Unauthorized access of internal systems results in data breach @ Flipboard, Inc.

In April 2019, the content aggregation app announced it had discovered unauthorized access to databases containing user information. Those databases contained names, usernames, email addresses and cryptographically-protected passwords. It is not know...

Houston-based seafood and steak chain suffers data breach @ Truluck's Restaurant Group, Ltd and Truluck’s Seafood, Steak & Crab House

In February 2019, the restaurant company disclosed that an unauthorized actor had inserted malware onto the point of sale systems at eight of their restaurants capturing customer's payment card information used for purchases (credit or debit card numb...

Unauthorized access of employee email accounts @ T-Mobile and T-Mobile US, Inc.

In March 2020, the company disclosed a security incident which they described as a 'malicious attack' against their email vendor and led to unauthorized access to certain employee email accounts which contained customer and employee information. T...

Data breach at car financing company affects 1.13 million customers @ Nissan Canada and Nissan Motor Co. , Ltd.

In December 2017, the company announced that its systems were compromised the day before with an “unauthorized person(s) gaining access to the personal information of some customers that have financed their vehicles". 1.13 million customers were a...

Outside company blamed for data breach of millions of customers @ Nice systems and Verizon Enterprise Solutions

In July 2017, it was reported that up to 14 million subscribers could have been affected by a data breach which affected any customer that contacted the company's customer service during 2017. These records were held on a server that was controlle...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...