You’re all signed up for Risk Channel
Thank you for your interest in our service.
Watch out for a confirmation email from our subscriptions team. Once you have confirmed you will join the worldwide community of over 14,000 subscribers who are receiving daily Risk intelligence to lead, innovate and grow.
Note: Due to the nature of this message you may find this in your "promotions" or "spam" folders, please check there. If nothing arrives within a few minutes let us know. If you do not receive this email we will be happy to help get you set up.
Adding the email address [email protected], will help to ensure all newsletters arrive directly to your inbox.
Recent Editions
Risk Channel
North America
U.S. semiconductor firm Broadcom is suing EU antitrust regulators in Luxembourg-based General Court, Europe's second-highest, over their requests for documents containing legal advice from the company's U.S. lawyers in a case related to VMware, which it acquired in 2023. "This filing is a procedural action solely to protect Broadcom's rights under the long-recognized rules on legal professional privilege in non-EU countries, including the U.S.," said the company, adding: "As a U.S.-headquartered company with global operations, Broadcom regards legal professional privilege as a fundamental right that must be protected and our action is narrowly tailored to address only this interest." Broadcom said it is acting on a matter of principle and is otherwise cooperating with the European Commission's requests for information.
Full Issue
Risk Channel
UK/Europe
Verizon has said software flaws rather than stolen passwords have become the dominant entry point for hackers. In a review of more than 31,000 incidents in its annual Data Breach Investigations Report, Verizon found 31% started with vulnerability exploitation. The report said attackers are using AI to spot and exploit known vulnerabilities at machine speed, with the technology accelerating attacks from months to hours. Hackers are “demonstrably using GenAI to help at different stages of attack including targeting, initial access, and development of malware and other tools . . . AI’s primary impact is currently operational: automating and scaling techniques defenders already know how to detect, not yet unlocking these novel or rare attack surfaces.” Meanwhile, employees are not waiting for IT approval before adopting AI tools. Unapproved AI usage at work tripled from 15% to 45% of the workforce, making “shadow AI” the third most common source of non-malicious data leakage.
Full Issue