Mortgage industry insider steals and sells records of 2.5 million customers @ Bank of America and 2 more...

At one point the biggest data theft by a financial insider, this employee entered company offices each Sunday for at least two years and copied 20,000 customer records each time using the only company computer that still had the USB port enabled. ...

Data breach affects 245,000 UK customers @ Wonga.com

According to cybersecurity experts this was one of the biggest data breaches in the UK involving financial information. Though little has been publicly disclosed about the attack itself and the attacker(s), the attack evidenced the need to change t...

Cyber attack attempts to steal USD 171 million @ Union Bank of India

Attackers distributed fifteen emails to bank employees which appeared to originate from a reputable source. Just one employee clicked on the attachment but that was sufficient for the hackers to to transfer USD $171 million from the bank. Initially...

Unknown attacker breaches customer records at US investment advisor @ R.T. Jones Capital Equities Management, Inc.

The Security Exchange Commission’s first ever enforcement action in the cybersecurity arena was filed against this investment advisor in September 2015 for failing to establish the required cybersecurity policies and procedures in advance of a breach ...

Malware and ransom cyber attack at utility company @ The Lansing Board of Water and Light

US utility company falls victim to a ransomware attack which initially costs the business just $25k. However, improving its control environment and implementing new security infrastructure ends up costing the business over $2 million. The event act...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...