Security breach compromised individuals' medical records, address and Social Security numbers @ Indiana University Health and IU Health

In November 2024, Indiana University Health (IU Health) experienced a security breach when an employee's email account was compromised between August 27 and October 2, 2024. IU Health was first alerted to the potential breach on November 8, 2024, and...

Unauthorised access exposed sensitive personal information @ Mortgage Investors Group

Mortgage Investors Group (MIG), a prominent mortgage lender in the southeastern United States, experienced a significant cybersecurity breach in December of the previous year. The incident, which commenced on December 11th and was detected the followi...

Data breach that compromised individuals' sensitive personal and protected health data @ Teton Orthopaedics

Teton Orthopaedics, a medical practice based in Jackson, Wyoming, experienced a ransomware attack that exposed the sensitive personal and protected health information of 13,409 individuals. The attack, executed by the ransomware group DragonForce, occ...

Data breach compromised thousands of individuals' sensitive personal data @ The Kendal Corporation

The Kendal Corporation (TKC) experienced a data breach that exposed sensitive personal information of numerous current and former employees, as well as individuals associated with its affiliated care communities. The breach occurred on June 26 and Jun...

Unauthorised access to management company’s computer systems @ HCF Management Inc.

In October 2024, HCF Management Inc., a healthcare organization that manages numerous long-term care facilities, discovered unusual activity on its computer network. An investigation revealed that an unauthorized party had accessed the network on Sept...

Suspicious activity disrupted access to certain computer systems @ DBM Global, Inc.

DBM Global, Inc., a steel fabrication and erection company, experienced a data breach around November 20, 2024. The company discovered suspicious activity within its computer systems and confirmed unauthorized third-party access to sensitive personal ...

Network breached through Ivanti VPN zero-day vulnerability @ Nominet

In January 2025, Nominet, the UK internet domain registry, experienced a cyber security breach. The unauthorized intrusion was made possible by exploiting a zero-day vulnerability in Nominet's Virtual Private Network (VPN) software, Ivanti Connect Se...

Scammers stole $721,976.26 by pretending to third party construction company @ City of Athens

In November 2024, the City of Athens, Ohio fell victim to a sophisticated phishing scam resulting in the loss of $721,976.26. The perpetrators impersonated Pepper Construction, a contractor working with the city, and submitted fraudulent bank transfer...

Data breach exposed location tracking operation @ Gravy Analytics Inc.

In January 2025, a significant data breach was reported at Gravy Analytics, a location data broker, exposing sensitive location data of millions of smartphone users. The breach involved unauthorized access to Gravy Analytics' Amazon Web Services (AWS)...

Threat actors breached Amazon S3 cloud storage to steal millions of guests' personal information and reservations @ Otelier

In late 2024, Otelier, a cloud-based hotel management platform used by over 10,000 hotels worldwide, experienced a significant data breach. Threat actors exploited stolen employee credentials to access Otelier's systems, ultimately compromising approx...

Lead by example in cyber

Premier risk-driven analysis

All our analysis is overseen some of the leading members of the risk community and includes lessons learnt, controls environment and root cause analysis. Learn more...

High-quality structured cyber dataset

Key attributes of each case - such as threat actor, costs incurred, failed controls etc. - are captured through the Global Cyber Event Taxonomy Learn more...

Consulting & training services

Our case studies have provided us with unique insights into the challenges faced and strategies implemented by organisations countering cyber security threats. Learn more...