Latest Posts › Cyber Attacks

Share:

Indiana Amends Breach Notification Law to Require Notification Within 45 Days

Indiana has amended its breach notification law to require entities to notify individuals “without unreasonable delay, but not more than forty-five (45) days after the discovery of the breach.” It clarifies that a delay is...more

Data Privacy + Cybersecurity Insider - March 2022 #3

CYBERSECURITY - Cyber-Attackers Politically Aligned - The most recent Accenture Global Incident Report (the Report) shows that cyber-attackers have political views and are divided between support for Russia or Ukraine....more

Cyber-Attackers Politically Aligned

The most recent Accenture Global Incident Report (the Report) shows that cyber-attackers have political views and are divided between support for Russia or Ukraine. According to the Report, entitled “Global Incident...more

Data Privacy + Cybersecurity Insider - March 2022 #2

CYBERSECURITY - Chinese APT41 Attacking State Networks - Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber...more

Chinese APT41 Attacking State Networks

Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber threat activity through APT41, which has been linked to China’s...more

Data Privacy + Cybersecurity Insider - March 2022

CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more

CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of destructive malware that is being used to target organizations in Ukraine, with the ongoing...more

Privacy Tip #321 – California AG Warns Consumers About ID Theft from T-Mobile Breach

On March 2, 2022, California Attorney General Rob Bonta urged individuals affected by the T-Mobile breach in 2021 to take advantage of resources to assist with preventing or responding to identity theft. According to the...more

FREE (Yes, FREE!) Cybersecurity Services + Tools from CISA

Organizations often struggle with budgeting for cybersecurity risk and mitigation. It’s hard to see the return on investment for prevention of things that attack the company through the clouds....more

Data Privacy + Cybersecurity Insider - February 2022 #4

CYBERSECURITY - FBI and DHS Warn of Russian Cyberattacks Against Critical Infrastructure - U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that...more

Data Privacy + Cybersecurity Insider - February 2022 #3

CYBERSECURITY - FBI and DHS Warn of Russian Cyberattacks Against Critical Infrastructure - U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that...more

Joint International Advisory Warns of Increased Global Threat of Ransomware

A joint Cybersecurity Advisory issued by U.S. and international partners, entitled “2021 Trends Show Increased Globalized Threat of Ransomware,” warns of “the growing international threat posed by ransomware over the past...more

FBI and DHS Warn of Russian Cyberattacks Against Critical Infrastructure

U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that Russia might launch cyber-attacks against Ukrainian and U.S. networks at the same time it launches...more

Data Privacy + Cybersecurity Insider - February 2022 #2

CYBERSECURITY - Coveware 2021 Q4 Ransomware Report Issued - Coveware issued its 2021 Q4 Ransomware Report on February 1, 2022. The report stated that although average and median ransom payments increased...more

Don’t Wait for the Perfect Time for a Tabletop Exercise

Threat actors don’t wait for a convenient time to attack your company. They attack when it suits them, and when they can find any small opening. Being prepared for different types of attacks helps companies prepare for the...more

Reporting of Breaches Under 500 Due by March 1

HIPAA requires covered entities and business associates to report to the Office for Civil Rights (OCR) all breaches of unsecured protected health information when the incident involves fewer than 500 individuals no later than...more

Coveware 2021 Q4 Ransomware Report Issued

Coveware issued its 2021 Q4 Ransomware Report on February 1, 2022. The report stated that although average and median ransom payments increased “dramatically” in Q4, “we believe this change was driven by a subtle tactical...more

FBI Warns Olympics/Paralympics Participants of Cyber “Activities”

On January 31, 2022, the FBI issued a Private Industry Notification entitled “Potential for Malicious Cyber Activities to Disrupt the 2022 Beijing Winter Olympics and Paralympics,” warning those associated with the Olympics...more

Data Privacy + Cybersecurity Insider - January 2022 #4

CYBERSECURITY - CISA Warns “Every Organization” in U.S. to Assess + Respond to Cyber Risks - The Cybersecurity & Infrastructure Security Agency (CISA) recently issued another warning to “every organization” in the...more

CISA Warns “Every Organization” in U.S. to Assess + Respond to Cyber Risks

The Cybersecurity & Infrastructure Security Agency (CISA) recently issued another warning to “every organization” in the U.S. about cybersecurity risks during the ongoing escalation of tension between the U.S. and Russia over...more

Data Privacy + Cybersecurity Insider - January 2022 #3

CYBERSECURITY - ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022 - ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device...more

ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022

ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device Evaluation group, “the Top 10 Health Technology Hazards list identifies the potential sources of danger...more

Privacy Tip #315 – Redline Malware Used to Steal Saved Credentials

Passwords are so difficult to remember. We all know we shouldn’t use the same or similar passwords across platforms. Stolen password credentials are dumped on the dark web and criminals use the stolen passwords to steal other...more

FBI Warns of Scammers Using QR Codes

The FBI’s Internet Crime Complaint Center (IC3) recently issued a warning alerting consumers that scammers are using malicious QR Codes to reroute unsuspecting customers to malicious sites to try to steal their data....more

Data Privacy + Cybersecurity Insider - January 2022 #2

CYBERSECURITY - New Mexico County Recovering from Ransomware Attack - Another day, another governmental entity hit with a ransomware attack. If you are a resident of Bernalillo County, New Mexico, and you need a marriage...more

890 Results
 / 
View per page
Page: of 36

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide