Unauthorised access to systems leads to data breach at Anglo-South African financial services company @ Old Mutual plc

In May 2017, the company disclosed that unauthorised access had led to a data breach for a "relatively small" number of customers in South Africa but stressed that no transactional details, credit card information, banking details, medical information...

Ransomware attack hits healthcare centre but leaves minimal impact @ Allied Physicians Of Michiana, LLC

In May 2018, the healthcare company disclosed that they had suffered a ransomware attack in which the SamSam variant was used. The Company stated it was able to restore its data in a "secure format without any significant disruption" of its services ...

Unauthorized person gained access to an employee’s email account exposing 2,290 customers' data @ Harbor Behavioral Health

In May 2019, the company disclosed a data breach of clients' information after an unauthorized individual gained access to employees' email accounts between December 2018 and March 2019. The exposed information included client names, dates of birt...

Social security numbers accessed ten years before discovery @ Yale University

The university disclosed that in June 2018 whilst testing its servers for vulnerabilities it discovered a log that revealed an intrusion between April 2008 and January 2009. Intruders had gained access to a database stored on one of the university's s...

Phishing results in exposure of patients' data @ Black River Medical Center

The Medical Center became aware in April 2018 of a potential data breach where an employee’s email account was compromised as the result of a phishing attack by an unknown, unauthorized third party. This may have resulted in the exposure of 13,443 pat...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...