Data Privacy & Cybersecurity
Learn how Scattered Spider targets browsers in supply chains, stealing identities and tokens, and why CISOs must treat browser security as foundational.
Learn how a loophole in new rules allows stablecoins to generate rewards, sparking a fight between banks, regulators, and crypto exchanges.
Discover how IBM and AMD’s quantum computing collaboration could transform industries, speed problem-solving, and unlock a multibillion-dollar market.
Learn about the Department of Defense’s connection with Russia through a widely used Node.js utility that raises open-source security and oversight questions.
Learn about Google’s plan to initiate a cyber disruption unit, while policymakers debate the legal limits of private cyber-attack operations.
Read how AI-designed ransomware uses local large language models to generate malicious code on victims’ machines dynamically.
Read how new research shows that large language models (LLMs) can autonomously execute AI cyberattacks, raising urgent legal and compliance concerns.
Legal risks mount for bitcoin miners as tariff hikes trigger supply chain disputes and expose vulnerabilities in import-dependent operations.
Nvidia denies hiding controls in its GPUs as proposed tracking requirements raise legal, and security risks for many industries.
India’s SEBI accuses Jane Street of market manipulation, raising global questions about algorithmic trading, arbitrage, and regulatory oversight.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.