News & Analysis as of

Software Phishing Scams

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Ankura

Ankura CTIX FLASH Update - December 2023

Ankura on

Malicious Android Apps Used to Target Iranian Banks - An ongoing Android malware campaign targeting users of Iranian financial institutions has expanded to include new abilities to target an even greater number of people...more

BakerHostetler

Threat Actors Target Academic Researchers in Phishing Schemes

BakerHostetler on

The FBI has announced that university aerospace researchers, both foreign and in the U.S., have become a target of a specific phishing scheme that is being conducted by threat actors. Specifically, researchers with access to...more

K2 Integrity

Cybersecurity Awareness Month: Evading Phishing Attacks

K2 Integrity on

This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more

Mitratech Holdings, Inc

Secure Our World: 4 Work-Related Security Best Practices for Cybersecurity Awareness Month

Mitratech Holdings, Inc on

It’s Cybersecurity Awareness Month, and this year marks the 20th anniversary of the campaign. Introducing “Secure Our World” as the central theme, the Cybersecurity Infrastructure and Security Agency (CISA) is on a...more

K2 Integrity

Cybersecurity Awareness Month: Installing Updates to Fix Bugs and Vulnerabilities

K2 Integrity on

This article is the third in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity has been providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication

K2 Integrity on

This article is the second in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity will be providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

K2 Integrity

Cybersecurity Awareness Month: Maintaining Good Password Hygiene

K2 Integrity on

It’s important to stay secure throughout the year, and in October, cybersecurity takes on even more significance: since 2004, it has been designated as Cybersecurity Awareness Month. In the 20 years since its inception,...more

Ankura

Ransomware: The Top 5 Myths and Misconceptions

Ankura on

Ransomware has become a major threat to businesses across the world as cyber-attacks are becoming increasingly sophisticated, resulting in devastating financial damage for companies that fall victim. Not only are important...more

Ankura

When it Comes to Cybersecurity, ChatGPT Needs to Go Back to School

Ankura on

With interest in Artificial intelligence (AI) soaring, we were curious to determine how well a very popular ‘generative AI’ tool, ChatGPT, could perform at identifying the leading causes of cybersecurity incidents experienced...more

Ankura

Notable Cyberattack Methods and Common Targets of 2022

Ankura on

Cyberattacks are a constant threat to businesses, organizations, governments, and individuals worldwide. In order to stay secure against cybercriminal activity, it is essential to understand the various cyberattack methods...more

Bass, Berry & Sims PLC

Privacy Peril: Red, White and Secure

Bass, Berry & Sims PLC on

Enable multifactor authentication. Use a trusted password manager. Use strong passwords. Recognize and report phishing. Update your software regularly....more

Porter Hedges LLP

Cybersecurity Best Practices: Disclosure Requirements for Risk Management, Strategy, and Governance

Porter Hedges LLP on

In previous posts on the Porter Hedges Anti-Corruption & Compliance Blog, our team has discussed the U.S. Securities and Exchange Commission’s (“SEC”) proposal to amend its rules and require disclosures related to...more

Planet Depos, LLC

Protecting your Law Firm against Ransomware Attacks

Planet Depos, LLC on

Have you heard of ransomware? It is a term often in the news. Ransomware is a type of malware. For those who have heard of it but don’t know what exactly it is, malware is a type of software that is designed to disrupt,...more

Foley & Lardner LLP

Security Measures to Deploy Now to Defend Against a Russian Cyberattack

Foley & Lardner LLP on

On February 22, 2022, U.S. Department of Homeland Security Secretary Alejandro Mayorkas warned critical infrastructure organizations located in the United States of possible cyberattacks by Russian state-sponsored actors in...more

Dechert LLP

COVID-19 Coronavirus Business Impact: Cybersecurity and Remote Working

Dechert LLP on

Many workers and employers are adjusting to remote working as a result of the COVID-19 pandemic. That shift has created a unique opportunity for cyber-attackers and criminals – the European Union Agency for Cybersecurity has...more

Carlton Fields

Spoofing Whales: How Companies Can Protect Their CEOs and CFOs from the "Business Email Compromise”

Carlton Fields on

Cyber scammers continually innovate new means to extract valuable information from unsuspecting victims. And a new form of cyber fraud is exploiting the close relationship between CEOs and CFOs. Identifying this threat — and...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide