todays-gc-web-editor

Are Ransom Attacks State-Sponsored Terrorism?

Are Ransom Attacks State-Sponsored Terrorism?

The State Department has offered up to $15 million for information on two Russia-based ransomware gangs. Are ransom attacks state-sponsored terrorism?

Weaponizing AI in Cyberattacks Discussed on Hacker Forums

Weaponizing AI in Cyberattacks Discussed on Hacker Forums

Security researchers have found dedicated AI and machine learning for criminal uses of popular chatbots.

AT&T Data Breach Confirmed

AT&T Data Breach Confirmed

Read more about a news release that confirmed an AT&T data breach exposing 73 million current and former customers to a dark web marketplace for fraudsters.

Why Organizations Should Develop AI Governance Programs

Why Organizations Should Develop AI Governance Programs

Launch an AI governance program and align it with common regulatory requirements by taking four steps.

Hefty Fine For Not Meeting SEC Disclosure Requirements

Hefty Fine For Not Meeting SEC Disclosure Requirements

The SEC settled charges against Skechers U.S.A., alleging that the company failed to disclose payments to executives’ immediate family members.

Activist Shareholders Must Stick To Their Proxy Contest Agreements

Activist Shareholders Must Stick To Their Proxy Contest Agreements

Read about the Delaware Court of Chancery ruling stating that two activist stockholders who jointly held 22 percent of a company’s common stock must vote as they’d agreed.

How Communication Technology Affects Ediscovery Data Collection

How Communication Technology Affects eDiscovery Data Collection

Find out the strategies and challenges inherent in adapting to these transformative shifts, ensuring compliance and efficiency in legal operations.

Backups Are the Only Defense Against Ransomware

Backups Are the Only Defense Against Ransomware

Recent takedowns of LockBit and other cybercrime groups have prompted speculation that defense against ransomware attacks might be possible. Learn why this isn’t the case as long as Russia protects cybercriminals.

MFA Fatigue Attacks Targeting iCloud Users

MFA Fatigue Attacks Targeting iCloud Users

This new phishing technique hits the victim with repeated multi-factor authentication requests, causing the operator to robotically click Yes/Allow, giving the attackers access.

Thousands Of Companies Face AI Infrastructure Vulnerability

Thousands Of Companies Face AI Infrastructure Vulnerability

Discover how hackers are exploiting a disputed vulnerability in a popular open-source AI framework known as Ray.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top