News & Analysis as of

Cyber Attacks Hackers Data Privacy

Gray Reed

Unpacking the Texas Data Privacy & Security Act: A Company’s Guide for Navigating Compliance

Gray Reed on

As businesses grapple with the evolving, regulatory landscape for data privacy, the Texas Data Privacy & Security Act (TDPSA) emerges as a pivotal law. This comprehensive legislation, effective July 1, 2024, established...more

Sands Anderson PC

Ransomware Increasingly Targets Medical Providers

Sands Anderson PC on

Ransomware continues to make headlines in the data security world, and with good reason.  A report issued earlier this year by the Director of National Intelligence highlighted the continued surge in ransomware attacks in the...more

PilieroMazza PLLC

Coming Soon! CISA’s Proposed Rule on Government-wide Cybersecurity Reporting Requirements for Contractors

PilieroMazza PLLC on

The Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) was enacted in 2022 with the primary purpose of preserving national security, economic security, and public health and safety. CIRCIA provides the Director...more

Hogan Lovells

CL0P ransomware gang is on the rise

Hogan Lovells on

CL0P is adopting “quadruple extortion” tactics. If your organization has received a ransomware demand, CL0P may be a familiar name. In 2023, CL0P was the third most prolific ransomware gang, after Lockbit and ALPHV....more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

Dinsmore & Shohl LLP

Still on Top: Cybersecurity Incidents Ranked #1 Global Business Threat in 2024

Dinsmore & Shohl LLP on

Regardless of an organization's scale, cyberattacks and other cybersecurity incidents, such as data loss or merchant/vendor incidents, pose a significant threat to businesses globally. A quick search online easily identifies...more

Carlton Fields

Change Healthcare Cyberattack Emphasizes Importance of Cybersecurity Readiness; Considerations for Hardening Your Cybersecurity...

Carlton Fields on

As the health care industry continues reeling from the recent Change Healthcare ransomware attack that crippled large portions of the U.S. health care system, health care providers are naturally reminded of the importance of...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Stoel Rives - Global Privacy & Security Blog®

The Confidentiality (Or Not) Of Cyber-Forensics In A Data Breach

Data breaches are on the rise.  So are the lawsuits that follow.  This has led to an environment where cyber-forensics service providers are more important than ever.  Clients seeking these services, however, often do so...more

Woodruff Sawyer

Looking Ahead: Cyber Liability Insurance Concerns in 2024

Woodruff Sawyer on

Followers of the cyber insurance market over the past two years may be suffering from whiplash—that’s how dramatically the market shifted from 2022 to 2023. A perfect storm of good trends and facts combined to create a soft...more

Wilson Sonsini Goodrich & Rosati

Cybersecurity: What to Watch for in 2024

In 2024, businesses will continue to face an evolving landscape of cyber threats, along with an increasingly complex regulatory environment. With heightened scrutiny from regulators, consumers, and investors, the need to...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - November 2023 #3

Robinson & Cole LLP on

CYBERSECURITY - New York Governor Proposes Cybersecurity Regulations for NY Hospitals - On November 13, 2023, Governor Kathy Hochul released proposed cybersecurity regulations applicable to all hospitals located within...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - November 2023 #2

Robinson & Cole LLP on

CYBERSECURITY - Hackers Steal $4.4M Crypto Using Data Linked to LastPass Breach - According to Bleeping Computer, crypto fraud researchers at ZachXBT, and MetaMask developer Taylor Monahan have reported that on October 25,...more

Katten Muchin Rosenman LLP

Cybersecurity Awareness Dos and Donts Refresher

As we have adjusted to a combination of hybrid, in-person and remote work conditions, bad actors continue to exploit the vulnerabilities associated with our work and home environments. Below are a few tips to help employers...more

Ballard Spahr LLP

Digital Planning Podcast Episode: When Cyber Attacks Hit Home

Ballard Spahr LLP on

Cyber security impacts everyone who has a computer, tablet, mobile device, or on-line presence. With cyber-attacks occurring every day, we are all potential targets who should constantly be monitoring our cyber behaviors. In...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 9, September 2023

Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2023 - #2

Robinson & Cole LLP on

CYBERSECURITY - Patch Adobe ColdFusion Vulnerabilities Being Exploited in the Wild ASAP - Adobe has issued alerts on three vulnerabilities affecting its ColdFusion product. The first alert, issued on July 11, 2023,...more

Robinson+Cole Data Privacy + Security Insider

Unpatched Fortinet Vulnerability Being Exploited by Threat Actors

According to cybersecurity researchers at Bishop Fox, “hundreds of thousands” of FortiGate firewalls have not been patched against a known vulnerability and are at risk of being attacked by threat actors using the unpatched...more

Bennett Jones LLP

The Ontario Court of Appeal Confirms the Narrow Confines of the Tort of Intrusion Upon Seclusion

Bennett Jones LLP on

2022 continued to be positive for institutional clients involved in privacy breach class actions, with the Ontario Court of Appeal refusing to expand the tort of intrusion upon seclusion to impose liability on institutions...more

The Volkov Law Group

Ransomware Criminal Prosecution of Russian National Underscores Pervasive Ransomware Risks

The Volkov Law Group on

In today’s world of cyber threats, many companies have fallen victim to ransomware attacks.  Corporate boards and senior executives face serious issues when their companies are attacked. The payment of ransom is not only...more

Cozen O'Connor

No Action for Theft of Personal Information Without Loss

Cozen O'Connor on

Theft of personal information does not by itself entitle the victim to damages in Canada; proof of loss or harm is required, the Alberta Court of Appeal held recently in Setoguchi v Uber BV. This, and other recent decisions,...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2023 #2

Robinson & Cole LLP on

CYBERSECURITY - Clop Claims Zero-Day Attacks Against 130 Organizations - Russia-linked ransomware gang Clop has claimed that it has attacked over 130 organizations since late January, using a zero-day vulnerability in...more

Burr & Forman

Cybersecurity Checklist for Vendor Management – Vendor Security

Burr & Forman on

By now, you have heard many news stories about debilitating cyberattacks that started with the compromise of a vendor's systems and ultimately wreaked havoc on that vendor's customers. As a result, many businesses are seeking...more

Troutman Pepper

Cyber Capsule - January 2023

Troutman Pepper on

A thesis statement for this month's Cyber Capsule might be "You're Doing It Wrong." Whether it's easily guessable passwords, manipulated URLs, or waiting longer than prudent to report a data breach, most of our items look at...more

357 Results
 / 
View per page
Page: of 15

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide