Cyberattack

Bridgestone Cyberattack Disrupts Operations Despite Early Containment

Bridgestone Cyberattack Disrupts Operations Despite Early Containment

Read about Bridgestone’s cyberattack response and the legal and regulatory implications for manufacturers of increasing ransomware risks.

Supply Chain Attacks Hit Cloudflare, Proofpoint, and Other Major Firms

Supply Chain Attacks Hit Cloudflare, Proofpoint, and Other Major Firms

Read about supply chain attacks affecting Cloudflare, Proofpoint, and others, exposing Salesforce data and prompting urgent security responses.

Scattered Spider Exposes Browser Vulnerabilities, Risks Grow

Scattered Spider Exposes Browser Vulnerabilities, Risks Grow

Learn how Scattered Spider targets browsers in supply chains, stealing identities and tokens, and why CISOs must treat browser security as foundational.

Google is Forming a Cyber Disruption Unit, Offensive Strategy Debated

Google is Forming a Cyber Disruption Unit, Offensive Strategy Debated

Learn about Google’s plan to initiate a cyber disruption unit, while policymakers debate the legal limits of private cyber-attack operations.

AI-Designed Ransomware Emerges with PromptLock Malware

AI-Designed Ransomware Emerges with PromptLock Malware

Read how AI-designed ransomware uses local large language models to generate malicious code on victims’ machines dynamically.

AI Cyberattacks Will Transform Industry Risk and Security

AI Cyberattacks Will Transform Industry Risk and Security

Read how new research shows that large language models (LLMs) can autonomously execute AI cyberattacks, raising urgent legal and compliance concerns.

Cyber Incident Response in 2025

Cyber Incident Response in 2025: A Strategic Imperative for General Counsel

SPONSORED BY KLDISCOVERY: Discover why general counsel are essential to cyber incident response. Be informed, involved, and ready.

DOJ Secures Extradition of Nigerian National for Hacking, Fraud, and Identity Theft

DOJ Secures Extradition of Nigerian National for Hacking, Fraud, and Identity Theft

Learn more about the Department of Justice (DOJ) extradition of a Nigerian national for hacking tied to spearphishing of tax firms, loan fraud, and sham investments.

Rethinking Identity Risk Through Attack Paths

Rethinking Identity Risk Through Attack Paths

Learn why organizations must address identity risk with new tools to prevent breaches and manage exponential risk from sprawling access and AI systems.

Google Hacked, Breach Sparks Cloud Security Questions

Google Hacked, Breach Sparks Cloud Security Questions

Google was hacked by the ShinyHunters group, exposing business data from Salesforce systems, and raising concerns over cloud database security for major corporations.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top