Popular fitness tracking app suffers unauthorized access that exposed 150 million users @ MyFitnessPal and Under Armour, Inc.

One of the largest cyberattacks on record. According to USA Today, it is the 4th-biggest reported data breach of all time, after two separate Yahoo! hacks in 2016 and the May 2016 MySpace hack. Narrowly beating Equifax from September 2017 and eBay fro...

Data breach exposed 880,000 payment cards @ Orbitz.com

In March 2018, the travel search engine disclosed that 880,000 customers who made purchases in 2016 and 2017 may have been affected by a recently discovered data breach. A hacker had used a legacy website to gain access to payment-card and other per...

Personal information of social media giant's users was 'misused' by customer @ Cambridge Analytica and 2 more...

In March 2018, it was disclosed that over 50 million users of the social media company had their personal information compromised by a third party, Global Science Research, who had legitimate access to the data for academic purposes but they passed th...

Data breach where staff and student records were stolen @ Blackbaud Inc. and University of York

In July 2020, the university disclosed that they had launched an investigation after a ransomware attack occurred in May 2020 at the third party provider of their customer relationship management system. Personal details of students, staff and alumni ...

20 years of data stolen from online from internet hook-up destination @ Adultfriendfinder.com and 5 more...

Considered the biggest hack of 2016. The adult-themed social network was breached in October 2016 and hackers were able to collect 20 years of data on six breached databases. The breached information included names, email addresses and passwor...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...