Free online registry cleaning software infected by malware @ CCleaner and Piriform Ltd

In September 2017, security researchers discovered malicious code inside the company's product. The malware was designed to steal personal data from infected machines. All in all around two million people were believed to have been affected by th...

Company providing information security services 'bug' leaks company data online @ Cloudflare, Inc.

The company disclosed in February 2017 that “1 in every 3.3 million requests could have been leaked”, the exposed information was said to have included personally identifiable information, passwords, encryption keys, HTTP POST bodies, HTTP cookies and...

2 million customers' phone and credit card details leaked @ CeX Ltd

In August 2017, the second-hand electronics retailer suffered a data breach and notified 2 million registered customers that their information might have been compromised. Personal information including names, addresses, email addresses and phone ...

Data breach at trade association in California @ California Association of Realtors and 3 more...

In July 2017, the company announced its subsidiary was the victim of a data breach, the subsidiary organization’s online payment system was infected with malware that was active for two months from March to May 2017. When a user made a payment on ...

134,512 patient records accessed by hackers at US healthcare company @ St. Peter’s Surgery & Endoscopy Center

The second-largest healthcare breach of 2018 and the largest breach to hit New York state since the breach of more than 3.4 million records in 2016. In January 2018, the hospital reported that it discovered a data breach of 134,512 individuals afte...

Browse visualisations from our proprietary data set

Sectors

Visualise cyber events by industry sector.

View

Net Costs

Visualise net costs by industry sector.

View

Global Cyber Event Taxonomy

Visualise the key attributes we capture.

View

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...