Employee sent colleague's confidential information to spouse @ The Boeing Company

In February 2017, the company disclosed a data breach after an employee sent their spouse a spreadsheet containing his colleague's personal information, he did so as he sought his wife's help with a formatting issue. The exposed information include...

Misconfigured cloud security exposes highly sensitive data @ Accenture PLC

In September 2017, a security researcher discovered hundreds of gigabytes of sensitive client and company data exposed when the consulting giant accidentally left four of its AWS S3 buckets open to the public. The unprotected information included ...

3.1 million customer items were impacted security breach @ Toyota Motor Corporation

In March 2019 the company disclosed that hackers had gained "unauthorized access to the network" and that customer data had been stolen from eight subsidiaries across Japan. Up to 3.1 million "items of customer information may have been leaked outside...

Over 600 customers affected in data breach @ NTT and The Nippon Telegraph and Telephone Corporation

In May 2020, the telecommunications company disclosed that it had suffered a cyber attack in which hackers compromised a cloud server located in its data center, before using it as a 'stepping stone' to attack another internal server and its Active Di...

Data security compromised resulting in recall of 3.2 million bank cards in India @ Hitachi Ltd and Hitachi Payments Services Private Limited

The company that claims to be "Your Ideal Payment Partner - We enable secured commerce for businesses!" reported in February 2017 that they had suffered a data breach. Confirming that, in mid-2016, malware hacked its servers and stole personal and ...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...