Company providing information security services 'bug' leaks company data online @ Cloudflare, Inc.

The company disclosed in February 2017 that “1 in every 3.3 million requests could have been leaked”, the exposed information was said to have included personally identifiable information, passwords, encryption keys, HTTP POST bodies, HTTP cookies and...

Data breach at workplace group chat tool @ Atlassian, Inc. and HipChat

In May 2017, the company sent a security notice to users warning them that their data had been breached after a connected third-party was targeted by hackers. The breach affected a server in the company's cloud web tier and for some (reported as 0...

1.5 million players details leaked at online video game community @ E-Sports Entertainment Association League

One of the largest video gaming communities disclosed a data breach in December 2016 though it wasn’t known at that time what was stolen or how many users were affected. Reportedly a ransom of $100,000 had been demanded which the company did not p...

43,000 holiday-makers data breach at UK's largest travel association @ Association of British Travel Agents

In February 2017, the company was hit with a cyber attack that threatened to expose the details of up to 43,000 holidaymakers, with 1,000 of these compromised files potentially containing identifying information. The company blamed the breach on a ...

27 million customer records stolen and sold by IT department contractor at credit bureau @ Korea Credit Bureau

In 2014, the company which offers fraud detection and risk management services alleged the breach was caused by an IT employee who copied databases containing customer details (names, social security numbers and credit card details) of 27 million cust...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...