Major ‘security breach’ that could expose users’ personal data @ reddit Inc.

In June 2018, the social media platform announced that it had suffered an attack on its SMS-based two-factor authentication system which the company admitted was "not nearly as secure as we would hope". Hacker were able to access a huge cache of data...

Cyber bank robbery at British bank @ Tesco Bank and 2 more...

As the English saying goes, remember, remember the 5th of November! Tesco bank will, that's the date they experienced Britain's first cyber bank robbery. Customer funds were stolen by a group who were able to organise the theft from thousands of a...

3 billion accounts hacked at internet company @ Altaba Inc. and Yahoo Inc.

In July 2016, the company disclosed the event stating that the 2013 attack on its network had affected one billion accounts. It was described as the biggest known breach of a company’s computer network. In October 2017, Yahoo's new owner Verizon dis...

Advanced persistent threat that began with phishing email @ EMC Corporation and RSA Security LLC

In March 2011, the company disclosed that two separate hacker groups had worked in collaboration with a foreign government to launch a series of phishing attacks against employees, posing as people the employees trusted, to penetrate the company's net...

US government agency breach exposes 22 million employees' data @ US Office of Personnel Management

In March 2014, when this breach was disclosed it was considered the largest espionage coup of all time, one of the biggest ever on US government systems and possibly the single most damaging breach to US national security. The data theft consisted...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...