Over 50 million customer card details stolen at US retailer @ Home Depot, Inc.

In September 2014, the hardware and building supply retailing company announced that beginning in April or May that year its point of sale systems had been infected with malware. The company later said an investigation concluded that a “unique, custom...

User accounts accessed by attackers due to flaw in “view as” feature @ Facebook, Inc. and Meta Platforms, Inc.

In September 2018, the social media company admitted to a serious vulnerability (which was described as a flaw in Facebook’s “view as” feature) that allowed hackers to gain access to accounts and even third-party apps that used Facebook for login to g...

Data breach affecting 685,000 users on Singaporean forum site @ HardwareZone and Singapore Press Holdings Magazines

In February 2018, this was Singapore's largest data breach which affected 685,000 users after a senior moderator's credentials were compromised at the forum site. The company disclosed that unauthorised parties accessed names, email addresses and u...

Customer data stolen at 33 restaurants across US @ P.F. Chang's China Bistro, Inc.

The restaurant chain suffered a huge data breach in 2013 and 2014 that compromised customer payment information. Criminals managed to hack the company's point of sale machines and steal credit and debit card data. The company responded by going lo...

Phishing attacks seeking W2 data @ Seagate Technology PLC

In March 2016, the data storage company had been breached of all of its W-2 tax documents including social security numbers, salaries and other data on all current and past employees. The breach was the result of a successful phishing scam, where "an ...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...