Lammy announces £20m grant for legal support sector – Legal Futures
The government has unveiled a grant of nearly £20m over two and a half years to back legal support charities. The post Lammy announces £20m grant for legal support sector…
The government has unveiled a grant of nearly £20m over two and a half years to back legal support charities. The post Lammy announces £20m grant for legal support sector…
The Law Society has argued against banning use of the term ‘no win, no fee’ by solicitors, which would risk diverting consumers to unregulated firms. The post SRA urged not…
It’s almost 25 December, so it must be time for the annual Christmas blog from Nigel Wallis, consultant solicitor at O’Connors Legal Services. The post Santa’s Costa Living Crisis appeared…
Sarah-Jane Davies, head of legal operations at steel giant ArcelorMittal, says that this has been a year in which law firms awakened to the fact that in-house legal teams are…
With attacks on the critical firewall vulnerability, WatchGuard joins a list of edge device vendors that have been targeted in recent weeks. – Read More
Reena SenGupta, CEO and founder of RSGI, and Tom Saunders, communities and client director at RSGI, sat down with us to discuss an exciting 2025 in which one of the…
Telegram users in Uzbekistan are being targeted with Android SMS stealer malware, and what’s worse, the attackers are improving their methods. – Read More
Fraudsters have started using AI to create fake documents claiming that artworks are genuine or legally owned, the Financial Times reports. According to art insurance brokers at Marsh, chatbots and…
Cybersecurity researchers have disclosed details of a new malicious package on the npm repository that works as a fully functional WhatsApp API, but also contains the ability to intercept every…
A collective of pirate activists say they gained access to 256 million rows of metadata and 86 million audio files, equivalent to around 300 terabytes of data, from Spotify, Billboard…
Legal IT Insider’s editor-in-chief Caroline Hill sat down with CMS’s CIO & CKO, John Craske to reflect on the key milestones of 2025 and what 2026 is likely to have…
A recent upgrade to the RansomHouse ransomware operation has added new concerns for enterprise defenders, introducing a multi-layered encryption update to the group’s double-extortion RaaS model. Also tracked under the…
Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They’re going after the everyday tools we trust most — firewalls, browser add-ons, and…
As the internet becomes an essential part of daily life, its environmental footprint continues to grow. Data centers, constant connectivity, and resource-heavy browsing habits all contribute to energy consumption and…
Cybercriminals and state-sponsored hackers are increasingly exploiting Microsoft’s legitimate OAuth 2.0 device authorization process to hijack enterprise accounts, bypassing multifactor authentication protections and gaining persistent access to sensitive organizational data,…