Malware was the cause of computer problems in cyber attack @ City of Lawton

In August 2017, the city's entire network was shut-down due to a malware infection impacting more than 500 computers. Meaning employees couldn't access their emails or use the internet and residents couldn't pay their bills and fines online. City...

2.2 million patients of US cancer treatment centre suffer data breach @ 21st Century Oncology of Fort Myers

In March 2015, the US cancer care provider announced that a data breach had exposed 2.2 million patients' data based across all 50 states and internationally. The company said that hackers broke into a company database in October 2014 and accessed...

150 players directly attacked via credential stuffing and 10.5 million players told to change their passwords @ Camelot Group and National Lottery

In November 2016, the company disclosed that they had suffered a credential stuffing attack on their platform and that 26,500 users' accounts could have been exposed to hackers. 10.5 million players were told to change their passwords in response to t...

Data breach exposes 3.5 million users @ US Postal Service

In November 2014, the postal service disclosed that they had suffered a data breach affecting 800,000 employees and 2.9 million customers. The service discovered the breach in mid-September but didn’t publicly announce it until early November. Unf...

Aluminium producer suffers extensive cyber attack @ Norsk Hydro ASA

In March 2019, the aluminium producer was forced to shut down its plants and worldwide network after a ransomware attack led to computers in the company’s global network locking simultaneously. The malware issued a ransom note stating that files had b...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...