33 million records from government departments and large corporate clients exposed by business services company @ Dun & Bradstreet, Inc. and NetProspex

In March 2017, the giant business services company discovered its marketing database containing over 33 million corporate contacts shared across the web. The contacts that had information leaked were from organizations like the US Department of De...

Free online registry cleaning software infected by malware @ CCleaner and Piriform Ltd

In September 2017, security researchers discovered malicious code inside the company's product. The malware was designed to steal personal data from infected machines. All in all around two million people were believed to have been affected by th...

Food ordering website suffers data breach of 17 million customers email addresses and hashed passwords @ Zomato

In May 2017, the company disclosed a data breach that resulted in about 17 million user records being stolen from their database. Reports described the breach as the "sixth biggest in [the] first half of 2017". The exposed information included use...

Cryptojacking script found in live help widget impacting 1,500 Sites @ LiveHelpNow

Further evidence that security is a round-the-clock affair. On the eve of thankgsiving holiday in the US, a security researcher discovered the source of a huge cryptojacking campaign after analyzing the code of hundreds of websites. In November 20...

Hackers stole over 43 million accounts in 2012 breach @ Last.fm

In June 2012, the company disclosed a data breach of their customers' information using several communication channels including social media, emailing customers directly as well as posting a statement to the company's website. Their statement explai...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...