Data Breach

UK Outsourcing Firm Fined £14 Million, Setting Standards for Multi-National GCs

UK Outsourcing Firm Fined £14 Million, Setting Standards for Multinational GCs

Learn why fines against a UK outsourcing firm show multinational GCs the necessity for risk-based testing, SOC accountability, and robust cybersecurity.

Oracle Issues Emergency Patch for Clop-Linked Breaches of its E-Business Suite

Oracle Issues Emergency Patch for Clop-Linked Breaches of its E-Business Suite

Read Why Oracle has released a new E-Business Suite patch to address a critical vulnerability, following widespread Clop-related breaches.

Unknown Attackers Breach Cybersecurity Company F5's Networks, Steal Customer Data

Unknown Attackers Breach Cybersecurity Company F5’s Networks, Steal Customer Data

Discover how hackers infiltrated cybersecurity company F5 Networks, stealing source code and customer data in a sophisticated, government-backed breach.

Ransomware Attacks Using Legitimate Commands To Steal Data

Ransomware Attacks Using Legitimate Commands To Steal Data

Discover how attackers exploit exposed databases using legitimate commands to steal, delete, and ransom data using ransomware that evades detection.

Hackers Hammer Texas Electric Cooperatives in Alleged Ransomware Breach

Hackers Hammer Texas Electric Cooperatives in Alleged Ransomware Breach

Learn about how hackers allegedly breached Texas electric cooperatives, exposing sensitive data and raising cybersecurity concerns for critical infrastructure.

BRICKSTORM Backdoor Threat Expands Into Legal, Tech Sectors

Brickstorm Backdoor Threat Expands Into Legal, Tech Sectors

Learn how the Brickstorm backdoor is infiltrating the legal sector, leveraging network appliances to establish long-term, stealthy access to critical systems.

CISA Issues Advisory on GeoServer Breach at Federal Agency

CISA Issues Advisory on GeoServer Breach at Federal Agency

Discover how the Cybersecurity and Infrastructure Security Agency (CISA) exposed a GeoServer vulnerability that allowed attackers to infiltrate a federal agency and evade detection for weeks.

Chatbots Leak Data Through Unprotected Server

Chatbots Leak Data Through Unprotected Server

Discover how chatbots leaking data through unprotected servers exposed sensitive user information and created new legal and compliance risks.

Email Security Flaw Exposes Zero-Click Vulnerability

Email Security Flaw Exposes Zero-Click Vulnerability

Discover why Punycode can let attackers hijack accounts through email systems without user interaction, exploiting a zero-click vulnerability.

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

CISOs Face Legal Risks From Pressure to Conceal Security Incidents

Discover why CISOs may face career-ending risks when pressured into a cover-up of cyber incidents despite mounting regulatory requirements.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top