Food ordering website suffers data breach of 17 million customers email addresses and hashed passwords @ Zomato

In May 2017, the company disclosed a data breach that resulted in about 17 million user records being stolen from their database. Reports described the breach as the "sixth biggest in [the] first half of 2017". The exposed information included use...

Cryptojacking script found in live help widget impacting 1,500 Sites @ LiveHelpNow

Further evidence that security is a round-the-clock affair. On the eve of thankgsiving holiday in the US, a security researcher discovered the source of a huge cryptojacking campaign after analyzing the code of hundreds of websites. In November 20...

Hackers stole over 43 million accounts in 2012 breach @ Last.fm

In June 2012, the company disclosed a data breach of their customers' information using several communication channels including social media, emailing customers directly as well as posting a statement to the company's website. Their statement explai...

Data breach at trade association in California @ California Association of Realtors and 2 more...

In July 2017, the company announced its subsidiary was the victim of a data breach, the subsidiary organization’s online payment system was infected with malware that was active for two months from March to May 2017. When a user made a payment on ...

Attackers hijacked a bank’s online presence @ Banrisul

Important to state upfront, it's not completely clear whether this event actually happened or whether this was a description of a plausible scenario from security researchers, Kaspersky Lab. Kaspersky described "an unprecedented case of wholesale ban...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...