Possible data breach leaves c.30,000 utility customers vulnerable @ City of Goodyear and Superion

In May 2018, the city disclosed a data breach affecting approximately 30,000 individuals. The city discovered the issue within its billing system after a customer informed them of fraudulent activity on their bank account. City officials took t...

Unauthorized copy of database containing sensitive information in the possession of former employee @ US Department of Homeland Security

Further evidence that cybersecurity is hard especially when it comes to insider threats and even for those you might reasonably have expected to be on top of it! In January 2018, the US department confirmed that 247,167 employees as well as witness...

Oldest men's clothier in the US experiences year-long data breach @ Brooks Brothers

In May 2017, the retail company revealed a breach that affected some of their stores for 11 months between April 2016 and March 2017. The investigation showed an unauthorized individual installed malicious software on some payment processing syst...

Plastic surgery clinic in London is hacked @ London Bridge Plastic Surgery

In October 2017, a group calling itself The Dark Overlord stole extremely sensitive personal data from a London cosmetic clinic. The hacker group said clients extended to the royal family along with celebrities, such as Katie Price. A representative...

Vehicle locating service provider exposed over 500k customer's personal information due to misconfigured cloud server @ Positioning Universal Inc. and SVR Tracking LLC

In September 2017, the company that gives auto dealerships and lot owners the ability to locate and recover vehicles, allowed more than half a million customer records to be leaked online via an unsecured Amazon S3 bucket. It is unknown how long t...

Let us do the analysis so you can make the decisions

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...