Learn how ThreatLocker® can automatically create allowlist policies based on your organization’s needs after deployment.

Federal employee union lawsuit highlights federal cybersecurity and data protection gaps
AFGE v. OMB underscores systemic government data risk. Learn how Zero Trust and FedRAMP solutions like ThreatLocker help protect federal systems.

Swearingen v. Salesforce and Air France exposes cost of token abuse
Swearingen v. Salesforce reveals the high cost of token abuse. Learn how ThreatLocker helps prevent OAuth token exploitation and SaaS data breaches.

Union Home Mortgage data breach: Lessons and hardening checklist for CISOs
Union Home Mortgage breach exposes PII of 25k+ people. See what CISOs can learn, cost estimates, and a one-week hardening checklist to prevent recurrence.

Morton v. Salesforce and TransUnion puts SaaS trust on trial
Morton v. Salesforce and TransUnion separates allegations from acknowledged facts and shows CISOs how to blunt vishing-driven SaaS breaches with concrete controls.

Meta lawsuit puts permissions creep in the spotlight
Permissions creep quietly expands access rights across enterprises, creating major security risks. The Meta whistleblower lawsuit highlights the dangers of unchecked access. Learn how Zero Trust principles—least privilege, JITA, segmentation, and Ringfencing—help organizations regain control and reduce insider and external threats.

Why data breach class actions are surging and how CISOs can respond
Data breach lawsuits are rising fast, with class actions filed within hours of disclosure. Learn why litigation is accelerating and how CISOs can reduce risk.

Why breach notification delays can trigger lawsuits and liability
On August 14, 2025, in Boston federal court, two former employees of DTiQ Technologies filed a class action lawsuit claiming the company failed to promptly notify them after their sensitive information was exposed in a cyberattack. The plaintiffs allege they did not learn of the breach until more than six months after DTiQ discovered it, leaving them vulnerable to fraud and identity theft.

How a hacker deleted one Gmail account and disrupted an entire business
A hacker hijacked Café Melo’s sole Gmail account, wiping years of records, contracts, and customer contacts. The incident triggered a lawsuit and highlights how small businesses risk collapse when operations rely on a single account without proper cybersecurity safeguards.

Former employees accused of exploiting access to steal company data
A federal lawsuit filed in the U.S. District Court for the District of Arizona, Phoenix Division highlights how quickly sensitive business data can be taken and used by competitors if the right cybersecurity protections aren’t in place.

Tampa Bay manufacturer files lawsuit over cybersecurity breach
A former VP is accused of accessing proprietary design files after termination, prompting a federal lawsuit by Tampa Bay-based Coating Technology Inc. The case highlights the importance of securing cloud-stored data.

Ransom screen hijacks Treasure Global website in apparent cyberattack
Treasure Global’s domain was allegedly hijacked in a cyberattack redirecting users to an intimidating ransomware screen. The company has sued both Namecheap and an unknown hacker.

Cyberattack fallout surfaces in Exela Technologies bankruptcy
Exela Technologies’ 2025 bankruptcy, linked to an alleged ransomware attack on its subsidiary DocuData Solutions, reveals the devastating financial impact of cyber incidents. With over $1 billion in liabilities, the case underscores how security failures can escalate into corporate collapse—especially for data-centric businesses handling sensitive legal, healthcare, or government information.

Traditional endpoint security exposes quantitative trading firm to breach
Trade secrets walked out the door. Zero Trust could have stopped it. A senior developer is accused of converting intellectual property he had created for one company into a startup blueprint for another in a classic case of insider-led data exfiltration.
Try ThreatLocker free for 30 days and experience full Zero Trust protection in your own environment.
Schedule a demo customized to your environment and explore how ThreatLocker aligns with your security goals.
Just starting to explore our platform? Find out what ThreatLocker is, how it works, and how it’s different.