<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with cyberlaw]]></title><description><![CDATA[A list of topics that have been tagged with cyberlaw]]></description><link>https://board.circlewithadot.net/tags/cyberlaw</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 03:57:40 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/cyberlaw.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[The sentencing of Nicholas Moore (one-year probation) serves as a case study in credential-based breaches.]]></title><description><![CDATA[The sentencing of Nicholas Moore (one-year probation) serves as a case study in credential-based breaches. By compromising one set of credentials, Moore gained access to the U.S. Supreme Court, AmeriCorps, and the VA."This highlights the persistent danger of "low-effort" entry points into high-value targets.How are your organizations hardening against credential stuffing and lateral movement in the public sector?Source: https://techcrunch.com/2026/04/17/man-who-hacked-us-supreme-court-filing-system-sentenced-to-probation/ Engage with us in the thread. Follow for more technical breakdowns and vulnerability news.#InfoSec #Pentesting #OpSec #GovWare #CyberLaw #Technadu]]></description><link>https://board.circlewithadot.net/topic/65d10fe1-3a23-4109-93c2-6dea20fcaadb/the-sentencing-of-nicholas-moore-one-year-probation-serves-as-a-case-study-in-credential-based-breaches.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/65d10fe1-3a23-4109-93c2-6dea20fcaadb/the-sentencing-of-nicholas-moore-one-year-probation-serves-as-a-case-study-in-credential-based-breaches.</guid><dc:creator><![CDATA[technadu@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>