Cyberattackers Target LastPass, Top Password Managers – Dark Reading
Be aware: a rash of phishing campaigns are leveraging the anxiety and trust employees have in password vaults securing all of their credentials. – Read More
Be aware: a rash of phishing campaigns are leveraging the anxiety and trust employees have in password vaults securing all of their credentials. – Read More
Researchers discovered more than 550 unique secrets exposed in Visual Studio Code marketplaces, prompting Microsoft to bolster security measures. – Read More
Cybercriminals aren’t just using AI — they’re weaponizing it. Deepfakes, automated phishing, and AI-written malware are emerging as some of the fastest-growing threats on the enterprise radar. According to Foundry’s…
The CISO job has outgrown its old definition. What started as a technical role has become a test of strategy, stamina, and leadership — and the scope keeps widening. According…
AI might help some threat actors in certain respects, but one group is proving that its use for cyberattacks has its limits. – Read More
Benchmarking company Vals AI today (16 October) released a highly-anticipated report that evaluates and compare how AI products perform on legal research tasks and compares legal AI tools to ChatGPT…
Residential property trend data for Q3 2025 reveals a market held back by uncertainty as speculation over potential reforms to property taxes ahead of the Autumn Budget weighs on market…
The latest data page figures, compiled by Moneyfacts, are now available. – Read More
A threat actor with ties to the Democratic People’s Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking…
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers such as Atomic (AMOS), Lumma, Rhadamanthys…
This interactive webinar, hosted by Legal IT Insider’s editor Caroline Hill and featuring Ben Firth and Tim Coles from Thomson Reuters, dives into one of the most pressing questions in…
An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. “This…
In the 46th episode of Charting Change in Legal, lead analyst, Ari Kaplan and Caroline Hill, editor and publisher of Legal IT Insider, discuss Legal IT Insider’s 30th anniversary, reimagining…
Aderant kicked off its London user conference yesterday (15 October) with a keynote from president and CEO Chris Cartrett, who outlined the company’s strategic priorities for the year ahead, with…
Scaling the SOC with AI – Why now? Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960…