News & Analysis as of

Software Malware

Guidepost Solutions LLC

Change Healthcare Ransomware Attack: 10 Lessons Learned

Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more

Opportune LLP

Supply Chain Optimization and Weather Impacts with Alteryx

Opportune LLP on

In today's interconnected global economy, supply chain optimization plays a critical role in driving business success. However, unpredictable weather events such as hurricanes, tropical storms, and extreme weather conditions...more

Ankura

Ankura CTIX FLASH Update - December 2023

Ankura on

Malicious Android Apps Used to Target Iranian Banks - An ongoing Android malware campaign targeting users of Iranian financial institutions has expanded to include new abilities to target an even greater number of people...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

Ankura

Ransomware: The Top 5 Myths and Misconceptions

Ankura on

Ransomware has become a major threat to businesses across the world as cyber-attacks are becoming increasingly sophisticated, resulting in devastating financial damage for companies that fall victim. Not only are important...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #361 – Beware of ChatGPT-Themed Scams

Researchers at Meta, the owner of Facebook released a report this week that indicated that, since March 2023, Meta “has blocked and shared with our industry peers more than 1,000 malicious links from being shared across our...more

Ankura

Notable Cyberattack Methods and Common Targets of 2022

Ankura on

Cyberattacks are a constant threat to businesses, organizations, governments, and individuals worldwide. In order to stay secure against cybercriminal activity, it is essential to understand the various cyberattack methods...more

Dunlap Bennett & Ludwig PLLC

“Why Can’t They Just Ban It?”: Practical Suggestions For The Federal Government To Ban TikTok

This is the final article of a three-article series about the challenges the American federal government faces in its efforts to ban TikTok. The first article set up the legal and political posture of attempts to ban TikTok...more

Ankura

Ankura CTIX FLASH Update - October 2022

Ankura on

New NullMixer Malware Campaign Spreading Through Cracked Software Websites - An emerging campaign was recently discovered by Kaspersky researchers spreading the "NullMixer" malware. NullMixer exfiltrates victims'...more

Ankura

Ankura CTIX FLASH Update - August 2022 - 2

Ankura on

Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

Poisoned Robots: Data Poisoning Threatens AI-Powered Mechanisms

Takeaway: Companies need to be vigilant about feeding their machines clean data to avoid hackers poisoning their networks. Artificial intelligence is everywhere: from facial recognition technology to weather forecasting. ...more

ArentFox Schiff

Privacy Update: FCC Seeks Public Comment on the Current and Future Regulation of the "Internet of Things"

ArentFox Schiff on

FCC Seeks Public Comment on the Current and Future Regulation of the “Internet of Things” - The FCC is requesting public comment in a proceeding that will help determine the scope and nature of regulation of the “Internet of...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Patch Tuesday Includes Six Zero Day-Related Vulnerabilities

IT professionals leave room in their schedules for Microsoft’s monthly Patch Tuesday just as I leave room in my schedule every Wednesday night for blog writing. ...more

Robinson+Cole Data Privacy + Security Insider

SolarWinds Cyber-Attack Has Significant Implications for Developers and Contractors

ICYMI, on Wednesday, January 6, 2021, the United States Department of Justice (DOJ) issued an update about what it termed “a major incident under the Federal Information Security Modernization Act”: the global SolarWinds...more

Society of Corporate Compliance and Ethics...

Chinese tax software contains malware

Report on Supply Chain Compliance 3, no. 18 (September 17, 2020) - In June of 2020, Trustwave SpiderLabs, a cybersecurity firm, announced it had found malware on tax software downloaded by a client. The malware was embedded...more

Robinson+Cole Data Privacy + Security Insider

U.S. Organizations Doing Business in China Warned of Malware in Tax Software

The Federal Bureau of Investigations (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint Flash Alert to U.S. based businesses doing business in China about a remote targeting campaign...more

Association of Certified E-Discovery...

Sean O’Shea: Tips for Paralegals and Litigation Support Professionals – February 2019

Jury Can Decide Bad Faith Intent for Rule 37 Sanctions - In a slip and fall case, Carnival was found to have failed to take reasonable steps to preserve CCTV video. Judge Goodman noted the fact that its 30(b)(6)...more

Robinson+Cole Data Privacy + Security Insider

Intel Bug Affects Millions of Devices

Intel has confirmed that a bug in its remote server management tool, known as Management Engine, which allows administrators of IT systems to remote access devices to apply updates or troubleshoot problems for users, allows...more

King & Spalding

United States Department Of Justice Seeks To Dismantle Massive Kelihos Botnet, Files Complaint In Federal District Court

King & Spalding on

The United States Department of Justice (“DOJ”) recently announced that it would be undertaking an “extensive effort to disrupt and dismantle the Kelihos botnet – a global network of tens of thousands of infected computers...more

Morgan Lewis

Data Breach Trends

Morgan Lewis on

Verizon’s annual report investigating data breach information finds that phishing—which it defines as malicious correspondence involving a link or attachment to install malware on the victim’s computer or system—is still the...more

Blake, Cassels & Graydon LLP

Reminder: CASL’s Software Installation Provisions Took Effect on January 15, 2015

Phase 2 of Canada’s Anti-Spam Legislation (CASL) relating to the installation of computer programs will come into force on January 15, 2015. Commonly referred to as the malware prohibition, CASL goes far beyond prohibiting...more

21 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide