Data Privacy & Cybersecurity
This new phishing technique hits the victim with repeated multi-factor authentication requests, causing the operator to robotically click Yes/Allow, giving the attackers access.
Discover how hackers are exploiting a disputed vulnerability in a popular open-source AI framework known as Ray.
Discover how organizations can strengthen their cybersecurity compliance posture with the latest release of NIST’s CSF Version 2.0.
While the US Securities and Exchange Commission has long issued cybersecurity governance guidelines, adherence has been lacking, according to an […]
In February a multinational task force led by the UK’s National Crime Agency seized the main website of LockBit, the […]
The software-as-a-service (SaaS) market will show annual growth of 18 percent, and have a valuation of $908 billion-plus by 2030. […]
In January 2024, a door plug panel blew off an Alaska Airlines Boeing 737 MAX 9 in mid-flight, causing rapid […]
In recent months, the Federal Communications Commission expanded its data breach notification rules while the U.S. Securities and Exchange Commission’s […]
Xavier Becerra, Secretary of the U.S. Department of Health and Human Services (HHS), has addressed the “far-reaching” implications of the […]
A recent email phishing attack targeting hundreds of U.S. employees deployed a nefarious spin-off of NetSupport Manager, a legit remote […]
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.