Daily deals website hacked and the personal information of more than 50 million people compromised @ LivingSocial Inc.

In April 2013, the daily-deals website suffered a data breach after hackers successfully broke into its servers compromising 50 million customers' data. Exposed information included names, emails, birthdates and passwords. The company asked all of...

210200 customer accounts accessed in 'hack' involving employee's credentials at UK mobile operator @ 3 and 2 more...

In November 2016, the mobile networking company disclosed a breach of its phone upgrade database which was accessed using an employee login. The company insisted financial information was safe for 133,827 customers affected, but sensitive details ...

1.7 million emails and passwords breached in hack @ Imgur

In November 2017, the online image-sharing community received a notification about a possible data breach from 2014. Troy Hunt, the owner of the website Have I Been Pwned, reached out to the company's COO on 23rd November 2017 to inform him that he ha...

Foster parents' information breached in Maine (US) @ Maine Foster Care and Maine Office of Information Technology

In November 2017, residents in Maine receiving foster care were advised that their personal information had been exposed. During a system upgrade on 21st September 2017, a contractor hired by the Maine Office of Information Technology accidentally...

2 million customers' phone and credit card details leaked @ CeX Ltd

In August 2017, the second-hand electronics retailer suffered a data breach and notified 2 million registered customers that their information might have been compromised. Personal information including names, addresses, email addresses and phone ...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...