Data Breach

Hackers Still Exploiting Google Calendar in Phishing and Malware Attacks

Hackers Still Exploiting Google Calendar in Phishing and Malware Attacks

Learn more about how hackers use Google Calendar to spread malware through fake invites and phishing links, tricking users into revealing personal information.

Snailmail Is the Oldest New Ransomware Threat

Snailmail Is the Oldest New Ransomware Threat

Read how scammers are using snailmail to send fake ransomware demands, claiming that data breaches have occurred and demanding Bitcoin payments.

Beyond Phishing: The Rise of Mobile-Specific Cyber Threats

Beyond Phishing: The Rise of Mobile-Specific Cyber Threats

Hackers are ditching traditional phishing for mobile-first attacks like smishing, quishing, and Wi-Fi phishing. Are businesses ready for the new threat landscape?

Musk’s Takeover of Federal Agencies Sparks Lawsuits and Privacy Concerns

Musk’s Takeover of Federal Agencies Sparks Lawsuits and Privacy Concerns

Read how Musk’s takeover of federal agencies has sparked lawsuits over privacy and security breaches, raising legal and national security concerns in Washington.

The Payment Card Industry Security Standards Council Clarifies Self-Assessment Eligibility for E-commerce Merchants

The Payment Card Industry Security Standards Council Clarifies Self-Assessment Eligibility for E-commerce Merchants

The Payment Card Industry Security Standards Council (PCI SSC) issued a new FAQ clarifying SAQ A eligibility for e-commerce merchants, strengthening data security measures.

Why Cyber Insurance and Risk Management Need to Evolve With Threat Landscape

Why Cyber Insurance and Risk Management Need to Evolve With Threat Landscape

As AI-driven threats and ransomware surge, cyber insurance is key to risk management, but coverage gaps and evolving risks demand careful planning.

China-Linked Hacking Group Salt Typhoon Still Targeting US Telecommunications

China-Linked Hacking Group Salt Typhoon Still Targeting US Telecommunications

Learn more about Salt Typhoon, a China-linked hacking group that continues targeting telecommunication infrastructure to gather intelligence despite US sanctions.

Lightning-Fast Ransomware Attacks Closing the Intrusion Detection Window

Lightning-Fast Ransomware Attacks Closing the Intrusion Detection Window

Explore how ransomware attacks are hitting faster than ever, leaving little time for intrusion detection to prevent data theft and extortion.

Emerging Trends and Regulatory Shifts in Privacy and Cybersecurity for 2025

Emerging Trends and Regulatory Shifts in Privacy and Cybersecurity for 2025

Stay ahead of 2025’s privacy and cybersecurity trends as new state laws, regulatory shifts, and AI governance reshape data protection policies.

Brightline Settlement Highlights Importance of Cyberattack Damage Documentation

Brightline Settlement Highlights Importance of Cyberattack Damage Documentation

Brightline’s $7M settlement follows a cyberattack exposing nearly 1M individuals’ data via a breach of its file transfer provider.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top