Australian car sharing service defrauded and customer data exposed to hacker @ CarShare Australia Pty Ltd. and GoGet CarShare

As more goods and services become facilitated through internet-enabled devices, security at a distance whilst maintaining optimal levels of customer service becomes part of the challenge. In June 2017, a malicious third party accessed the company'...

Attackers target entertainment company to bend the company to their will @ Sony Group Corp.

Throughout November and December 2014, the company suffered a series of cyber attacks disabling their computer systems, releasing heretofore unreleased films on file-sharing hubs and revealing employees' personal information and data such as employee ...

Adultery site hacked 37 million user details exposed @ Ashley Madison Agency and 2 more...

In July 2015, a cyber attacker group called Impact Team stole the controversial dating site's user database by identifying weaknesses in password encryption and used these to crack the bcrypt-hashed passwords to gain access. The attackers tried to...

Two breaches at hotel group exposes data of 360000 customers @ Hilton Domestic Operating Company, Inc. and 2 more...

In 2015, it was disclosed that the global hotel chain had become the victim of an attack that infiltrated its POS terminals giving hackers access to 360000 customers' credit card information including cardholder names and card numbers, security codes ...

Payment card breach at US food company after temporary security intrusion @ Pizza Hut

In October 2017, 60,000 customers who placed orders on the company's website or mobile app in early October 2017 were affected by the hack which resulted in their data being stolen. The company said it believed only 1% of people who placed orders at ...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...