#law-firm-cybersecurity

[ follow ]
Digital life
fromwww.dw.com
3 hours ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
Marketing tech
fromBloomberglaw
7 hours ago

Meta Cases Put Social Media Platforms at Securities Fraud Risk

Social media platforms face new legal challenges regarding their role in facilitating fraudulent securities schemes.
fromArs Technica
19 hours ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
#ai
Law
fromTheregister
1 day ago

AI spread through law. Here's what happened next

AI's rapid advancements in coding are overshadowed by significant downsides, particularly in legal systems where hallucinations lead to unreliable outputs.
fromFast Company
3 days ago
Artificial intelligence

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Law
fromTheregister
1 day ago

AI spread through law. Here's what happened next

AI's rapid advancements in coding are overshadowed by significant downsides, particularly in legal systems where hallucinations lead to unreliable outputs.
Artificial intelligence
fromFast Company
3 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
fromNature
15 hours ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#ai-governance
fromBusiness Matters
1 day ago

Monica Goyal: Leading the Shift to AI in Law

"I work in legal innovation. To be successful, you need to understand both the law and the technology behind it."
Women in technology
#artificial-intelligence
Law
fromAbove the Law
4 days ago

On-Demand Webinar: The Path To AI Maturity In The Legal Industry - Above the Law

Artificial intelligence is essential for legal professionals, requiring a strategic approach to transition from experimentation to full business transformation.
Law
fromAbove the Law
4 days ago

On-Demand Webinar: The Path To AI Maturity In The Legal Industry - Above the Law

Artificial intelligence is essential for legal professionals, requiring a strategic approach to transition from experimentation to full business transformation.
Startup companies
fromAbove the Law
22 hours ago

The Startup Bet Lawyers Keep Misunderstanding - Above the Law

Lawyers must embrace uncertainty in startups, viewing their careers as investments rather than relying solely on traditional risk-averse training.
EU data protection
fromComputerWeekly.com
16 hours ago

UK reliance on US big tech companies is 'national security risk', claims report | Computer Weekly

The UK is at risk due to over-reliance on US tech companies for critical infrastructure, impacting national security.
#cybersecurity
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Silicon Valley
fromWIRED
1 day ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
3 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Privacy professionals
fromSecurityWeek
6 hours ago

Nightclub Giant RCI Hospitality Reports Data Breach

RCI Hospitality Holdings reported a cybersecurity incident exposing sensitive personal information of independent contractors due to an IDOR vulnerability.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
UK news
fromwww.independent.co.uk
1 day ago

Phone firms should use technology to stop children taking nudes, police chief says

Tech firms must enhance children's online safety by preventing the creation of nude images on their devices, according to law enforcement officials.
fromIPWatchdog.com | Patents & Intellectual Property Law
1 day ago

IPWatchdog Announces Leadership Promotions to Support Continued Growth and Strategic Expansion

Renée's leadership extends well beyond operations. While I focus on external-facing initiatives such as content, programs, and strategic vision, she oversees the core business functions of the company, including finance and HR, and is instrumental in driving our growth.
Media industry
#kraken
Information security
fromFinbold
3 hours ago

Kraken insider extortion reveals remote work security blind spot

Kraken experienced an insider security breach affecting 2,000 client accounts, highlighting vulnerabilities in remote-first working models.
Information security
fromBitcoin Magazine
22 hours ago

Crypto Exchange Kraken Faces Extortion Attempt After Insider Access Incidents Involving Support Staff

Kraken experienced two insider-related security incidents but confirmed no systems were breached and no client funds were at risk.
Information security
fromFinbold
3 hours ago

Kraken insider extortion reveals remote work security blind spot

Kraken experienced an insider security breach affecting 2,000 client accounts, highlighting vulnerabilities in remote-first working models.
Information security
fromBitcoin Magazine
22 hours ago

Crypto Exchange Kraken Faces Extortion Attempt After Insider Access Incidents Involving Support Staff

Kraken experienced two insider-related security incidents but confirmed no systems were breached and no client funds were at risk.
#meta
Social media marketing
fromQuartz
4 days ago

Meta yanks plaintiff lawyer recruitment ads for addiction lawsuits

Meta is removing ads from law firms soliciting plaintiffs in lawsuits over social media addiction claims.
Social media marketing
fromQuartz
4 days ago

Meta yanks plaintiff lawyer recruitment ads for addiction lawsuits

Meta is removing ads from law firms soliciting plaintiffs in lawsuits over social media addiction claims.
Privacy technologies
fromHer Campus
1 day ago

