News & Analysis as of

Risk Mitigation Data Protection Hackers

Robinson+Cole Data Privacy + Security Insider

New Threat: Scattered Spider International Coalition of Hackers

Cyber adversaries in China and Russia continue to be a formidable threat to U.S. based companies. In the past, scams might be detected because a word was misspelled or the context didn’t make sense. Now, with the help of...more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Carlton Fields

No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward...

Carlton Fields on

Jayson Street, the dynamic chief adversarial officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “world-class hacker” on National Geographic’s "Breakthrough” series episode “Cyber...more

Robinson+Cole Data Privacy + Security Insider

Red Cross Creates Rules for Civilian Hackers in Conflict Zones

The International Committee of the Red Cross (ICRC) has taken a new step to regulate the activities of civilian hackers in conflict zones. To address the rise in the involvement of civilian hackers in inter-state conflicts,...more

Robinson+Cole Data Privacy + Security Insider

Unpatched Fortinet Vulnerability Being Exploited by Threat Actors

According to cybersecurity researchers at Bishop Fox, “hundreds of thousands” of FortiGate firewalls have not been patched against a known vulnerability and are at risk of being attacked by threat actors using the unpatched...more

Baker Donelson

Hackers Can Steal Encryption Keys From a Distance Using Video

Baker Donelson on

On June 13, security researchers disclosed their findings that encryption keys for wireless devices are vulnerable to theft. This research found that cameras in cellular phones or commercial surveillance systems can be used...more

Woodruff Sawyer

Cyber Liability for Trustees: Preventing and Managing Breaches

Woodruff Sawyer on

A friend—a small business owner—recently shared a very stressful situation. She had a significant cyber breach that almost cost them hundreds of thousands of dollars. What happened? She had hired a new assistant and issued a...more

Polsinelli

Cybersecurity To-Dos in 2023

Polsinelli on

Introduction - The cybersecurity threat landscape continues to evolve and present new challenges pertaining to the protection of electronically stored information. Innovative “hacking” tactics constantly emerge and...more

Wilson Sonsini Goodrich & Rosati

FTC Announces Settlement with Drizly; Complaint Names CEO in His Individual Capacity

On October 24, 2022, the Federal Trade Commission (FTC) announced a proposed consent order against Drizly and its CEO, James Cory Rellas, over the online alcohol marketplace company’s data breach incident in 2020, which...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

Opportune LLP

Defense In-Depth: Cybersecurity For Energy

Opportune LLP on

Glenn Hartfiel, Principal, and Geoff Yut, Consultant, at Opportune LLP discuss why recent geopolitical events are heightening the need for the implementation of improved cybersecurity measures in the energy industry, why...more

Robinson+Cole Data Privacy + Security Insider

Cyber-Attackers Politically Aligned

The most recent Accenture Global Incident Report (the Report) shows that cyber-attackers have political views and are divided between support for Russia or Ukraine. According to the Report, entitled “Global Incident...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #321 – California AG Warns Consumers About ID Theft from T-Mobile Breach

On March 2, 2022, California Attorney General Rob Bonta urged individuals affected by the T-Mobile breach in 2021 to take advantage of resources to assist with preventing or responding to identity theft. According to the...more

Health Care Compliance Association (HCCA)

FBI: More Awareness, Due Diligence Needed To Fight China in New ‘Space Race’ for Data

Report on Patient Privacy 21, no. 10 (October, 2021) - Conducting a risk analysis is a basic tenet of security compliance, with the overarching goal of understanding where protected health information (PHI) “lives” in an...more

Womble Bond Dickinson

Hacking Is Changing: Should Our Data Security Change?

Womble Bond Dickinson on

In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2021 #3

Robinson & Cole LLP on

CYBERSECURITY - FBI, CISA + NSA Issue Conti Ransomware Advisory - On September 22, 2021, the Federal Bureau of Investigations (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security...more

Reveal

Healthcare Organizations Must Deal with their Shadow Information Problem

Reveal on

A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

Health Care Compliance Association (HCCA)

Nick Culbertson on Compliance Breaches in Healthcare

Preventing data breaches is a critical task for all businesses these days, but it’s especially so in healthcare. No one wants to see health information disclosed, and the risks of a ransomware attack are enormous, literally...more

Oberheiden P.C.

Cybersecurity Compliance Programs for Law Firms

Oberheiden P.C. on

Law firms process sensitive information on a daily basis. Confidential client data is targeted by hackers and insiders for a variety of reasons including financial gain or retaliatory purposes. When a law firm has a security...more

King & Spalding

Ransomware on the Rise in Critical Infrastructure Sector

King & Spalding on

Recent ransomware attacks against U.S. critical infrastructure, which includes the energy sector’s production of oil and natural gas, and other sources of electricity and power, have shed a spotlight on the importance of...more

Womble Bond Dickinson

Best Practices for Managing Cyber Risks in a Cyber World

Womble Bond Dickinson on

The shift to a work-from-home economy has enabled companies and employees to continue functioning during the pandemic but one unintended consequence of this overnight transition has been the increased risk of cyberattacks....more

Hogan Lovells

IoT in the EU: Lessons from COVID-19, and next steps for liability and regulation

Hogan Lovells on

The IoT sector has exploded over the past few years, and, even taking into account the globally inhibitive effects of COVID-19, this growth shows few long-term signs of abating. The buoyant, fast-paced IoT industry was the...more

NAVEX

[Webinar] Top Risk Management Lessons from the SolarWinds Hack - January 27th, 10:00 am - 11:00 am PT

NAVEX on

Last month there was a cyber-attack suspected to have been perpetrated by Russian hackers. The attack was traced back to third party – a network management software vendor, SolarWinds. Among its 300,000 customers, SolarWinds...more

McAfee & Taft

Tips to jump-start cybersecurity preparedness

McAfee & Taft on

We are all facing new challenges in this pandemic, including the shift to and growth of remote-work. Meanwhile, we also have to contend with the increased volume of attempted cyberattacks. Despite the distraction of the...more

68 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide