Oxygen supply device maker suffers improper access of personal details of 30,000 existing and former customers and potential non-public company information @ Inogen Inc

In April 2018 the company disclosed a data breach affecting 30,000 current and former customers that lasted from January to March 2018. The breach was caused by a hacker gaining unauthorized access to an employee’s email account through a phishing sca...

Oldest men's clothier in the US experiences year-long data breach @ Brooks Brothers

In May 2017, the retail company revealed a breach that affected some of their stores for 11 months between April 2016 and March 2017. The investigation showed an unauthorized individual installed malicious software on some payment processing syst...

Plastic surgery clinic in London is hacked @ London Bridge Plastic Surgery

In October 2017, a group calling itself The Dark Overlord stole extremely sensitive personal data from a London cosmetic clinic. The hacker group said clients extended to the royal family along with celebrities, such as Katie Price. A representative...

Vehicle locating service provider exposed over 500k customer's personal information due to misconfigured cloud server @ Positioning Universal Inc. and SVR Tracking LLC

In September 2017, the company that gives auto dealerships and lot owners the ability to locate and recover vehicles, allowed more than half a million customer records to be leaked online via an unsecured Amazon S3 bucket. It is unknown how long t...

Mobile phone hacking services company hacked resulting in 900 GB of company data stolen @ Cellebrite and 2 more...

External web server hacked and 900GB of customer information and technical product data was taken from the company which creates a device that rips personal data from mobile phones which is reportedly popular with government officials and law enforcem...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...