The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more
4/30/2025
/ Cloud Computing ,
Cyber Attacks ,
Cyber Espionage ,
Cybersecurity ,
Data Breach ,
Email ,
Espionage ,
Extortion ,
Incident Response Plans ,
Multi-Factor Authentication ,
Phishing Scams ,
Popular ,
Ransomware ,
Risk Management ,
Supply Chain ,
Third-Party Risk
ComplexDiscovery Editor’s Note: Apple’s aggressive stance on privacy has earned both praise and penalty, most recently, a €150 million fine from the French Competition Authority. This significant enforcement action challenges...more
4/8/2025
/ Apple ,
Competition ,
Cybersecurity ,
Data Privacy ,
Data Security ,
Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
Enforcement Actions ,
EU ,
France ,
Privacy Laws ,
Technology Sector
In a critical revelation within the realm of digital privacy, a significant data breach was uncovered involving key players in the dating app industry. Approximately 1.5 million explicit images from users of BDSM People,...more
Editor’s Note: White-collar investigations can send shockwaves through an organization, demanding swift, strategic, and legally sound responses. In a recent HaystackID® webcast, experts broke down the complexities of...more
A major cyberattack on Jaguar Land Rover (JLR) has cast a spotlight on the persistent threat of ransomware targeting global corporations. The HELLCAT ransomware group is behind this latest breach, exposing internal documents,...more
The controversy surrounding TikTok has dominated political discussions for years. Critics claim the app is a national security risk, a data funnel to the Chinese Communist Party, and a vehicle for foreign propaganda. TikTok,...more
3/14/2025
/ Algorithms ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Federal Trade Commission (FTC) ,
National Security ,
Privacy Laws ,
Social Media ,
TikTok
Between January 2023 and June 2024, cyber threats targeting Europe’s financial sector escalated, posing risks to banks, financial service providers, and regulatory bodies. According to the ENISA Threat Landscape: Finance...more
3/4/2025
/ Compliance ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Digital Operational Resilience Act (DORA) ,
ENISA ,
Financial Services Industry ,
Fraud ,
Ransomware ,
Supply Chain
The United Kingdom is taking a strategic approach to artificial intelligence (AI) adoption within its public sector to drive economic growth and improve public services. Central to this effort is the UK’s AI Playbook, a...more
In the quiet corridors of Apple’s headquarters, executives face a decision that could reshape the future of digital privacy for billions of users worldwide. The catalyst? A controversial order from the United Kingdom’s...more
Editor’s Note: The recent HaystackID® webcast, “Protect Sensitive Data and Control Costs: An eDiscovery Blueprint for the Construction Industry,” explored the challenges of managing vast and complex construction data while...more
2/7/2025
/ Artificial Intelligence ,
Association of Certified eDiscovery Specialists (ACEDS) ,
Compliance ,
Construction Industry ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Management ,
Data Privacy ,
Data Security ,
Document Review ,
e-Discovery ,
Legal Technology ,
Litigation Strategies ,
Machine Learning ,
Technology-Assisted Review
In a major development within the global artificial intelligence (AI) industry, OpenAI has lodged serious accusations against DeepSeek, a Chinese AI startup, alleging that the latter has illegally utilized its proprietary...more
2/3/2025
/ Artificial Intelligence ,
China ,
Competition ,
Cybersecurity ,
Ethics ,
Intellectual Property Protection ,
Machine Learning ,
Patent Infringement ,
Patent Litigation ,
Popular ,
Technology Sector ,
Unfair Competition
The economic landscape in December 2024 revealed a dynamic interplay between consumer spending, corporate strategy, and transactional activity, offering critical insights into the evolving M&A environment. Recent data from...more
1/24/2025
/ Acquisitions ,
Cybersecurity ,
Department of Justice (DOJ) ,
e-Discovery ,
e-Discovery Professionals ,
Federal Trade Commission (FTC) ,
Hart-Scott-Rodino Act ,
Incident Response Plans ,
Information Governance ,
Interest Rates ,
Mergers ,
Premerger Notifications ,
Regulatory Agenda ,
Risk Management
The PowerSchool data breach, discovered on December 28, 2024, serves as a powerful reminder of the persistent cybersecurity challenges confronting the education sector. PowerSchool, a leading provider of education technology,...more
1/10/2025
/ Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
e-Discovery Professionals ,
Educational Institutions ,
Information Governance ,
Ransomware ,
Students
As the global markets look towards 2025, a dynamic evolution is anticipated within the landscape of mergers and acquisitions (M&A). Key strategic drivers such as regulatory adjustments, monetary policy normalizations, and...more
1/8/2025
/ Acquisitions ,
Artificial Intelligence ,
Cybersecurity ,
Data Protection ,
e-Discovery ,
e-Discovery Professionals ,
