Malware was the cause of computer problems in cyber attack @ City of Lawton

In August 2017, the city's entire network was shut-down due to a malware infection impacting more than 500 computers. Meaning employees couldn't access their emails or use the internet and residents couldn't pay their bills and fines online. City...

Hackers accessed computers with sensitive records of 4.5 million people @ The University of California, Los Angeles and UCLA

In July 2015, the university disclosed that an attacker had accessed parts of their network that contained the personal information of 4.5 million individuals. At that time it was the fourth-biggest healthcare data breach of all time. There were "ind...

2.2 million patients of US cancer treatment centre suffer data breach @ 21st Century Oncology of Fort Myers

In March 2015, the US cancer care provider announced that a data breach had exposed 2.2 million patients' data based across all 50 states and internationally. The company said that hackers broke into a company database in October 2014 and accessed...

150 players directly attacked via credential stuffing and 10.5 million players told to change their passwords @ Camelot Group and National Lottery

In November 2016, the company disclosed that they had suffered a credential stuffing attack on their platform and that 26,500 users' accounts could have been exposed to hackers. 10.5 million players were told to change their passwords in response to t...

Data breach exposes 3.5 million users @ U.S. Postal Service

In November 2014, the postal service disclosed that they had suffered a data breach affecting 800,000 employees and 2.9 million customers. The service discovered the breach in mid-September but didn’t publicly announce it until early November. Unf...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as bad actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...