Identity manager suffers data breach @ OneLogin, Inc.

Somewhat ironically a company offering to protect individual’s identities online exposes their encrypted customer’s identities online and the ability to decrypt them. Given their company's mission and product's intention, this had the potential to ...

UK car rescue company accused of 'cover up' following a data breach @ AA plc and Automobile Association plc

After suffering a data exposure of at least 13GB of customer information covering 117,000 accounts the actions of one of the UK’s largest motoring associations provides a great insight into the importance of incident response. An initial incorrect ...

145 million users exposed by phishing aimed at employees of online marketplace @ eBay Inc.

In 2014, this event was one of the biggest hacks. The online auction giant disclosed the attack in May 2014 stating that it exposed names, addresses, dates of birth and encrypted passwords of 145 million users. Financial information which was stored...

Big four accounting firm suffers client data exposure @ Deloitte Touche Tohmatsu Limited

In September 2017, one of the big four global accountancy firms and also one of the biggest names in cyber security consulting (Gartner’s security consultancy of the year in 2016) disclosed that they had been the victim of a cyber attack which comprom...

1.1 million customer credit card details stolen from US retailer @ Neiman Marcus

In January 2014, the retail company disclosed they had suffered a breach where hackers accessed the debit and credit card information of customers who shopped between 16th July to 30th October 2013. The breach occurred when malicious software was inst...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...