Data Privacy & Cybersecurity

Chatbots Leak Data Through Unprotected Server

Chatbots Leak Data Through Unprotected Server

Discover how chatbots leaking data through unprotected servers exposed sensitive user information and created new legal and compliance risks.

EU Fines Google €2.95 Billion Over Ad Tech Antitrust Violations

EU Fines Google €2.95 Billion Over Ad Tech Antitrust Violations

Read about the €2.95B fine the EU imposed on Google for digital ad tech abuses, and stronger measures regulators are considering to curb market dominance.

Emerging Botnet Threat Exploits Exposed Docker APIs

Emerging Botnet Threat Exploits Exposed Docker APIs

Learn how attackers exploit Docker APIs with evolving malware that blocks access, spreads autonomously, and lays groundwork for a complex botnet.

Russian Nationals Linked to Critical Infrastructure Hacks Face $10M US Bounty

Russian Nationals Linked to Critical Infrastructure Hacks Face $10M US Bounty

Learn about US charges against Russian nationals accused of hacking critical infrastructure using old Cisco flaws, and the legal implications of this pursuit.

Judge Rejects Proposed Anthropic Settlement Over AI Piracy Claims

Judge Rejects Proposed Anthropic Settlement Over AI Piracy Claims

 Discover why the judge rejected a $1.5B Anthropic settlement for alleged mass book piracy, demanding clarity on claims, class lists, and payouts.

Email Security Flaw Exposes Zero-Click Vulnerability

Email Security Flaw Exposes Zero-Click Vulnerability

Discover why Punycode can let attackers hijack accounts through email systems without user interaction, exploiting a zero-click vulnerability.

The Overlooked Threat: How Legacy Building Systems Pose New Cyber Risk

The Overlooked Threat: How Legacy Building Systems Pose New Cyber Risk

Systems once seen as isolated and harmless are now networked. Where there’s connectivity, there’s risk—especially with legacy building systems.

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

Discover why CISOs may face career-ending risks when pressured into a cover-up of cyber incidents despite mounting regulatory requirements.

New Ransomware Risks for Remote Access Tools

Bridgestone Cyberattack Disrupts Operations Despite Early Containment

Read about Bridgestone’s cyberattack response and the legal and regulatory implications for manufacturers of increasing ransomware risks.

Supply Chain Attacks Hit Cloudflare, Proofpoint, and Other Major Firms

Supply Chain Attacks Hit Cloudflare, Proofpoint, and Other Major Firms

Read about supply chain attacks affecting Cloudflare, Proofpoint, and others, exposing Salesforce data and prompting urgent security responses.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top