The Next Chapter for Contract Nerds – Contract Nerds
Hello Fellow Nerds! I founded Contract Nerds in 2020 as a pandemic passion project. What started as one LinkedIn post about contracts, quickly grew into a community and media platform…
Hello Fellow Nerds! I founded Contract Nerds in 2020 as a pandemic passion project. What started as one LinkedIn post about contracts, quickly grew into a community and media platform…
Attackers impersonate the National Police of Ukraine to deploy Amatera Stealer and PureMiner, using malicious Scalable Vector Graphics to trick victims. – Read More
In this latest TalkingTech product demonstration, Legal IT Insider’s editor Caroline Hill sat down with Dr. Caspar Roxburgh, product lead at Draftable, to walk through some new features now available…
Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden software bugs to massive DDoS attacks and new ransomware tricks, this…
Mit dem SaaS Security Capability Framework (SSCF) hat die Cloud Security Alliance (CSA) einen neunen Sicherheitsstandart festgelegt. Danielala – shutterstock.com Das SaaS Security Capability Framework (SSCF) der Cloud Security Alliance…
DASLS AUTUMNM DINNER A BIG thank you to all of the guests who attended the DASLS Autumn Dinner on the 26th September 2025 at The Castle Hotel Taunton. We had…
A Chinese state-sponsored hacker group called RedNovember has conducted a global espionage campaign targeting critical infrastructure between June 2024 and July 2025, compromising defense contractors, government agencies, and major corporations…
Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points. A comprehensive survey of 282 security leaders at companies across…
In a newly disclosed multi-stage threat campaign, attackers were seen skipping disk and leaning on in-memory tricks to deliver the XWorm remote access trojan (RAT). According to Forcepoint Labs’ findings,…
Hitting a different kind of bar? Credit: @mrnathist A mystery woman has recently garnered attention on social media after being filmed reading The Secret Barrister’s latest book in the middle…
Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade…
Taz Aldeek says he wants to start ‘living for today’ Taz Aldeek A YouTubing junior barrister has gone public with his decision to quit his job as a prosecutor after…
Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted in the wild, raising software supply chain risks. According to…
Who’s leading the way in junior lawyer pay? Exclusive research from Legal Cheek has revealed the eye-watering pay packets of junior lawyers at the UK’s top firms, with fresh-faced 20-somethings…
If you can’t see your entire operational technology environment, you can’t defend it. New guidance from the NCSC will help you gain that visibility. – Read More