Payment card data exposed at hotel group @ InterContinental Hotels & Resort

In February 2017, the hotel group announced a data breach affecting 12 of its properties. Malware was found on servers which processed payments made at on-site restaurants and bars. Stolen data included cardholder names, card numbers, expiration dates...

Unauthorized party accessed company's data housed in a supplier's server exposing information of 15 million customers @ Experian plc and 2 more...

Around 15 million people who applied for wireless service in the prior 3 years had their private information breached exposing names, addresses, birth dates and social security numbers through a security gap in one of the suppliers' subsidiaries. A...

Large-scale data breach affects 218 million gamers @ Zynga Inc.

In September 2019, the mobile game producer announced that a hacker had accessed account log-in information for its users. In addition to the log-in credentials, the hacker accessed usernames, email addresses, log-in IDs, some Facebook IDs, some phone...

Attack by Russian cyber espionage group @ World Anti-Doping Agency

In September 2016, the agency disclosed that a Russian cyber espionage group had illegally gained access to their Administration and Management System database via an International Olympic Committee account created for the Rio 2016 Games. That access ...

"Advanced cyber actor" took advantage of vulnerability allowing malware to penetrate phones using the app's voice calling function @ WhatsApp Messenger

In May 2019, the company warned its users that a vulnerability in its service could have left its 1.5 billion users exposed to hackers. Attackers placed malicious code on users' devices simply by making a call. The malware spread to 1,400 mobile phone...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...