6 things keeping CISOs up at night – CSO Online
CISOs have a lot on their minds, from team’s burn out, AI risks to the pressure of proving business value, security leaders are juggling a complex range of threats. The…
CISOs have a lot on their minds, from team’s burn out, AI risks to the pressure of proving business value, security leaders are juggling a complex range of threats. The…
Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000 devices, primarily across Portugal, Spain, France, Morocco, Peru, and Hong Kong.…
Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren. Roman Samborskyi | shutterstock.com Lösungen im Bereich Breach & Attack Simulation (BAS) unterstützen Unternehmen dabei,…
There are “millions” of motor finance customers in the same position as Marcus Johnson – whose claim succeeded before the Supreme Court – his solicitor has declared. The post Car…
The FCA yesterday confirmed that it would issue a consultation in early October on a motor finance compensation scheme, stressing that consumers need not use a law firm or CMC.…
The Solicitors Disciplinary Tribunal has rejected an argument from a solicitor made subject to a general civil restraint order that his “underlying motivation” was “noble”. The post Misconduct by solicitor…
HM Land Registry will now accept deeds signed with qualified electronic signatures and is encouraging lawyers and their clients to start using them. The post Land Registry starts accepting qualified…
Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control over compromised networks. Palo Alto Networks Unit 42 said it…
Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection for a year. “The implant is built as a malicious PAM (Pluggable Authentication…
SonicWall SSL VPN devices have become the target of Akira ransomware attacks as part of a newfound surge in activity observed in late July 2025. “In the intrusions reviewed, multiple…
Random numbers are the cornerstone of cryptographic security — cryptography depends on generating random keys. As organizations adopt quantum-resistant algorithms, it’s equally important to examine the randomness underpinning them –…
Dark Reading’s 2025 News Desk marks a decade of Black Hat USA memories. We’re making our return with a slate of interviews that help you stay up on the latest…
The Supreme Court this afternoon overturned the Court of Appeal’s ruling in the motor finance litigation – with one exception, the unfair relationship under the Consumer Credit Act. The post…
The new precedent enables legal professionals to efficiently search for and retrieve relevant precedent language directly from a curated content library in Microsoft Word The post Litera accelerates legal workflows…
Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could result in remote code execution. The vulnerability, tracked as CVE-2025-54135…