Hackers accessed computers with sensitive records of 4.5 million people @ The University of California, Los Angeles and UCLA

In July 2015, the healthcare company disclosed that an attacker had accessed parts of their network that contained the personal information of 4.5 million individuals. At that time it was the fourth-biggest healthcare data breach of all time. There w...

Hackers place skimming device on website and customers suffer data breach @ Rail Europe North America and Rail Europe North America, Inc.

In April 2018, the overseas train travel company disclosed it had suffered a three-month data breach from November 2017 to mid-February 2018. The data breach was caused by hackers installing skimming software on the company's website. The hacker...

Prominent healthcare IT contractor suffers data breach affecting 45,000 patients @ Laguna Honda hospital and 4 more...

In May 2018, the healthcare company disclosed that 45,000 patient records were accessed by an unauthorized party. The cause of the breach has been identified as a former employee hacking into the company’s servers though it appears that none of the r...

Dallas-based restaurant chain hacked and customer debit/credit card stolen @ Brinker International and Chili's Grill & Bar

In May 2018, the restaurant company disclosed a data breach of customers’ credit and debit cards. The breach was believed to have been caused by hackers installing malware on their systems to access guests’ payment card information. The company sa...

Recruitment giant suffers cyber attack and 700,000 jobseekers data is exposed @ Michael Page

Described by the Evening Standard newspaper as "one of the biggest security breaches to hit a British firm" in November 2016 when the company disclosed that 711,000 candidates from China, Netherlands and the UK had been impacted by a data breach after...

Let us do the analysis so you can make the decisions...

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...