Latest Posts › Data Security

Share:

Confronting social engineering in the age of artificial intelligence

AI-enabled technology enhances threat actors’ ability to engage in advanced and difficult-to-detect forms of social engineering to deceive employees and circumvent companies’ security controls. Companies may consider new...more

Security Snippets: CISA publishes sector-specific cyber performance goals for IT and product design

The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more

Security Snippets: Survey indicates that a large share of employees circumvent company cyber policies

A new study finds that a majority of employees may sidestep their company’s security policies to be more productive, including policies related to workplace AI. It may come as little surprise that employees try to find ways...more

5 Members of the Scattered Spider Cybercrime Group Federally Charged on November 20, 2024

Five individuals who are alleged to be members of the Scattered Spider cybercrime group have been charged with multiple crimes after a federal investigation into an advanced social engineering attacks that targeted at least...more

CL0P ransomware gang is on the rise

CL0P is adopting “quadruple extortion” tactics. If your organization has received a ransomware demand, CL0P may be a familiar name. In 2023, CL0P was the third most prolific ransomware gang, after Lockbit and ALPHV....more

Preparing for the CCPA draft regulations on cybersecurity audits

The California Privacy Protection Agency recently released updated draft regulations regarding cybersecurity audits under the California Consumer Privacy Act. On November 8, 2023, the California Privacy Protection Agency...more

Security Snippets: Espionage group expands global phishing campaign

Russia-linked threat actor Fancy Bear is conducting a wave of phishing campaigns impersonating entities across Europe, Americas, and Asia, focusing on Ukraine-related targets....more

Security Snippets: New trojan Coyote

Coyote, a new Brazilian malware, is currently hunting down credentials for sixty-one (61) different banking applications. Researchers expect the malware to spread internationally. Russian cybersecurity firm Kaspersky has...more

Security Snippets: Linux systems exposed to boot loader attack

New vulnerability found in the boot process for Linux systems configured to boot over the network. A high severity vulnerability could allow attackers to take over a Linux system. The vulnerability is in the shim software...more

Security Snippets: New Critical Jenkins Vulnerability

Vulnerability in the open-source automation server Jenkins is exploitable using a publicly released proof of concept. On January 24, 2024, Jenkins announced the presence of vulnerability CVE-2024-23897. The vulnerability...more

Security Snippets: Fortra GoAnywhere file transfer tool vulnerability discovered

Vulnerabilities in enterprise file transfer solutions can lead to elevated risk. Now would be a good time to check your organization’s managed filed transfer service....more

Security Snippets: Rapid SCADA vulnerabilities create risk

Industrial automation platform Rapid SCADA contains seven key vulnerabilities. CISA recently published an advisory about seven vulnerabilities in Rapid SCADA—an open-source industrial automation platform that provides tools...more

Security Snippets: Ivanti faced with a third critical vulnerability according to CISA

CISA has added a new Ivanti vulnerability to its known exploited vulnerability catalogue. This vulnerability can be paired with other recently-reported vulnerabilities to permit threat actors to write malicious web shell...more

Security Snippets: Microsoft SharePoint vulnerability to watch out for

A vulnerability in Microsoft SharePoint has been flagged as being actively exploited by CISA. A vulnerability in Microsoft SharePoint is being actively exploited according to CISA’s known exploited vulnerabilities (KEV)...more

California Consumer Privacy Act: The Challenge Ahead – The CCPA’s “Reasonable” Security Requirement

This is the eleventh installment in Hogan Lovells’ series on the California Consumer Privacy Act. Much of the focus on the California Consumer Protection Act (“CCPA”) has been on the new rights that it affords California...more

Regulatory Insights for Life Sciences and Health Care Investments: Data Privacy and Cybersecurity

Investing in the life sciences industry without an understanding of the key regulatory factors that could determine a product’s success or failure could cost you millions of dollars....more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide