Canadian telecommunications business bankrupted by cyber attack? @ Nortel Networks Corporation

The spiral of decline at Nortel Networks leading ultimately to its bankruptcy in 2013 is now believed to have been directly caused by a decade-long cyber attack. Investigations have pointed to a state-sponsored attack resulting in intellectual prop...

CEO scam attack results in large financial loss @ Ubiquiti Networks Inc.

In August 2015, the US networking firm disclosed that cyber attackers stole USD $46.7 million using a business email compromise attack in which attackers pretend to be executives at the victim company to initiate unauthorised international wire transf...

Data breach exposes customer credit card data @ Arby's Restaurant Group Inc. and Inspire Brands, Inc.

In February 2017 the company confirmed they had suffered a data breach that may have affected 355,000 credit and debit cards used at its stores. Malware in the chain's cashier systems between October 2016 and January 2017 allowed the unauthorized a...

US bank data breach compromises customer information for 82 million accounts @ Chase Bank and JPMorgan Chase & Co.

In 2014, this attack was said to impact two-thirds of all US households making this one of the largest breaches in history at that time. The cyber attack exposed information relating to 82 million household and business accounts and included person...

Keyloggers discovered on enterprise information technology company's products @ Hewlett Packard Enterprise Company

In May 2017, a Swiss security firm discovered that more than two dozen “HP laptop models were recording users’ keystrokes”. The keylogging software was in the PC’s audio driver existing since at least 2015. The driver was supposed to be alerted w...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...