Data Breach
Discover how the Cybersecurity and Infrastructure Security Agency (CISA) exposed a GeoServer vulnerability that allowed attackers to infiltrate a federal agency and evade detection for weeks.
Discover how chatbots leaking data through unprotected servers exposed sensitive user information and created new legal and compliance risks.
Discover why Punycode can let attackers hijack accounts through email systems without user interaction, exploiting a zero-click vulnerability.
Discover why CISOs may face career-ending risks when pressured into a cover-up of cyber incidents despite mounting regulatory requirements.
The Data Security Program is now being enforced by the DOJ, setting a strict framework for compliance. Learn what businesses must know to meet the new rules.
Learn why cybersecurity deficiencies in Illumina’s genomic sequencing systems led to a $9.8 million False Claims Act settlement with the DOJ.
Learn more about the Department of Justice (DOJ) extradition of a Nigerian national for hacking tied to spearphishing of tax firms, loan fraud, and sham investments.
Learn why organizations must address identity risk with new tools to prevent breaches and manage exponential risk from sprawling access and AI systems.
Google was hacked by the ShinyHunters group, exposing business data from Salesforce systems, and raising concerns over cloud database security for major corporations.
Read why Dell is under scrutiny after 1.3 TB of internal data was leaked by World Leaks, raising concerns over evolving cyber extortion tactics.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.