No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
Trustwave has reported a new scheme in which threat actors are using the popular Facebook Messenger platform to steal Facebook login credentials. According to the report, the threat actors are using a phishing email to...more
Over the past sixty days, the Ankura Cybersecurity team has worked with clients to solve cybersecurity challenges involving the rampantly exploited Log4Shell vulnerability, recent security changes within Meta (Facebook), and...more
CYBERSECURITY - FBI and DHS Warn of Russian Cyberattacks Against Critical Infrastructure - U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that...more
CYBERSECURITY - New Jersey Settles with Cancer Center Over Business Email Compromise - One of the challenging things about HIPAA (Health Insurance Portability and Accountability Act) enforcement is the fact that both the...more
CYBERSECURITY - FBI Warning: M&A Activity Targeted by Ransomware Groups - The FBI issued a Private Industry Notification on November 2, 2021, warning companies that “ransomware actors are very likely using significant...more
CYBERSECURITY - Cyber Criminals Focusing on Clinics + Business Associates - As hospital systems become more hardened to cyber-attacks, cyber criminals are focusing their efforts on smaller providers, such as outpatient...more
After a series of denials, it has emerged that Colonial Pipeline reportedly paid 75 Bitcoin (roughly $5 million) to recover its stolen data from last weekend’s ransomware attack. The move likely put a quicker end to the...more
Stocks fell again on Wednesday, the third day of losses in a row, and bond yields rose, spurred on by a 4.2% CPI increase as compared to a year ago. Though analysts were expecting that surge ...more
More details on that massive ransomware hack that hit Colonial Pipeline over the weekend. The FBI has confirmed that hacking group DarkSide was responsible and that it’s “looking for any ties the group might have to...more
My mother-in-law lives on a farm in rural Oklahoma. Living out in the country was a dream of my in-laws for a long time, and after retiring, they made it a reality over 19 years ago. They bought 43 acres of land, and the goal...more
CYBERSECURITY - $50 Million Ransom Demand is Largest Ever - In what is being reported as the largest ransom demand ever, Taiwanese electronics and computer manufacturer Acer has reportedly been hit with a ransomware...more
We often think of phony financial institution emails as a bad actor’s phishing scheme of choice to capture confidential bank account numbers or other private financial information. While those phishing emails certainly do...more
U.S. Judge Halts Trump's TikTok Ban, Hours Before It was Set to Start - "John Hall, an attorney for TikTok, said that the app, with some 100 million American users, is a 'modern day version of the town square' and shutting...more
TikTok Will Partner with Oracle in the United States After Microsoft Loses Bid - "TikTok and Oracle will become business partners in the United States — a deal meant to satisfy the Trump administration's national security...more
Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more
The Editors' Note - Welcome to the third issue of Decoded, Spilman's e-newsletter focusing on technology law, including data security, privacy standards, financing technologies, and digital-based means of conducting...more
Consumer spending at stores and auto dealerships increased in June, the second straight month, but the recent uptick in coronavirus cases could slow future growth....more
Apple announced that the coronavirus outbreak that’s brought Chinese manufacturing to a near-standstill and continues to spread around the world will affect its quarterly sales expectations. The news makes Apple “one of the...more
A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more
A federal court of appeals recently found that there was nothing wrong with a company monitoring a departed employee’s Facebook account and using that information to pursue a trade secrets claim against four former employees....more
Can a former employer’s alleged misconduct defeat a request for injunctive relief against former employees when those departing workers take confidential information and clients to another employer? A federal appeals court...more
Scherer Design Group (“SDG”) sued several of its former employees for starting a competing business (while still employed), stealing trade secrets, and stealing clients. The trial court entered an injunction against the...more
This Update highlights key legal and policy developments in cybersecurity and privacy law that may impact important trends for 2019 and beyond. A central takeaway from 2018 is that regulators in the U.S. and abroad are...more
This week the Securities and Exchange Commission (SEC) issued an investigative report that outlined cyber incidents that nine public companies had experienced, causing fraudulent losses totaling more than $100 million. The...more
As we previously noted, Facebook originally announced a breach late last month, where hackers took advantage of a code vulnerability in the website’s “View As” feature, to access user’s data. ...more