Phishing results in exposure of patients' data @ Black River Medical Center

The Medical Center became aware in April 2018 of a potential data breach where an employee’s email account was compromised as the result of a phishing attack by an unknown, unauthorized third party. This may have resulted in the exposure of 13,443 pat...

Malware targeting their point-of-service (POS) systems @ Catch Hospitality Group

In November 2019, the company disclosed that malware had been discovered on some of their point-of-sale devices at some locations. The malware searched for track data (which sometimes has the cardholder name in addition to card number, expiration dat...

Unauthorized activity in system used to process payments @ Cajun Operating Company and Church's Chicken

In November 2019, the company disclosed that it had suffered a cyber attack where an attacker breached the payment processing system at some of the chain’s corporate locations compromising payment card information (exposing payment card numbers, names...

Targeted cyber-attack aimed at stealing "technological know-how and research" @ Thyssenkrupp AG

In December 2016, the company disclosed that they had been the "target of a massive cyber attack" which resulted in technical trade secrets being stolen. The attack was discovered by their in-house security team in April and had been ongoing since Feb...

Ransomware attack temporarily blocked staff from accessing systems @ St John Ambulance

In July 2019, the service disclosed that they had suffered a ransomware attack earlier that week. The service experienced temporary disruption as infected systems were not accessible and data given by customers who had booked a place on training cours...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...