Data breach involving third-party analytics vendor exposes customer data @ Circle Internet Services, Inc.

In August 2019, the company informed its customers that some of their information may have been exposed through a third-party analytics vendor warning them to review their repo and branch names. Customer email addresses were exposed. Other potenti...

Ransomware forces 3 hospitals to turn away all but the most critical patients @ DCH Health System and 3 more...

In October 2019, the healthcare provider was forced to turn away all but the most critical patients from its three hospitals in response to its computer network being rendered unusable by a ransomware attack. The Alabama-based company confirmed it ...

Unauthorized access of internal systems results in data breach @ Flipboard, Inc.

In April 2019, the content aggregation app announced it had discovered unauthorized access to databases containing user information. Those databases contained names, usernames, email addresses and cryptographically-protected passwords. It is not know...

Houston-based seafood and steak chain suffers data breach @ Truluck's Restaurant Group, Ltd and Truluck’s Seafood, Steak & Crab House

In February 2019, the restaurant company disclosed that an unauthorized actor had inserted malware onto the point of sale systems at eight of their restaurants capturing customer's payment card information used for purchases (credit or debit card numb...

Unauthorized access of employee email accounts @ T-Mobile and T-Mobile US, Inc.

In March 2020, the company disclosed a security incident which they described as a 'malicious attack' against their email vendor and led to unauthorized access to certain employee email accounts which contained customer and employee information. T...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...