Payments giant investigating breach at gas stations @ Verifone Holdings Inc.

In January 2017, the card payments company experienced a breach of their internal systems limited to controllers and attempted attacks on some affiliated point-of-sale (POS) systems at approximately 24 gas stations. As reported by security researc...

Details of 113,000 employees accessed and encrypted in cyber attack @ Interserve and lnterserve Group Limited

In May 2020, the company disclosed a cyber attack which took place from late March to early May 2020 and affected the confidentiality and availability of up to 113,000 current and former employees' personal data after bad actors exploited "negligent s...

Business disruption at chocolate manufacturer due to global cyber attack @ Cadbury and Mondelez International, Inc.

In June 2017, the world's second largest confectionery company was affected by the global ransomware attack called NotPetya which was an untargeted campaign without a specific intended victim. Many of the impacted companies were infected after downlo...

Cyber­ attack disrupted the worldwide operations @ Merck & Co., Inc.

In June 2017, the company disclosed that it had suffered a "network cyber ­attack" resulting in the disruption of its worldwide operations, including manufacturing, research and sales operations. It was reported that as many as 30,000 laptops/desktop...

Cyber-attack at fashion website affects 39 million individuals' data @ SheIn.com and ZOETOP BUSINESS COMPANY, LIMITED

In September 2018, the fashion company disclosed that they had suffered a "sophisticated" cyber attack that had exposed the private information of 6.4 million customers. The company explained that hackers infiltrated their servers through "back door ...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...