Ransomware attack, all systems taken down @ Maastricht University

In December 2019 just before Christmas, the university was subjected to a ransomware attack which affected 16% of its servers (267 of 1647). The attack appeared to focus on encrypting Windows data and it also affected back-ups. The university pai...

Customer credit/debit card details stolen @ Target Corporation

Attackers targeted the major US retailer via a phishing campaign on one of its third-party vendors. The vendor downloaded a file containing a virus which was designed to collect all of the data entered within the system. From here the attackers were a...

Large-scale cyber attack disrupts healthcare provision @ National Health Service

The UK’s public health system was put under considerable strain on 12th May 2017 when thousands of its computers were infected by the WannaCry ransomware virus. Patient data was kept hostage and many hospitals were only accepting emergency cases. ...

11.2 million subscribers' data exposed at US healthcare company @ Premera BlueCross BlueShield

In March 2015, the healthcare provider revealed it had discovered a breach in January that affected as many as 11.2 million subscribers, as well as some individuals who do business with them. The breach compromised subscriber data including names, bir...

British mobile phone retailer exposes the personal information of over 3 million customers and 1,000 employees @ Carphone Warehouse and Dixons Carphone

One of the UK's biggest breaches in 2015. Details of almost 2.5 million customers was stolen in August, with almost 90,000 having encrypted credit card information stolen. The company said at the time it had been the victim of a sophisticated cyber a...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...