Data Breach
Discover how hackers infiltrated cybersecurity company F5 Networks, stealing source code and customer data in a sophisticated, government-backed breach.
Discover how attackers exploit exposed databases using legitimate commands to steal, delete, and ransom data using ransomware that evades detection.
Learn about how hackers allegedly breached Texas electric cooperatives, exposing sensitive data and raising cybersecurity concerns for critical infrastructure.
Learn how the Brickstorm backdoor is infiltrating the legal sector, leveraging network appliances to establish long-term, stealthy access to critical systems.
Discover how the Cybersecurity and Infrastructure Security Agency (CISA) exposed a GeoServer vulnerability that allowed attackers to infiltrate a federal agency and evade detection for weeks.
Discover how chatbots leaking data through unprotected servers exposed sensitive user information and created new legal and compliance risks.
Discover why Punycode can let attackers hijack accounts through email systems without user interaction, exploiting a zero-click vulnerability.
Discover why CISOs may face career-ending risks when pressured into a cover-up of cyber incidents despite mounting regulatory requirements.
The Data Security Program is now being enforced by the DOJ, setting a strict framework for compliance. Learn what businesses must know to meet the new rules.
Learn why cybersecurity deficiencies in Illumina’s genomic sequencing systems led to a $9.8 million False Claims Act settlement with the DOJ.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.