‘How are junior lawyers using AI?’ – Legal Cheek
Amid the hype and hyperbole, one Legal Cheek reader wonders what real impact technology is having on the day-to-day working lives of trainees and associates In our latest Career Conundrum,…
Amid the hype and hyperbole, one Legal Cheek reader wonders what real impact technology is having on the day-to-day working lives of trainees and associates In our latest Career Conundrum,…
The top legal affairs news stories from this morning and the weekend Blow to consumers as supreme court hands partial win to car finance firms over loans Legal aid cyber-attack…
CISOs and their teams are entering a “new era” of cyberthreats characterized by sophisticated threat actors who operate with “business-like efficiency,” researchers from CrowdStrike conclude in the cybersecurity giant’s 2025…
CISOs have a lot on their minds, from team’s burn out, AI risks to the pressure of proving business value, security leaders are juggling a complex range of threats. The…
Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000 devices, primarily across Portugal, Spain, France, Morocco, Peru, and Hong Kong.…
Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren. Roman Samborskyi | shutterstock.com Lösungen im Bereich Breach & Attack Simulation (BAS) unterstützen Unternehmen dabei,…
There are “millions” of motor finance customers in the same position as Marcus Johnson – whose claim succeeded before the Supreme Court – his solicitor has declared. The post Car…
The FCA yesterday confirmed that it would issue a consultation in early October on a motor finance compensation scheme, stressing that consumers need not use a law firm or CMC.…
The Solicitors Disciplinary Tribunal has rejected an argument from a solicitor made subject to a general civil restraint order that his “underlying motivation” was “noble”. The post Misconduct by solicitor…
HM Land Registry will now accept deeds signed with qualified electronic signatures and is encouraging lawyers and their clients to start using them. The post Land Registry starts accepting qualified…
Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control over compromised networks. Palo Alto Networks Unit 42 said it…
Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection for a year. “The implant is built as a malicious PAM (Pluggable Authentication…
SonicWall SSL VPN devices have become the target of Akira ransomware attacks as part of a newfound surge in activity observed in late July 2025. “In the intrusions reviewed, multiple…
Random numbers are the cornerstone of cryptographic security — cryptography depends on generating random keys. As organizations adopt quantum-resistant algorithms, it’s equally important to examine the randomness underpinning them –…
Dark Reading’s 2025 News Desk marks a decade of Black Hat USA memories. We’re making our return with a slate of interviews that help you stay up on the latest…