Cyberattack

Brightspeed Probes Alleged Cyber Incident Involving Customer Data

Read why Brightspeed, the broadband provider, is investigating claims that hackers accessed customer information from over one million accounts.

Coinbase Data Breach Leads to Support Agent’s Arrest in India

Discover how Coinbase reacted after a former support agent allegedly aided hackers and exposed customer data.

Inside a Firm Specializing in Cyber Crisis and Ransom Negotiation

Discover how ransom negotiation shapes incident response, ethical decision-making, insurer involvement, and government coordination during high-stakes attacks.

Fake Microsoft Teams Installer Campaign Poses Legal and Security Risks

 Read about a fake Microsoft Teams installer operation using SEO driven deception to distribute ValleyRAT, and create complex corporate exposure points.

AI Cyber Risk and the Rise of the Algorithmic Attacker

A new era of AI cyber risk emerges as agentic systems conduct cyber-espionage at scale, forcing compliance, legal, and security teams to rethink governance, liability, and controls.

US Energy Vulnerabilities and China Threat Discussed at House Hearing

Discover how energy vulnerabilities in US systems are prompting renewed concern as officials detail escalating cyber threats linked to China.

Federal Contractors Charged with Attempted Data Theft and Destruction

Read about two federal contractors accused of using insider access for data theft and to destroy US government databases.

AI Reshapes Healthcare Cybersecurity Landscape

Learn how AI is transforming healthcare cybersecurity by enabling faster threat detection, but it is also being used in sophisticated cyberattacks.

Citrix Custom Malware Incident Exposes Coordinated Zero-day Exploitation

Learn why multiple malware incidents involving zero-day exploitation raise serious concerns about attacker sophistication and vendor patch cycles.

Qilin Ransomware Group Deploys Linux Encryptors Through Windows WSL to Evade Detection

Discover what makes Qilin’s use of Linux encryptors in Windows via Windows Subsystem for Linux (WSL) a sophisticated evasion method challenging traditional security defenses.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top