Data Privacy & Cybersecurity

stethoscope on dollars

Twist In Change Healthcare Ransom Attack

The RansomHub gang is leaking corporate and patient data stolen from a recent healthcare ransom attack in what experts call “double-extortion.”

cybersecurity logging in with username and password

Credential Stuffing Creates Cybersecurity Vulnerabilities

Learn how credential stuffing takes advantage of computer users reusing passwords over multiple platforms and how this can lead to security breaches.

Notable Data Breaches and How To Protect Your Company

Notable Data Breaches and How To Protect Your Company

Causes and impacts of data breaches at companies large and small, and what you can do to avoid them.

Microsoft Cybersecurity Errors Led To Breach Of Companies’ Data

Microsoft Cybersecurity Errors Led To Breach Of Companies’ Data

The US Cyber Safety Review Board has been critical of Microsoft cybersecurity errors that allowed a Chinese nation-state group to breach more than 20 companies.

Are Ransom Attacks State-Sponsored Terrorism?

Are Ransom Attacks State-Sponsored Terrorism?

The State Department has offered up to $15 million for information on two Russia-based ransomware gangs. Are ransom attacks state-sponsored terrorism?

Weaponizing AI in Cyberattacks Discussed on Hacker Forums

Weaponizing AI in Cyberattacks Discussed on Hacker Forums

Security researchers have found dedicated AI and machine learning for criminal uses of popular chatbots.

AT&T Data Breach Confirmed

AT&T Data Breach Confirmed

Read more about a news release that confirmed an AT&T data breach exposing 73 million current and former customers to a dark web marketplace for fraudsters.

Safeguarding Your Products: Compliance with IoT Cybersecurity Regulations

Safeguarding Your Products: Compliance with IoT Cybersecurity Regulations

Stay ahead of the curve on compliance with IoT cybersecurity regulations with expert guidance for meeting industry standards and protecting consumer trust.

The Three C’s: Collaboration Between Cybersecurity and Compliance

The Three C’s: Collaboration Between Cybersecurity and Compliance

Explore how these critical functions converge to fortify organizational resilience against emerging threats and regulatory scrutiny.

Backups Are the Only Defense Against Ransomware

Backups Are the Only Defense Against Ransomware

Recent takedowns of LockBit and other cybercrime groups have prompted speculation that defense against ransomware attacks might be possible. Learn why this isn’t the case as long as Russia protects cybercriminals.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top