Mobile phone hacking services company hacked resulting in 900 GB of company data stolen @ Cellebrite and 2 more...

External web server hacked and 900GB of customer information and technical product data was taken from the company which creates a device that rips personal data from mobile phones which is reportedly popular with government officials and law enforcem...

Playlist site suffers data breach for 18 million accounts @ 8Track and 8tracks

The most popular internet radio service provider suffered a data breach compromising 18 million user accounts that were authenticated through Github. The exposed data included usernames, email addresses, and partially encrypted passwords. Accounts au...

Company successfully tackles the world’s largest DDoS attack in cyber history @ GitHub

In February 2018, the version-control hosting service company was hit with a massive denial of service attack, with 1.35 TB per second of traffic hitting the popular site. Security commentators found the sheer scale of the assault worrying. They als...

US Retailer exposes customer credit cards resulting in fraudulent usage @ Kmart Corporation and The Sears Holdings Corporation

In May 2017, the company confirmed that credit card information was stolen from shoppers who came into its stores. The store did not confirm how or when the data was stolen. In a Securities and Exchange Commission filing in early October, the comp...

Major email marketing organization accidentally exposes over billion people's data @ River City Media

Described at the time it was disclosed (March 2017) as the largest single data breach in history. In January 2017, the email marketing organisation discovered 1.34 billion records had been compromised. This data breach was discovered by the efforts...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...