Research methodology

We identify incidents from a range of publicly available sources (listed in our weekly round-ups), including news articles, PR statements, and feeds by security researchers. We record these incidents, along with quantifiable data points for each, in a spreadsheet. Note …