Cyberattack
Learn how Scattered Spider targets browsers in supply chains, stealing identities and tokens, and why CISOs must treat browser security as foundational.
Learn about Google’s plan to initiate a cyber disruption unit, while policymakers debate the legal limits of private cyber-attack operations.
Read how AI-designed ransomware uses local large language models to generate malicious code on victims’ machines dynamically.
Read how new research shows that large language models (LLMs) can autonomously execute AI cyberattacks, raising urgent legal and compliance concerns.
SPONSORED BY KLDISCOVERY: Discover why general counsel are essential to cyber incident response. Be informed, involved, and ready.
Learn more about the Department of Justice (DOJ) extradition of a Nigerian national for hacking tied to spearphishing of tax firms, loan fraud, and sham investments.
Learn why organizations must address identity risk with new tools to prevent breaches and manage exponential risk from sprawling access and AI systems.
Google was hacked by the ShinyHunters group, exposing business data from Salesforce systems, and raising concerns over cloud database security for major corporations.
Learn how spikes in malicious activity can signal disclosure of upcoming security flaws, giving defenders a window to strengthen systems before attacks.
Discover how Microsoft’s new AI-driven malware detection system, Project Ire, uses autonomous reverse engineering to advance large-scale, accurate detection.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.