Malware and ransom cyber attack at utility company @ The Lansing Board of Water and Light

US utility company falls victim to a ransomware attack which initially costs the business just $25k. However, improving its control environment and implementing new security infrastructure ends up costing the business over $2 million. The event act...

Identity manager suffers data breach @ OneLogin, Inc.

Somewhat ironically a company offering to protect individual’s identities online exposes their encrypted customer’s identities online and the ability to decrypt them. Given their company's mission and product's intention, this had the potential to ...

UK car rescue company accused of 'cover up' following a data breach @ AA plc and Automobile Association plc

After suffering a data exposure of at least 13GB of customer information covering 117,000 accounts the actions of one of the UK’s largest motoring associations provides a great insight into the importance of incident response. An initial incorrect ...

145 million users exposed by phishing aimed at employees of online marketplace @ eBay Inc.

In 2014, this event was one of the biggest hacks. The online auction giant disclosed the attack in May 2014 stating that it exposed names, addresses, dates of birth and encrypted passwords of 145 million users. Financial information which was stored...

Big four accounting firm suffers client data exposure @ Deloitte Touche Tohmatsu Limited

In September 2017, one of the big four global accountancy firms and also one of the biggest names in cyber security consulting (Gartner’s security consultancy of the year in 2016) disclosed that they had been the victim of a cyber attack which comprom...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...