data breach @ PDQ and People Dedicated to Quality

In June 2018, the company disclosed they had discovered a breach of customer information earlier that same month following unauthorized access that took place between May 2017 to April 2018. The exposed information included some or all of the foll...

Phishing results in exposure of patients' data @ Black River Medical Center

The Medical Center became aware in April 2018 of a potential data breach where an employee’s email account was compromised as the result of a phishing attack by an unknown, unauthorized third party. This may have resulted in the exposure of 13,443 pat...

SaaS HR platform data breach potentially compromises bank details, TFNs, personal details of job applicants @ PageUp

In June 2018, the company that provides HR and recruitment services to clients across the world announced that they had detected suspicious activity in their systems in May and that this was determined to have been a malware infection and potential ca...

92 million users had their email addresses and hashed passwords stolen @ MyHeritage

In June 2018, the company which offers genealogy and DNA testing services disclosed a data breach impacting 92,283,889 users who had their email addresses and hashed passwords exposed. The company claimed that no medical details / DNA data were access...

2600 patients suffer data breach at healthcare company @ Partners HealthCare and Partners HealthCare System, Inc.

In February 2018, Massachusetts’ largest private employer disclosed a data breach that may have exposed the personal information of 2,600 patients. The company’s network was breached via malware in May 2017, which compromised records including pat...

Let us do the analysis so you can make the decisions...

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...