Cyberattack
Read how the Shai-Hulud worm underscores growing supply chain attack threats, demanding urgent risk management, legal, and operational responses.
Learn why the Buterat backdoor malware poses long-term risks to networks by evading detection, hijacking processes, and exfiltrating sensitive data.
Learn how attackers exploit Docker APIs with evolving malware that blocks access, spreads autonomously, and lays groundwork for a complex botnet.
Learn about US charges against Russian nationals accused of hacking critical infrastructure using old Cisco flaws, and the legal implications of this pursuit.
Read about Bridgestone’s cyberattack response and the legal and regulatory implications for manufacturers of increasing ransomware risks.
Read about supply chain attacks affecting Cloudflare, Proofpoint, and others, exposing Salesforce data and prompting urgent security responses.
Learn how Scattered Spider targets browsers in supply chains, stealing identities and tokens, and why CISOs must treat browser security as foundational.
Learn about Google’s plan to initiate a cyber disruption unit, while policymakers debate the legal limits of private cyber-attack operations.
Read how AI-designed ransomware uses local large language models to generate malicious code on victims’ machines dynamically.
Read how new research shows that large language models (LLMs) can autonomously execute AI cyberattacks, raising urgent legal and compliance concerns.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.