Information Governance ,
Investment ,
Mergers ,
Private Equity ,
Regulatory Reform ,
Technology Sector
In an era marked by rapid technological advancement, artificial intelligence has emerged as a transformative force in cybersecurity threats, particularly in the domain of sophisticated phishing attacks. Recent developments...more
Editor’s Note: HaystackID® brought together industry experts in a recent webcast to discuss the interplay of artificial intelligence (AI), data management, and cross-functional collaboration in modern organizations. The...more
1/2/2025
/ Artificial Intelligence ,
Compliance ,
Cybersecurity ,
Data Management ,
Data Privacy ,
Data Security ,
e-Discovery Professionals ,
EDRM ,
Machine Learning ,
NIST ,
Popular
December 2024 marks a pivotal milestone in international cybersecurity cooperation as the Tallinn Mechanism concludes its first year of operations, having mobilized over $210 million in targeted assistance for Ukraine’s...more
The European Data Protection Board (EDPB) has released a comprehensive opinion addressing key data protection concerns related to the development and deployment of artificial intelligence (AI) models. The opinion, requested...more
12/19/2024
/ Artificial Intelligence ,
Cybersecurity ,
Data Protection ,
e-Discovery Professionals ,
European Data Protection Board (EDPB) ,
European Supervisory Authorities (ESAs) ,
General Data Protection Regulation (GDPR) ,
Information Governance ,
Ireland ,
Personal Data ,
Risk Assessment ,
Training
The intersection of economic indicators and Hart-Scott-Rodino (HSR) transaction trends provides a detailed view of the evolving mergers and acquisitions (M&A) environment. These insights are essential for professionals...more
12/13/2024
/ Acquisitions ,
Artificial Intelligence ,
Compliance ,
Cross-Border Transactions ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Protection ,
Department of Justice (DOJ) ,
Document Review ,
e-Discovery ,
Federal Trade Commission (FTC) ,
Hart-Scott-Rodino Act ,
Information Governance ,
Integration ,
Mergers ,
Popular ,
Regulatory Requirements ,
Risk Assessment ,
Risk Mitigation ,
Transparency
ComplexDiscovery Editor’s Note: In this month’s Vendor Voices, ComplexDiscovery OÜ explores the dynamic developments in eDiscovery, cybersecurity, and information governance throughout November 2024. From the latest edition...more
12/9/2024
/ Artificial Intelligence ,
Cybersecurity ,
Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
Ethics ,
Information Governance ,
Innovative Technology ,
Legal Technology ,
Machine Learning ,
Technology-Assisted Review
ComplexDiscovery Editor’s Note: Sandra Joyce’s keynote at the Tallinn Digital Summit 2024 offers a vital look into the shifting dynamics of the cyber threat landscape. As an annual gathering of leaders from the digitally...more
12/4/2024
/ Artificial Intelligence ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Deep Fake ,
Discovery ,
e-Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
Information Governance ,
Information Technology ,
Legal Project Management ,
North Korea ,
Phishing Scams ,
Popular
The intersection of economic indicators and HSR transaction trends offers essential insights for professionals navigating mergers and acquisitions (M&A). This report analyzes the most recent data on HSR filings, U.S. economic...more
11/15/2024
/ Acquisitions ,
Bureau of Economic Analysis ,
Cross-Border ,
Cybersecurity ,
e-Discovery ,
Economic Growth ,
Federal Trade Commission (FTC) ,
Hart-Scott-Rodino Act ,
Information Governance ,
Mergers ,
Premerger Notifications
A series of recent cybersecurity breaches reveals significant vulnerabilities within educational and technology institutions, underscoring the urgent need for strengthened defenses. Among the most prominent incidents is the...more
11/14/2024
/ Breach of Implied Contract ,
Class Action ,
Cloud Service Providers (CSPs) ,
Cybersecurity ,
Data Breach ,
Data Security ,
Educational Institutions ,
Hackers ,
Investigations ,
Negligence ,
Passwords ,
Personal Data ,
Popular
ComplexDiscovery’s Editor’s Note: This concise analysis delves into the historical trends of Second Requests in U.S. antitrust review, spanning from 2000 to 2023. It explores how these trends correlate with presidential...more
11/8/2024
/ Antitrust Provisions ,
Cybersecurity ,
Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
Enforcement ,
Federal Trade Commission (FTC) ,
Mergers ,
Premerger Notifications ,
Regulatory Agenda ,
Regulatory Oversight
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
11/6/2024
/ Artificial Intelligence ,
Business E-Mail Compromise (BEC) ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
e-Discovery ,
Email ,
Employee Training ,
Extortion ,
Fines ,
Fraud ,
Fund Transfers ,
Hackers ,
Incident Response Plans ,
Information Governance ,
Machine Learning ,
Malware ,
Multi-Factor Authentication ,
Passwords ,
Phishing Scams ,
Popular ,
Ransomware ,
Reporting Requirements ,
Securities and Exchange Commission (SEC) ,
Sensitive Business Information ,
Social Engineering ,
Spoofing