US bank data breach compromises customer information for 82 million accounts @ Chase Bank and JPMorgan Chase & Co.

In 2014, this attack was said to impact two-thirds of all US households making this one of the largest breaches in history at that time. The cyber attack exposed information relating to 82 million household and business accounts and included person...

Keyloggers discovered on enterprise information technology company's products @ Hewlett Packard Enterprise Company

In May 2017, a Swiss security firm discovered that more than two dozen “HP laptop models were recording users’ keystrokes”. The keylogging software was in the PC’s audio driver existing since at least 2015. The driver was supposed to be alerted w...

Worldwide customers' data exposed due to cloud storage server not secured with a password @ Bongo International LLC and 2 more...

In February 2018, security researchers found over 100,000 documents containing highly personal information and including passports, driving licences and security IDs completely accessible to the public in an unsecured Amazon S3 bucket. Like far too m...

Unauthorised access to payment systems @ Chipotle Mexican Grill, Inc.

In April 2017, the company posted a “Notice of Data Security Incident” on its website to let customers know about unauthorized activity it had detected on the network that supports payment processes. The investigation was ongoing when the notice w...

Employee sent colleague's confidential information to spouse @ The Boeing Company

In February 2017, the company disclosed a data breach after an employee sent their spouse a spreadsheet containing his colleague's personal information, he did so as he sought his wife's help with a formatting issue. The exposed information include...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...