Data Privacy & Cybersecurity

The Overlooked Threat: How Legacy Building Systems Pose New Cyber Risk

The Overlooked Threat: How Legacy Building Systems Pose New Cyber Risk

Systems once seen as isolated and harmless are now networked. Where there’s connectivity, there’s risk—especially with legacy building systems.

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

Discover why CISOs may face career-ending risks when pressured into a cover-up of cyber incidents despite mounting regulatory requirements.

New Ransomware Risks for Remote Access Tools

Bridgestone Cyberattack Disrupts Operations Despite Early Containment

Read about Bridgestone’s cyberattack response and the legal and regulatory implications for manufacturers of increasing ransomware risks.

Supply Chain Attacks Hit Cloudflare, Proofpoint, and Other Major Firms

Supply Chain Attacks Hit Cloudflare, Proofpoint, and Other Major Firms

Read about supply chain attacks affecting Cloudflare, Proofpoint, and others, exposing Salesforce data and prompting urgent security responses.

Scattered Spider Exposes Browser Vulnerabilities, Risks Grow

Scattered Spider Exposes Browser Vulnerabilities, Risks Grow

Learn how Scattered Spider targets browsers in supply chains, stealing identities and tokens, and why CISOs must treat browser security as foundational.

Lawmakers Weigh Rewards for Stablecoins, Loophole Debate Intensifies

Lawmakers Weigh Rewards for Stablecoins, Loophole Debate Intensifies

Learn how a loophole in new rules allows stablecoins to generate rewards, sparking a fight between banks, regulators, and crypto exchanges.

IBM Enters Quantum Computing Partnership with AMD

IBM Enters Quantum Computing Partnership with AMD

Discover how IBM and AMD’s quantum computing collaboration could transform industries, speed problem-solving, and unlock a multibillion-dollar market.

Department of Defense is Relying on Russian-Maintained Node.js Tool

Department of Defense is Relying on Russian-Maintained Node.js Tool

Learn about the Department of Defense’s connection with Russia through a widely used Node.js utility that raises open-source security and oversight questions.

Cellular Network Risks Exposed by Secret Service Seizure

Google is Forming a Cyber Disruption Unit, Offensive Strategy Debated

Learn about Google’s plan to initiate a cyber disruption unit, while policymakers debate the legal limits of private cyber-attack operations.

AI-Designed Ransomware Emerges with PromptLock Malware

AI-Designed Ransomware Emerges with PromptLock Malware

Read how AI-designed ransomware uses local large language models to generate malicious code on victims’ machines dynamically.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top