150 players directly attacked via credential stuffing and 10.5 million players told to change their passwords @ Camelot Group and National Lottery

In November 2016, the company disclosed that they had suffered a credential stuffing attack on their platform and that 26,500 users' accounts could have been exposed to hackers. 10.5 million players were told to change their passwords in response to t...

Data breach exposes 3.5 million users @ US Postal Service

In November 2014, the postal service disclosed that they had suffered a data breach affecting 800,000 employees and 2.9 million customers. The service discovered the breach in mid-September but didn’t publicly announce it until early November. Unf...

Aluminium producer suffers extensive cyber attack @ Norsk Hydro ASA

In March 2019, the aluminium producer was forced to shut down its plants and worldwide network after a ransomware attack led to computers in the company’s global network locking simultaneously. The malware issued a ransom note stating that files had b...

Theft of detailed credit card information belonging to customers @ Burgerville

In October 2018, the company reported that its computer network had been compromised by malware during September 2017 which gave attackers access to the company’s data until the breach was closed in September 2018. The breached data included customers...

2015 data breach involving c.3 million Italian clients @ UniCredit SpA

In October 2019, the Italian banking group disclosed that their cyber security team had identified a data breach of approximately 3 million Italian customer records after a single, compromised file dating back to 2015 was exposed to unauthorised parti...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...