Customer records illegitimately accessed at online homeloan broker @ LendingTree

In January 2008, it was disclosed that an employee at this financial company conspired with third parties to provide both customer and administrator access credentials to their IT systems. This permitted the third parties to access confidential custom...

Support site malware causes data breach @ Inbenta Technologies Inc. and 2 more...

In June 2018, the company disclosed that hackers gained access to its customers' personal details and credit card information. The breach is believed to have affected up to 40,000 individuals who purchased tickets from September 2017 to June 2018. ...

19,500 student's unsecured information uploaded onto a microsite which was subsequently hacked and leaked online @ University of Greenwich

In May 2018, the university disclosed that it had been fined by the UK Information Commissioner for a data breach involving 19,500 people in what was believed to have been the first fine issued to a university under the Data Protection Act 1998 after ...

Malware was the cause of computer problems in cyber attack @ City of Lawton

In August 2017, the city's entire network was shut-down due to a malware infection impacting more than 500 computers. Meaning employees couldn't access their emails or use the internet and residents couldn't pay their bills and fines online. City...

2.2 million patients of US cancer treatment centre suffer data breach @ 21st Century Oncology of Fort Myers

In March 2015, the US cancer care provider announced that a data breach had exposed 2.2 million patients' data based across all 50 states and internationally. The company said that hackers broke into a company database in October 2014 and accessed...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...