Data Breach

CISA Issues Advisory on GeoServer Breach at Federal Agency

CISA Issues Advisory on GeoServer Breach at Federal Agency

Discover how the Cybersecurity and Infrastructure Security Agency (CISA) exposed a GeoServer vulnerability that allowed attackers to infiltrate a federal agency and evade detection for weeks.

Chatbots Leak Data Through Unprotected Server

Chatbots Leak Data Through Unprotected Server

Discover how chatbots leaking data through unprotected servers exposed sensitive user information and created new legal and compliance risks.

Email Security Flaw Exposes Zero-Click Vulnerability

Email Security Flaw Exposes Zero-Click Vulnerability

Discover why Punycode can let attackers hijack accounts through email systems without user interaction, exploiting a zero-click vulnerability.

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

Discover why CISOs may face career-ending risks when pressured into a cover-up of cyber incidents despite mounting regulatory requirements.

A New National Framework: Implementing the Data Security Program

A New National Framework: Implementing the Data Security Program

The Data Security Program is now being enforced by the DOJ, setting a strict framework for compliance. Learn what businesses must know to meet the new rules.

DOJ Settlement Ties Illumina to Cybersecurity Failures in Genomic Sequencing Systems

DOJ Settlement Ties Illumina to Cybersecurity Failures in Genomic Sequencing Systems

Learn why cybersecurity deficiencies in Illumina’s genomic sequencing systems led to a $9.8 million False Claims Act settlement with the DOJ.

DOJ Secures Extradition of Nigerian National for Hacking, Fraud, and Identity Theft

DOJ Secures Extradition of Nigerian National for Hacking, Fraud, and Identity Theft

Learn more about the Department of Justice (DOJ) extradition of a Nigerian national for hacking tied to spearphishing of tax firms, loan fraud, and sham investments.

Rethinking Identity Risk Through Attack Paths

Rethinking Identity Risk Through Attack Paths

Learn why organizations must address identity risk with new tools to prevent breaches and manage exponential risk from sprawling access and AI systems.

Google Hacked, Breach Sparks Cloud Security Questions

Google Hacked, Breach Sparks Cloud Security Questions

Google was hacked by the ShinyHunters group, exposing business data from Salesforce systems, and raising concerns over cloud database security for major corporations.

Dell Under Scrutiny After 1.3 TB Of Internal Data Leaked

Dell Under Scrutiny After 1.3 TB Of Internal Data Leaked

Read why Dell is under scrutiny after 1.3 TB of internal data was leaked by World Leaks, raising concerns over evolving cyber extortion tactics.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top