Vulnerability across company's systems exploited by malware 'Wannacry' @ Microsoft Corporation

In May 2017, the ransomware targeted businesses in more than 150 countries who were running outdated Windows software and locked down their systems. The hackers behind the attack demanded money to unlock files. More than 300,000 machines were hit...

Unauthorised access 'non-core' system results in phishing @ DocuSign.com

In May 2017, customers of the electronic signature provider were targeted by malware phishing attacks. The company said that hackers breached one of its systems, but they only obtained email addresses and no other personal information. The hackers...

Online gaming platform suffers ‘unauthorised access' to users' information @ Amazon.com, Inc. and Twitch

In March 2015, the game-sharing services provider disclosed that they had suffered a data breach of user information. No details were provided as to what was exposed or how may users were impacted. The company reset all user passwords and request...

123 million US household's data exposed by data analytics company @ Alteryx and Experian plc

In December 2017, the data analytics firm was discovered to be inadequately protecting the personal information of over 120 million American households. The company had purchased this data from a credit reporting agency and stored the data in an open ...

'IT specialist' sub-contractor steals 2 million customer records from telecommunications company @ Vodafone Germany and Vodafone Group Plc.

Described as one of the largest cases of personal data thefts for German customers. In 2013, an insider threat materialised at Germany's second largest telecommunications company affecting 2 million customers. Criminal proceedings followed but ...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...