Why Website Cookies Aren't As Sweet As They Sound

Website cookies can raise serious privacy concerns due to their role in tracking user behavior and collecting personal data.
Roam Research
fromThe Hacker News
3 days ago

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

Webloc is a global geolocation surveillance system used by various law enforcement agencies, providing access to data from millions of mobile devices.
Law
fromAbove the Law
20 hours ago

Biglaw Firm Sued For Firing Staffer A Month After Returning From Disability - Above the Law

Firing an employee shortly after disability leave, amid claims of a hostile work environment, can lead to legal repercussions.
Privacy professionals
from404 Media
2 hours ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
#data-integrity
Marketing tech
fromAdExchanger
1 day ago

AI Is Nothing Without Data Fidelity. Here's A Four-Step Approach to Protect It | AdExchanger

Data integrity is crucial for effective AI in advertising, as flawed data leads to poor outcomes.
Marketing tech
fromAdExchanger
1 day ago

AI Is Nothing Without Data Fidelity. Here's A Four-Step Approach to Protect It | AdExchanger

Data integrity is crucial for effective AI in advertising, as flawed data leads to poor outcomes.
#data-breach
EU data protection
fromTNW | Data-Security
1 day ago

Basic-Fit hit by hack affecting members across multiple countries, including 200,000 in the Netherlands

Basic-Fit experienced a data breach affecting 200,000 members, exposing personal and bank details but not passwords or identity documents.
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Privacy professionals
fromTechCrunch
6 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromTheregister
1 month ago

LexisNexis Legal & Professional confirms data breach

LexisNexis Legal & Professional division experienced a data breach affecting legacy servers, with Fulcrumsec claiming responsibility for exploiting a vulnerable React container to access approximately 2 GB of data.
EU data protection
fromTNW | Data-Security
1 day ago

Basic-Fit hit by hack affecting members across multiple countries, including 200,000 in the Netherlands

Basic-Fit experienced a data breach affecting 200,000 members, exposing personal and bank details but not passwords or identity documents.
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Privacy professionals
fromTechCrunch
6 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromTheregister
1 month ago

LexisNexis Legal & Professional confirms data breach

LexisNexis Legal & Professional division experienced a data breach affecting legacy servers, with Fulcrumsec claiming responsibility for exploiting a vulnerable React container to access approximately 2 GB of data.
Information security
fromThe Hacker News
5 hours ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
#ai-in-law
Law
fromLos Angeles Times
11 hours ago

Attorneys used AI to write court filings, cited fake legal decisions, State Bar alleges

Three attorneys in California face discipline for submitting AI-generated court filings with nonexistent legal citations.
Law
fromAbove the Law
3 days ago

What The Legal Industry Can Learn About AI Hallucinations From Auditors - Above the Law

AI-generated legal documents can contain convincing errors, necessitating stronger governance and review processes in law firms.
Law
fromLos Angeles Times
11 hours ago

Attorneys used AI to write court filings, cited fake legal decisions, State Bar alleges

Three attorneys in California face discipline for submitting AI-generated court filings with nonexistent legal citations.
Law
fromAbove the Law
3 days ago

What The Legal Industry Can Learn About AI Hallucinations From Auditors - Above the Law

AI-generated legal documents can contain convincing errors, necessitating stronger governance and review processes in law firms.
Marketing tech
fromAcast
5 days ago

AI Governance Isn't a Barrier: It's Marketing's Growth Engine | Adspeak

AI is transforming marketing by enabling innovation through governance, clean data, and balancing automation with human creativity.
Privacy professionals
fromRoute Fifty
1 day ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
Law
fromAbove the Law
1 day ago

Morning Docket: 04.13.26 - Above the Law

White House ballroom construction has resumed, while various legal and corporate developments unfold across the country.
Privacy professionals
fromSecurityWeek
1 day ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
Law
fromPadailypost
11 hours ago

DA sued for paying prosecutor not to work

A lawsuit claims Santa Clara County DA Jeff Rosen wastes taxpayer money by paying a prosecutor to stay home amid budget cuts.
Law
fromAbove the Law
19 hours ago

Legal Ethics Roundup: Billing 34.5 Hours In A Day, New ABA Recusal Opinion, Shortcomings In SCOTUS Ethics Rules, Pro Se AI Sanctions, Extra Time For Bar Exam, Purging Immigration Judges & More - Above the Law

Lawyers must disclose information that could lead to a judge's disqualification, balancing this with client confidentiality obligations.
Privacy professionals
fromMail Online
1 day ago

