Prominent healthcare IT contractor suffers data breach affecting 45,000 patients @ Laguna Honda hospital and 3 more...

In May 2018, the healthcare company disclosed that 45,000 patient records were accessed by an unauthorized party. The cause of the breach has been identified as a former employee hacking into the company’s servers though it appears that none of the r...

US entertainment shows leaked in a "disruptive, unsettling, and disturbing" attack @ HBO and Home Box Office

Described at the time when the news initially broke as seven times worse than the Sony hack. In July 2017, hackers broke into the company's servers and stole 1.5 terabytes of data. While many people feared that the hackers might spoil Game of T...

Phishing email defrauds third-largest county in America of nearly $900k @ D&W Contractors, Inc. and 2 more...

Here cyber attackers sought to make a profit out of the devastation caused by Hurricane Harvey. In September 2017 when one third of the county was still submerged due to the effects of the hurricane, the attacker manipulated a county employee int...

Possible data breach leaves c.30,000 utility customers vulnerable @ City of Goodyear and Superion

In May 2018, the city disclosed a data breach affecting approximately 30,000 individuals. The city discovered the issue within its billing system after a customer informed them of fraudulent activity on their bank account. City officials took t...

Unauthorized copy of database containing sensitive information in the possession of former employee @ U.S. Department of Homeland Security

Further evidence that cybersecurity is hard especially when it comes to insider threats and even for those you might reasonably have expected to be on top of it! In January 2018, the US department confirmed that 247,167 employees as well as witness...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...