What the Coinbase Breach Says About Insider Risk – Dark Reading
The lesson from the breach is not just about what went wrong — but what could have gone right. – Read More
The lesson from the breach is not just about what went wrong — but what could have gone right. – Read More
The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. “Under the guise of freelance…
Dark Reading Confidential Episode 8: Federal funding for the CVE Program expires in April 2026, and a trio of experts agree the industry isn’t doing enough to deal with the…
Shaun, founder of Big Yellow Penguin and author of Ditch The Billable Hour!, joined Amy Bruce, marketing director of Osprey Approach, for episode three of the Empowering Law Firm Leaders…
In the first six months of 2025, cybercriminals have already stolen billions of credentials, exploited thousands of vulnerabilities, and launched record-breaking ransomware attacks–leaving security teams and organizations worldwide scrambling to…
Using the API Connections for Azure Logic Apps, a security researcher found unauthenticated users could access sensitive data of other customers. – Read More
Ransomware-Gangster erpressen Ingram Micro. JHVEPhoto | shutterstock.com Anfang Juli 2025 wurde bekannt, dass der IT-Dienstleister Ingram Micro von einer Ransomware-Attacke betroffen ist. Diese zog auch einen mehrtägigen Ausfall der IT-Systeme…
‘Fair and transparent structure’ Shoosmiths has joined the summer salary surge, announcing a bump to £105k for its London newly-qualified solicitors (NQs). Meanwhile, the firm has also taken the opportunity…
Regulators have issued a warning to law firms and claims management companies about their conduct of motor finance claims ahead of tomorrow’s Supreme Court ruling. The post SRA and FCA…
Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and…
Cybersecurity researchers have uncovered a troubling new attack vector where threat actors are weaponizing free trials of endpoint detection and response (EDR) software to disable existing security tools — a…
The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack. The cyber-physical…
Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle…
The latest data page figures, compiled by Moneyfacts, are now available. – Read More
Spill the (chambers) tea… Last week, Legal Cheek launched an open thread exploring solicitor salaries after the training contract — aiming to shed light on an area often shrouded in…