Data Breach

Unknown Attackers Breach Cybersecurity Company F5's Networks, Steal Customer Data

Unknown Attackers Breach Cybersecurity Company F5’s Networks, Steal Customer Data

Discover how hackers infiltrated cybersecurity company F5 Networks, stealing source code and customer data in a sophisticated, government-backed breach.

Ransomware Attacks Using Legitimate Commands To Steal Data

Ransomware Attacks Using Legitimate Commands To Steal Data

Discover how attackers exploit exposed databases using legitimate commands to steal, delete, and ransom data using ransomware that evades detection.

Hackers Hammer Texas Electric Cooperatives in Alleged Ransomware Breach

Hackers Hammer Texas Electric Cooperatives in Alleged Ransomware Breach

Learn about how hackers allegedly breached Texas electric cooperatives, exposing sensitive data and raising cybersecurity concerns for critical infrastructure.

BRICKSTORM Backdoor Threat Expands Into Legal, Tech Sectors

Brickstorm Backdoor Threat Expands Into Legal, Tech Sectors

Learn how the Brickstorm backdoor is infiltrating the legal sector, leveraging network appliances to establish long-term, stealthy access to critical systems.

CISA Issues Advisory on GeoServer Breach at Federal Agency

CISA Issues Advisory on GeoServer Breach at Federal Agency

Discover how the Cybersecurity and Infrastructure Security Agency (CISA) exposed a GeoServer vulnerability that allowed attackers to infiltrate a federal agency and evade detection for weeks.

Chatbots Leak Data Through Unprotected Server

Chatbots Leak Data Through Unprotected Server

Discover how chatbots leaking data through unprotected servers exposed sensitive user information and created new legal and compliance risks.

Email Security Flaw Exposes Zero-Click Vulnerability

Email Security Flaw Exposes Zero-Click Vulnerability

Discover why Punycode can let attackers hijack accounts through email systems without user interaction, exploiting a zero-click vulnerability.

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

Discover why CISOs may face career-ending risks when pressured into a cover-up of cyber incidents despite mounting regulatory requirements.

A New National Framework: Implementing the Data Security Program

A New National Framework: Implementing the Data Security Program

The Data Security Program is now being enforced by the DOJ, setting a strict framework for compliance. Learn what businesses must know to meet the new rules.

DOJ Settlement Ties Illumina to Cybersecurity Failures in Genomic Sequencing Systems

DOJ Settlement Ties Illumina to Cybersecurity Failures in Genomic Sequencing Systems

Learn why cybersecurity deficiencies in Illumina’s genomic sequencing systems led to a $9.8 million False Claims Act settlement with the DOJ.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top