Employee tried to steal client contact lists containing 1.5 million customers to share it with criminal third party @ SunTrust Banks, Inc.

In April 2018, the company disclosed a data breach impacting 1.5 million customers. The breach was caused by a former employee who stole the data. The information exposed included the customers’ names, addresses, phone numbers and account balances....

134,512 patient records accessed by hackers at US healthcare company @ St. Peter’s Surgery & Endoscopy Center

The second-largest healthcare breach of 2018 and the largest breach to hit New York state since the breach of more than 3.4 million records in 2016. In January 2018, the hospital reported that it discovered a data breach of 134,512 individuals afte...

20,000 undercover agents data leaked on the dark web by inexperienced hacker @ Federal Bureau of Investigation

In November 2016, a 15-year-old hacked the FBI and released detailed information about every undercover FBI officer in the US releasing the information onto the Dark Web. This hack was described as lacking sophistication and the hacker considered ...

Cyberattack that gave a hacker access to over 1,800 medical records @ The University of Virginia Health System

In February 2018, the university notified 1,882 patients that their personal health information may have been exposed after malware was discovered on a physician's laptop and other devices. The attacker may have been able to view patient information o...

Employee posts patient data to third-party Microsoft cloud account @ Emory Healthcare

In October 2017, the healthcare company publicly disclosed and notified 24,000 affected patients that their protected health information had gone astray. More specifically, a physician who formerly worked at the company stored the data in a Microsoft...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...