2.2 million patients of US cancer treatment centre suffer data breach @ 21st Century Oncology of Fort Myers

In March 2015, the US cancer care provider announced that a data breach had exposed 2.2 million patients' data based across all 50 states and internationally. The company said that hackers broke into a company database in October 2014 and accessed...

150 players directly attacked via credential stuffing and 10.5 million players told to change their passwords @ Camelot Group and National Lottery

In November 2016, the company disclosed that they had suffered a credential stuffing attack on their platform and that 26,500 users' accounts could have been exposed to hackers. 10.5 million players were told to change their passwords in response to t...

Data breach exposes 3.5 million users @ US Postal Service

In November 2014, the postal service disclosed that they had suffered a data breach affecting 800,000 employees and 2.9 million customers. The service discovered the breach in mid-September but didn’t publicly announce it until early November. Unf...

Aluminium producer suffers extensive cyber attack @ Norsk Hydro ASA

In March 2019, the aluminium producer was forced to shut down its plants and worldwide network after a ransomware attack led to computers in the company’s global network locking simultaneously. The malware issued a ransom note stating that files had b...

Theft of detailed credit card information belonging to customers @ Burgerville

In October 2018, the company reported that its computer network had been compromised by malware during September 2017 which gave attackers access to the company’s data until the breach was closed in September 2018. The breached data included customers...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...