Data page – October 2025 – Law Gazette – Features
The latest data page figures, compiled by Moneyfacts, are now available. – Read More
The latest data page figures, compiled by Moneyfacts, are now available. – Read More
A threat actor with ties to the Democratic People’s Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking…
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers such as Atomic (AMOS), Lumma, Rhadamanthys…
This interactive webinar, hosted by Legal IT Insider’s editor Caroline Hill and featuring Ben Firth and Tim Coles from Thomson Reuters, dives into one of the most pressing questions in…
An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. “This…
In the 46th episode of Charting Change in Legal, lead analyst, Ari Kaplan and Caroline Hill, editor and publisher of Legal IT Insider, discuss Legal IT Insider’s 30th anniversary, reimagining…
Aderant kicked off its London user conference yesterday (15 October) with a keynote from president and CEO Chris Cartrett, who outlined the company’s strategic priorities for the year ahead, with…
Scaling the SOC with AI – Why now? Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960…
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older,…
Die Mehrheit der Deutschen fühlt sich von hybriden Angriffen bedroht. Mehaniq – shutterstock.com Eine Mehrheit der Menschen in Deutschland sieht das Land einer aktuellen YouGov-Umfrage zufolge durch hybride Angriffe bedroht.…
One of the key elements to detecting cyberattacks is the concept of observability. We can literally see the packets of data being thrown towards a website when a DoS attack…
Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and…
More than seven in 10 IT leaders are worried about their organizations’ ability to keep up with regulatory requirements as they deploy generative AI, with many concerned about a potential…
The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us…
CONGRATULATIONS to our newly qualified Solicitors who attended our Admission Ceremony on Wednesday 15th October 2025 at Exeter Guildhall. We welcomed the largest cohort in recent years from 15 firms…