Data Privacy & Cybersecurity

US Energy Vulnerabilities and China Threat Discussed at House Hearing

Discover how energy vulnerabilities in US systems are prompting renewed concern as officials detail escalating cyber threats linked to China.

Chinese Front Companies Use Steganography for State-Sponsored Threats

Learn why Chinese Front Companies BIETA and CIII are developing advanced steganography tools to support persistent cyber campaigns.

CISA Warns of Commercial Spyware Threats Targeting WhatsApp and Signal Users

Dive into the Cybersecurity and Infrastructure Security Agency (CISA) tracking of campaigns using WhatsApp and Signal to infiltrate devices and monitor high-value targets with commercial spyware operations.

Federal Contractors Charged with Attempted Data Theft and Destruction

Read about two federal contractors accused of using insider access for data theft and to destroy US government databases.

US Banks Assess Data Loss After Hackers Breach Fintech Firm

Read about questions facing fintech companies after a breach at SitusAMC exposed sensitive records, prompting banks to assess potential exposure.

Google Confirms That Data of More Than 200 Companies Was Stolen

Read about a Google investigation that tied a major breach to apps used by Salesforce, which allowed 200-plus companies’ data to be stolen.

Cloudflare Outage Was Triggered by Internal Configuration Failure

Discover why a Cloudflare outage spread globally across its network after a permissions change caused cascading failures, and what the company says it will change.

Mapping the Financial Sector’s Cyber Risk and Supply Chain Dependencies

Learn why cyber risk exposure in the financial sector’s supply chain demands closer scrutiny as data reveals hidden dependencies and uneven supplier security.

Internal Letter About Aggressive AI Development Spurs Debate Between Amazon and Its Workers

Learn why Amazon Workers are raising alarms about the rapid expansion of AI development and its environmental, labor, and ethical implications.

Critical Flaw in Oracle Fusion Middleware Exploited in Breach

Discover what an actively exploited flaw in Oracle requiring urgent patching means for enterprise security across affected environments.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top