Going native at law’s next frontier – Law Gazette – Features
The way that AI-native law firms handle legal tasks and processes points to an evolution of ‘outcomes as a service’. – Read More
The way that AI-native law firms handle legal tasks and processes points to an evolution of ‘outcomes as a service’. – Read More
White-collar crime. – Read More
Our legislation on the division of assets on divorce was forged in the 1970s. With reform on the cards, what should be kept? Catherine Baksi reports. – Read More
The Competition Appeal Tribunal has decided against relaxing its conflict of interest rule for panel members and chairs, saying case-by-case recusals would not be a sufficient safeguard. The post CAT…
Many firms are being forced to reassess where growth will come from. Increasingly, the answer lies in operational excellence: creating capacity from existing teams. The post Want sustainable growth? Look…
A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. “The attack begins with social engineering lures delivered…
The Russian nation-state hacking group known as Sandworm has been attributed to what has been described as the “largest cyber attack” targeting Poland’s power system in the last week of…
AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action in real time, pushing productivity beyond human speed across the…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited…
Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures. – Read More
Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass authentication. The new attacks are different from a previous campaign…
Security researchers exploited dozens of vulnerabilities in vehicle infotainment systems and EV chargers during the latest Pwn2Own contest at Automotive World 2026. – Read More
Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover. – Read More
GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders. – Read More
Cybercriminals have built structured criminal groups with an organizational model similar to that of a legitimate business. “Cybercrime has become industrialized, a return on investment (ROI)-oriented economy, focused on speed…