Large-scale cyber attack disrupts healthcare provision @ National Health Service

The UK’s public health system was put under considerable strain on 12th May 2017 when thousands of its computers were infected by the WannaCry ransomware virus. Patient data was kept hostage and many hospitals were only accepting emergency cases. ...

11.2 million subscribers' data exposed at US healthcare company @ Premera BlueCross BlueShield

In March 2015, the healthcare provider revealed it had discovered a breach in January that affected as many as 11.2 million subscribers, as well as some individuals who do business with them. The breach compromised subscriber data including names, bir...

British mobile phone retailer exposes the personal information of over 3 million customers and 1,000 employees @ Carphone Warehouse and Dixons Carphone

One of the UK's biggest breaches in 2015. Details of almost 2.5 million customers was stolen in August, with almost 90,000 having encrypted credit card information stolen. The company said at the time it had been the victim of a sophisticated cyber a...

Over 50 million customer card details stolen at US retailer @ Home Depot, Inc.

In September 2014, the hardware and building supply retailing company announced that beginning in April or May that year its point of sale systems had been infected with malware. The company later said an investigation concluded that a “unique, custom...

User accounts accessed by attackers due to flaw in “view as” feature @ Facebook, Inc. and Meta Platforms, Inc.

In September 2018, the social media company admitted to a serious vulnerability (which was described as a flaw in Facebook’s “view as” feature) that allowed hackers to gain access to accounts and even third-party apps that used Facebook for login to g...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...