Hogan Lovells retains 14 of 21 spring qualifying trainees – Legal Cheek
Two NQs on fixed term contracts Hogan Lovells has retained 14 of its 21 final seat trainees qualifying this spring, it has confirmed. The global law firm revealed it made…
Two NQs on fixed term contracts Hogan Lovells has retained 14 of its 21 final seat trainees qualifying this spring, it has confirmed. The global law firm revealed it made…
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it…
An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals.…
A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end,…
Judges have refused to grant a collective proceedings order over an alleged salmon production cartel because it appears more for the benefit of lawyers and funders than consumers. The post…
Lawyers testing the Legal Ombudsman’s model complaints resolution procedure resolved most of the complaints themselves, it has emerged. The post Lawyers resolve most complaints themselves under LeO pilot appeared first…
There needs to be “a complete re-think of how we prepare our young lawyers for practice in the machine age”, the Master of the Rolls said yesterday. The post Vos:…
Mistakes in legal practice are inevitable. What truly differentiates well-run firms from those that stumble is not whether mistakes occur, but how they are handled when they do. The post…
The High Court has widened legal advice privilege to all internal documents created by the client where the dominant purpose is to seek legal advice, even if they would not…
Admins who use Cisco Webex Services configured to use trust anchors within the SSO integration with Control Hub must install a new identity provider certificate to close a critical vulnerability,…
AI agent building tools enable users to configure Model Context Protocol (MCP) servers may be exposing systems to remote code execution due to an architectural decision in Anthropic’s reference implementation.…
Overwhelmed by an escalating volume of security flaws, the National Institute of Standards and Technology (NIST) has announced significant changes to how it handles cybersecurity vulnerabilities and exposures (CVEs). Rather…
Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs. – Read More
A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender. – Read More
Cybersecurity researchers have warned of an active malicious campaign that’s targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. “PowMix…