Decisions and interventions – Law Gazette – Features
Decisions filed recently with the Law Society (which may be subject to appeal). – Read More
Decisions filed recently with the Law Society (which may be subject to appeal). – Read More
Family. – Read More
The evolving AI regulatory landscape, the importance of adopting effective AI assurance mechanisms and the increasing role of AI-specific contractual clauses. – Read More
Leading specialist firm Family Law Partners has eschewed approaches from private equity houses to move instead to employee ownership. The post Top family firm chooses employee ownership over private equity…
A law firm boss who told three personal injury clients their cases had succeeded when actually they had not, and even paid them damages, has been struck off. The post…
A negligence claim against a well-known London law firm over erroneous information it gave to a client’s mortgage lender has been dismissed on the basis of causation. The post Court…
The arbitration community is split down the middle on early determination and expedited procedures, but expects AI to play more of a role in its work, a major global survey…
New SRA guidance on transparency issued last autumn – thinly disguised as continued support for COLPs, firms and individuals – was without doubt also borne out of regulatory frustration. The…
Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year. “The attack involves…
Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB…
Attackers have been exploiting a critical zero-day vulnerability in the Visual Composer component of the SAP NetWeaver application server since early this week. SAP released an out-of-band fix that’s available…
An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit that it claims reveals the limitations of many products in this…
An analysis of more than a half-million mobile apps find encryption problems, privacy issues, and known vulnerabilities in third-party code. What can users and developers do? – Read More
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In this new campaign, the threat…
By focusing on prevention, education, and risk transfer through insurance, organizations — especially SMEs — can protect themselves from the rapidly escalating threats of cyberattacks. – Read More