Data Breach
Learn why fines against a UK outsourcing firm show multinational GCs the necessity for risk-based testing, SOC accountability, and robust cybersecurity.
Read Why Oracle has released a new E-Business Suite patch to address a critical vulnerability, following widespread Clop-related breaches.
Discover how hackers infiltrated cybersecurity company F5 Networks, stealing source code and customer data in a sophisticated, government-backed breach.
Discover how attackers exploit exposed databases using legitimate commands to steal, delete, and ransom data using ransomware that evades detection.
Learn about how hackers allegedly breached Texas electric cooperatives, exposing sensitive data and raising cybersecurity concerns for critical infrastructure.
Learn how the Brickstorm backdoor is infiltrating the legal sector, leveraging network appliances to establish long-term, stealthy access to critical systems.
Discover how the Cybersecurity and Infrastructure Security Agency (CISA) exposed a GeoServer vulnerability that allowed attackers to infiltrate a federal agency and evade detection for weeks.
Discover how chatbots leaking data through unprotected servers exposed sensitive user information and created new legal and compliance risks.
Discover why Punycode can let attackers hijack accounts through email systems without user interaction, exploiting a zero-click vulnerability.
Discover why CISOs may face career-ending risks when pressured into a cover-up of cyber incidents despite mounting regulatory requirements.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.