Payments giant investigating breach at gas stations @ Verifone Holdings Inc.

In January 2017, the card payments company experienced a breach of their internal systems limited to controllers and attempted attacks on some affiliated point-of-sale (POS) systems at approximately 24 gas stations. As reported by security researc...

US healthcare company suffers cyberattack affecting 16,000 patients @ UnityPoint Health

In April 2018, the company disclosed the data breach affecting up to 16,000 people. The breach was caused by hackers obtaining unauthorised access to several employees’ email accounts after successful phishing attacks, these accounts were believed to ...

Regulator reporting tool hacked possibly for insider trading purposes @ U.S. Securities and Exchange Commission

In September 2017, the top US markets regulator disclosed that hackers had infiltrated its database that stores company financial filings which potentially allowed hackers to trade on inside information. The hackers exploited a software vulnerability...

Personal information of customers exposed at US retailer @ Saks Fifth Avenue

In March 2017, news broke that the personal information of tens of thousands of customers was available in plain text via a specific link on the company's website. The information was visible on a page where customers could join a product waiting list...

Major leak of customer data at Indian telecommunications company @ Reliance Jio Infocomm Limited

Considered the largest breach of personal data in India when it was disclosed in June 2017. One of India’s largest mobile phone carrier companies suffered a data breach of 120 million customers. This information was then listed for sale online. T...

Browse visualisations from our proprietary data set

Sectors

Visualise cyber events by industry sector.

View

Net Costs

Visualise net costs by industry sector.

View

Global Cyber Event Taxonomy

Visualise the key attributes we capture.

View

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...