Warning to iPhone users over iCloud storage scam exposing bank details

A new email scam targets iPhone users, posing as iCloud notifications to steal personal and banking information.
Law
fromTechCrunch
20 hours ago

IBM pays $17M fine to end DOJ suit over DEI programs | TechCrunch

IBM settled for $17 million over allegations of illegal DEI practices in hiring and promotions.
Information security
fromSecurityWeek
7 hours ago

Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities

CISA expanded its Known Exploited Vulnerabilities catalog with seven new vulnerabilities, including critical Windows and Adobe flaws.
Law
fromABA Journal
4 days ago

BigLaw firm faces questions over $35M bill

Alberto Safra challenges a $35 million bill from Wilmer Cutler Pickering Hale and Dorr, raising concerns over high charges and billing practices.
#phishing
Information security
fromTechzine Global
6 hours ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Information security
fromThe Hacker News
1 day ago

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

The FBI and Indonesian National Police dismantled a global phishing operation using the W3LL toolkit, preventing over $20 million in fraud.
Information security
fromTechzine Global
6 hours ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Information security
fromThe Hacker News
1 day ago

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

The FBI and Indonesian National Police dismantled a global phishing operation using the W3LL toolkit, preventing over $20 million in fraud.
Privacy professionals
fromSecurityWeek
5 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
Law
fromAbove the Law
3 days ago

Lawyers Should Stay Away From A Client's Office Politics - Above the Law

Attorneys should avoid office politics when representing clients to ensure effective communication and minimize internal conflicts.
Information security
fromTechCrunch
21 hours ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
Law
fromIndependent
3 days ago

Computer engineer claims he was penalised for flagging Israeli links of firm given 'bananas' server access at top Irish cybersecurity company

A cyber-security firm reprimanded an engineer for discriminatory comments regarding an Israeli company's access to its servers amid concerns about Palestinian genocide.
fromSecurityWeek
5 hours ago

Triad Nexus Evades Sanctions to Fuel Cybercrime

Triad Nexus has reinstated its global fraud engine, shifting its focus toward emerging markets while maintaining a persistent threat to Western enterprise assets.
Information security
fromwww.businessinsider.com
5 hours ago

We're in a new era of heightened CEO safety measures, security pros say

This attack is just shedding light on the fact that you're even more vulnerable outside of the office, said Don Aviv, CEO of Interfor International, a security consultancy.
Information security
#ransomware
Information security
fromSecuritymagazine
6 days ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Information security
fromSecuritymagazine
6 days ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Law
fromMy Shingle
1 week ago

813 Solos Signed Their Names While Big Law and GCs Hid

High-powered lawyers filed briefs anonymously, while solo and small firm lawyers openly signed in opposition to retaliatory executive orders.
Law
fromAbove the Law
1 week ago

Why 'Helpful' Legal AI Is Often The Least Trustworthy - Above the Law

Lawyers distrust legal AI not due to safety concerns, but because it often feels inattentive and overly polite.
Information security
fromTheregister
18 hours ago

Ransomware scum, other crims exploit 4 old Microsoft bugs

Four Microsoft vulnerabilities are actively exploited, including one from 2012, prompting CISA to urge federal agencies to patch them within two weeks.
Law
fromAmericanbar
6 days ago

What to Keep in Mind When Designing Your Law Firm's Website

Law firm websites establish credibility, generate business, enhance client service, and improve AI visibility.
Information security
fromTechzine Global
1 day ago

Adobe patches vulnerability that steals data via PDFs

A sophisticated attack exploits a vulnerability in Adobe Reader via malicious PDF files to gather sensitive information and potentially execute arbitrary code.
World news
fromDataBreaches.Net
2 months ago

Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists - DataBreaches.Net

Most surveyed journalists and security researchers face legal or criminal threats, yet most do not retract or change their work in response.
#legal-technology
#data-security
fromSecurityWeek
4 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
fromComputerworld
1 week ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Privacy professionals
fromDataBreaches.Net
2 months ago

You're not paranoid: lawyers ARE coming to get you. - DataBreaches.Net

Failure of federal regulators to act after patient-data breaches can prompt state attorneys general and class-action lawsuits seeking money and corrective action plans.
Information security
fromAbove the Law
2 months ago

Think You Are Covered? Better Read Your Cybersecurity Policy - Carefully - Above the Law

Cyber insurance often fails to fully protect organizations due to exclusions, leaving law firms particularly vulnerable without proper cybersecurity and coverage review.
[ Load more ]