57 million individuals' data stolen and technology company held to ransom @ Uber Technologies Inc.

In November 2017, the company's (new) CEO Dara Khosrowshahi disclosed a cyber attack suffered in October 2016 which breached the personal information of 57 million customers and drivers saying "none of this should have happened, and I will not make ex...

143 million customer records stolen at credit reference agency @ Equifax Inc.

In September 2017, one of the big three credit reference agencies disclosed they had suffered a data breach which exposed personally identifiable information for 143 million US customers along with other customers around the world. The attackers expl...

Credit card numbers, bank account information, medical information and other personal data of 11.9 million people was potentially exposed @ Quest Diagnostics Incorporated

In June 2019, one of the world’s leading medical diagnostic companies reported that its collection provider's payment page was breached for eight months and that nearly 12 million customers' medical and financial records were exposed. Patients tr...

Data breach affected millions over 10 months @ Wawa, Inc.

In December 2019, the company disclosed the discovery of malware on their payment processing servers affecting likely all of its locations. The company immediately engaged an external forensics firm and notified law enforcement (which was publicly dec...

Regulator reporting tool hacked possibly for insider trading purposes @ US Securities and Exchange Commission

In September 2017, the top US markets regulator disclosed that hackers had infiltrated its database that stores company financial filings which potentially allowed hackers to trade on inside information. The hackers exploited a software vulnerability...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...