Customers' personal and financial information stolen after attack on company's e-commerce platform @ Fitness Depot

In June 2020, the company disclosed that attackers had stolen their customers' personal and financial information following a breach their e-commerce platform. In the notification letter to customers the company explained that their Internet Serv...

2.4 million users' details were exposed online for 22 days @ Wyze Labs, Inc.

In December 2019, an employee error at the Seattle smart security camera maker resulted in 2.4 million customers having their information exposed to the public. In February 2020 it was reported that a lawsuit has been filed alleging the company was...

Data breach exposes 18 million users' information @ Automattic and WordPress Foundation

In April 2011, the company disclosed a data breach affecting 18,000,000 users where attackers accessed data on several of the company’s servers exposing source code, API security keys and social media passwords. As part of their incident response, ...

Cyber attack via phishing which resulted in the theft of personal data @ Australian Catholic University

In June 2019, the university disclosed a data breach following a phishing attack in May where "an email pretending to be from ACU [tricked] users into clicking on a link or opening an attachment and then entering credentials into a fake ACU login page...

Hacker stole and sold user data on dark web @ Evite

In May 2019, the company confirmed a data breach that was first reported in April when an attacker began selling data from breached companies including theirs. The intrusion occurred in February and involved an "inactive data storage file" that contai...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...