Advanced persistent threat that began with phishing email @ EMC Corporation and RSA Security LLC

In March 2011, the company disclosed that two separate hacker groups had worked in collaboration with a foreign government to launch a series of phishing attacks against employees, posing as people the employees trusted, to penetrate the company's net...

US government agency breach exposes 22 million employees' data @ US Office of Personnel Management

In March 2014, when this breach was disclosed it was considered the largest espionage coup of all time, one of the biggest ever on US government systems and possibly the single most damaging breach to US national security. The data theft consisted...

Electronic learning products company breaches children's data @ VTech

In 2015 this event constituted the fourth largest consumer data breach ever... In November 2015, the personal data on millions of parents and children was exposed after a hacker gained access to the server of the electronic toy manufacturing compan...

Software company hacked and 38 million accounts breached @ Adobe Systems Incorporated

In October 2013, the company reported that hackers had stolen nearly 3 million encrypted customer credit card records, plus login data for an unknown number of user accounts. Later the company said the attackers had accessed IDs and encrypted passwor...

'Malicious' data breach impacting customers' bank account details @ British Airways and International Airlines Group

In September 2018, the company disclosed that the personal and financial details of customers making or amending bookings had been compromised affecting about 380,000 transactions after hackers breached the company's website and mobile app during a tw...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...