
An analysis of the ManoMano data breach affecting 38 million users, exploring the supply chain exposure and the impact of third-party support platform compromises.

An analysis of the CarGurus data breach using the seven-level framework, exploring identity-based entry points and the impact of exposed finance pre-qualification data.

A structured analysis of the UMMC ransomware attack using the seven-level framework, exploring the operational impact and systemic risks in healthcare.

A structured analysis of the Washington Hotel ransomware attack, exploring how segmentation saved guest data while corporate systems were hit.

An analysis of the Figure Technology data breach, where a social engineering attack led to the compromise of an employee account and subsequent data exfiltration.

An analysis of the Odido data breach, where attackers gained access to a customer contact system, and what it teaches us about data segmentation and third-party risk.

A seven-level analysis of the Conduent data breach that exposed sensitive information of Volvo Group North America employees, highlighting the impact of third-party compromises.

An analysis of the BridgePay ransomware attack using the CyberLeveling Breach Anatomy Model, exploring how the incident became possible and what it reveals about risks in financial infrastructure.

An analysis of the cyberattack on La Sapienza University, applying a seven-level framework to understand the incident's causes, impact, and lessons for other large institutions.

An analysis of the Flickr data breach, where a third-party email service provider's vulnerability led to potential user data exposure, highlighting supply chain risks.

An analysis of the Substack data breach, exploring why a web or backend application vulnerability is the most plausible explanation, and applying a seven-level incident analysis lens.

An analysis of the cyberattack on Conpet, Romania's national oil pipeline operator, and the Qilin ransomware group's playbook.

An analysis of the NationStates data breach using the CyberLeveling Breach Anatomy Model, highlighting a classic application-layer compromise.

An analysis of the Crunchbase data breach, applying the CyberLeveling Breach Anatomy Model to understand the vishing campaign and its impact.

A structured analysis of the SoundCloud data breach affecting 29.8 million users, using the CyberLeveling Breach Anatomy Model to review the incident's surface, intrusion, and impact.