Cyberattack

How a Cyberattack Could Cripple the US Electrical Grid

How a Cyberattack Could Cripple the US Electrical Grid

Discover why a cyberattack on the US electrical grid could trigger blackouts, chaos, and legal risks that businesses and law firms can’t afford to ignore.

UNFI Cyberattack Poses Supply Chain Risk to Whole Foods, Other Grocers

UNFI Cyberattack Poses Supply Chain Risk to Whole Foods, Other Grocers

Discover how a recent cyberattack on UNFI is disrupting its operations and threatening the supply chain of many customers, including Whole Foods.

Andrei Tarasov: Escape Artist, Nihilist, Dangerous Russian Cybercriminal

Andrei Tarasov: Escape Artist, Nihilist, Dangerous Russian Cybercriminal

Read about Andrei Tarasov, a Russian cybercriminal’s run-ins with global law enforcement, failed extradition, and dark role in notorious exploit kits and ransomware schemes.

Cryptocurrency Vulnerability Exploited in $223 Million Cetus Protocol Hack

Cryptocurrency Vulnerability Exploited in $223 Million Cetus Protocol Hack

A critical vulnerability in the Cetus Protocol smart contract led to a $223 million cryptocurrency theft, highlighting major risks in DeFi platforms and blockchain security.

Foreign Hackers Charged in Botnet Scheme Targeting Global Routers

Foreign Hackers Charged in Botnet Scheme Targeting Global Routers

Four foreign nationals face charges for operating a botnet scheme that hijacked routers worldwide, earning over $46 million through the sale of illegal proxy services online.

184 Million Login Credentials From Microsoft, Instagram, Facebook Exposed

184 Million Login Credentials From Microsoft, Instagram, Facebook Exposed

Over 184 million login credentials, including Microsoft accounts, were exposed in an unsecured database linked to infostealer malware infections.

Ransomware Gangs Adopt Off-the-Shelf Malware for Post-Exploitation Activities

Ransomware Gangs Adopt Off-the-Shelf Malware for Post-Exploitation Activities

Read how ransomware gangs have turned to Skitnet malware for stealthy post-exploitation, enabling deep system control and persistence in targeted attacks.

Ransomware Infrastructure Dismantled in Global Operation

Ransomware Infrastructure Dismantled in Global Operation

A global crackdown dismantles ransomware infrastructure, seizes millions of dollars, and leads to arrests in sweeping international law enforcement operations.

DHS Cancels Multibillion-Dollar Cybersecurity Contract Following Legal Challenge

DHS Cancels Multibillion-Dollar Cybersecurity Contract Following Legal Challenge

Learn why DHS canceled a $2.4B cybersecurity contract after a protest by a rival bidder, raising questions about procurement fairness and compliance practices.

Dangerous Ransom Gang Scattered Spider Shifts Focus From UK to US Retail

Dangerous Ransom Gang Scattered Spider Shifts Focus From UK to US Retail

Read how the ransomware group Scattered Spider has been targeting US retail firms using advanced social engineering tactics, posing a significant risk to enterprises with large help desk operations.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top