Data Breach

DoorDash Data Breach Affects User Contact Information

Discover what DoorDash revealed about a data breach impacting user contact details that was traced to a social engineering incident targeting an employee.

UK Outsourcing Firm Fined £14 Million, Setting Standards for Multinational GCs

Learn why fines against a UK outsourcing firm show multinational GCs the necessity for risk-based testing, SOC accountability, and robust cybersecurity.

Oracle Issues Emergency Patch for Clop-Linked Breaches of its E-Business Suite

Read Why Oracle has released a new E-Business Suite patch to address a critical vulnerability, following widespread Clop-related breaches.

Unknown Attackers Breach Cybersecurity Company F5’s Networks, Steal Customer Data

Discover how hackers infiltrated cybersecurity company F5 Networks, stealing source code and customer data in a sophisticated, government-backed breach.

Ransomware Attacks Using Legitimate Commands To Steal Data

Discover how attackers exploit exposed databases using legitimate commands to steal, delete, and ransom data using ransomware that evades detection.

Hackers Hammer Texas Electric Cooperatives in Alleged Ransomware Breach

Learn about how hackers allegedly breached Texas electric cooperatives, exposing sensitive data and raising cybersecurity concerns for critical infrastructure.

Brickstorm Backdoor Threat Expands Into Legal, Tech Sectors

Learn how the Brickstorm backdoor is infiltrating the legal sector, leveraging network appliances to establish long-term, stealthy access to critical systems.

CISA Issues Advisory on GeoServer Breach at Federal Agency

Discover how the Cybersecurity and Infrastructure Security Agency (CISA) exposed a GeoServer vulnerability that allowed attackers to infiltrate a federal agency and evade detection for weeks.

Chatbots Leak Data Through Unprotected Server

Discover how chatbots leaking data through unprotected servers exposed sensitive user information and created new legal and compliance risks.

Email Security Flaw Exposes Zero-Click Vulnerability

Discover why Punycode can let attackers hijack accounts through email systems without user interaction, exploiting a zero-click vulnerability.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top