500 million accounts hack @ Altaba Inc. and Yahoo Inc.

In September 2016, the once dominant internet service company, while in negotiations with Verizon to purchase it, announced it had been the victim of the biggest data breach in history, likely by a state-sponsored actor in 2014. The attack compromise...

85 million accounts hacked at video sharing site @ dailymotion.com

In October 2016, the video streaming company had its user database stolen by an "unknown hacker through unknown means". In the attack 85 million usernames and email addresses were taken, of which 20% had passwords associated with these accounts (these...

10 million personal records exposed at health insurer in western New York @ Blue Cross Blue Shield Association and 2 more...

In September 2015, the health insurer disclosed that it had suffered a major attack on its networks resulting in a leak of more than 10 million patient's records. The attack had actually happened two years earlier in late December 2013. Personal data...

School officials pay hackers $1.14 million ransom To recover stolen data @ UCSF Medical School and University of California at San Francisco School of Medicine

In June 2020, the university disclosed that they had suffered a ransomware attack which encrypted a limited number of servers within the university's School of Medicine rendering them temporarily inaccessible. Since the university considered some ...

Health insurance attack exposes personal information of 80 million customers @ Anthem, Inc. and Blue Cross Blue Shield Association

In February 2015, the company disclosed it was hacked by unknown attackers who accessed 80 million records from people using their health plans. The attack began in February 2014 with a phishing attack when a user in a subsidiary opened a phishing em...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...