A repository of cyberattack case studies, focusing on the compromised components of the CIA triad (Confidentiality, Integrity, Availability), identity theft vectors, and detailed Tactics, Techniques, and Procedures (TTPs). Each report offers concise analysis of real-world breaches, helping researchers and students understand evolving threat patterns across industries.
Each case study includes a case-study.md file containing detailed analysis report
This repository is useful for:
-
Cybersecurity students learning about real-world attack scenarios
-
Professionals and analysts doing threat modeling or security awareness
-
Educators building case-based learning modules
-
CTF / Blue teamers referencing realistic breach narratives
Contributions are welcome! If you’d like to add a new case study:
-
Fork the repo
-
Add your case study in the given format (
/case-studies/YourCase.md) -
Submit a Pull Request (PR)
This repository is licensed under the MIT License.