Software Code of Practice: building a secure digital future – NCSC Blog
New voluntary code of practice for technology providers defines a market baseline for cyber security. – Read More
New voluntary code of practice for technology providers defines a market baseline for cyber security. – Read More
Imagine a vast, ancient library, the Library of All Secrets. Within its countless shelves reside every code, message, and hidden truth ever recorded. For centuries, these secrets have been safe,…
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that masquerades as a seemingly harmless Discord-related utility but incorporates a remote access trojan. The package…
A federal jury on Tuesday decided that NSO Group must pay Meta-owned WhatsApp WhatsApp approximately $168 million in monetary damages, more than four months after a federal judge ruled that…
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?quality=50&strip=all 2126w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Volker Buß, CISO…
The High Court has ordered that a barrister and the solicitors who instructed her be referred to their regulators after providing five fake case citations in their pleadings. The post…
A conveyancer has described how she refused to give in to a scammer who threatened to post more fake one-star reviews of her law firm unless she gave him her…
National firm Knights yesterday announced its 24th acquisition since listing in 2018 with a £16.6m deal for Essex law firm Birkett Long that will take its annual revenues to over…
Developing a “proactive policy” to prevent wellbeing issues from arising appears to be a “significant challenge” for most law firms, a report by the IBA has found. The post Law…
CISA added CVE-2025-34028 to its catalog of known exploited vulnerabilities, citing active attacks in the wild. – Read More
The vulnerability, which has a CVSS score of 9.8, is under attack and allows threat actors to remotely execute arbitrary commands on servers running the agentic AI builder. – Read…
What about the lawyers? The Law Society has expressed disappointment at the exclusion of legal services from the India-UK free trade agreement (FTA) announced by the government today. The participation…
Key Takeaways: Business users need a simple and straightforward way to request contracts, especially for standard contracts like NDAs or CDAs. It’s important to provide business users with a quick…
Two initiatives designed to raise national cyber resilience announced at the NCSC’s CYBERUK 2025 conference. – Read More
Threat actors have been observed actively exploiting security flaws in GeoVision end-of-life (EoL) Internet of Things (IoT) devices to corral them into a Mirai botnet for conducting distributed denial-of-service (DDoS)…