Generation gaming – Law Gazette – Features
With generative AI becoming a common fixture of law firm tech in 2025, how will this shape law firms – and their lawyers – in 2026? – Read More
With generative AI becoming a common fixture of law firm tech in 2025, how will this shape law firms – and their lawyers – in 2026? – Read More
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security flaw impacting OpenPLC ScadaBR, citing evidence of active exploitation. The…
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain…
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious packages since last month. According to Socket, these packages…
Eine Sicherheitslücke in Googles KI-Coding-Tool Antigravity erlaubt es Angreifern, Schadcode einzuschleusen. Koshiro K – shutterstock.com Anfang November brachte Google sein KI-gestütztes Coding-Tool Antigravity an den Start. Doch bereits nach 24…
Jeannique Swiegers is part of a new generation of legal engineers redefining how law meets technology. At Sirion, she turns legal language into intelligent systems that help organizations reason, decide,…
We’ve now had two recent decisions in the UK and Germany very close together that have dealt with AI and copyright. I won’t go in detail again on the rulings,…
US firms with ties to projects supporting Ukraine are being targeted by the Russia-aligned RomCom group, which is using fake software updates to drop the Mythic Agent onto victim systems.…
Cuts traditional pathway by two years The College of Legal Practice (CoLP) has unveiled a new four-year solicitor apprenticeship, a move that could see school leavers qualify a full two…
As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based security models and on-premises Privileged Access Management (PAM) solutions no longer suffice. IT…
In this webinar with iManage’s global solutions director Paul Walker, Legal IT Insider’s editor Caroline Hill looked at some of the key highlights and takeaways from Legal IT Insider’s 30th…
Scattered Lapsus$ Hunters targeted Zendesk users through more than 40 fake domains designed to steal credentials and install malware, security researchers said. The fake domains, registered over the past six…
Download the December 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. – Read More
Threats linked to live cases and media-fuelled controversies Threats and abuse aimed at solicitors are on the rise, according to new survey findings that paint a troubling picture of life…
Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. “When users…