Hackers stole over 43 million accounts in 2012 breach @ Last.fm

In June 2012, the company disclosed a data breach of their customers' information using several communication channels including social media, emailing customers directly as well as posting a statement to the company's website. Their statement explai...

Data breach at trade association in California @ California Association of Realtors and 2 more...

In July 2017, the company announced its subsidiary was the victim of a data breach, the subsidiary organization’s online payment system was infected with malware that was active for two months from March to May 2017. When a user made a payment on ...

Attackers hijacked a bank’s online presence @ Banrisul

Important to state upfront, it's not completely clear whether this event actually happened or whether this was a description of a plausible scenario from security researchers, Kaspersky Lab. Kaspersky described "an unprecedented case of wholesale ban...

Customers told to reset passwords after hacker taunts @ Domainfactory GmbH

In July 2018, the company discovered that third parties had unauthorized access to customer data after the unknown attacker posted a breach note on the company's support forum. The exposed data included customer names, company names, customer numb...

Data breach suffered due to website being compromised by malicious scripts designed to steal customer's payment information @ Macy's and Macy's Inc.

Described at the time as "a game-changing Magecart attack", in November 2019, the retail company disclosed a data breach affecting a small number of customers who had their data stolen from its website during a one-week period in October. The com...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...