2,690 logins stolen in data breach @ The State University of New York at Buffalo

In May 2018, the university disclosed that 2,690 students, alumni and staff were compromised in a data breach. Those impacted had their login information stolen after visiting a third-party website not associated with the university. The univers...

Hackers place skimming device on website and customers suffer data breach @ Rail Europe North America and Rail Europe North America, Inc.

In April 2018, the overseas train travel company disclosed it had suffered a three-month data breach from November 2017 to mid-February 2018. The data breach was caused by hackers installing skimming software on the company's website. The hacker...

Dallas-based restaurant chain hacked and customer debit/credit card stolen @ Brinker International and Chili's Grill & Bar

In May 2018, the restaurant company disclosed a data breach of customers’ credit and debit cards. The breach was believed to have been caused by hackers installing malware on their systems to access guests’ payment card information. The company sa...

Employee's email account compromised exposing sensitive patient information @ The Oregon Clinic

In April 2018, the clinic disclosed that an unauthorised party had accessed an employee's email account and gained unauthorised access to patient information. The exposed information included names, dates of birth and certain medical information (...

Child tracker outfit admits data breach but starts row with security researcher who discovered it @ uKnow.com, Inc and uKnowKids

In Feburary 2016, the social media monitoring service company disclosed a data breach after unauthorized access to one of their databases containing "customer data, business data, trade secrets and proprietary algorithms" over the course of 26 hours o...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...