News & Analysis as of

Artificial Intelligence Cyber Attacks

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #443 – Fake AI Tools Used to Install Noodlophile

Threat actors are leveraging the publicity around AI tools to trick users into downloading the malware known as Noodlophile through social media sites. Researchers from Morphisec have observed threat actors, believed to...more

Eversheds Sutherland (US) LLP

Preparing for Regulation S-P and takeaways from the SEC’s session at the Incident Response Forum Masterclass 2025

On April 22, 2025, Laura D’Allaird, Chief of the SEC’s Cyber and Emerging Technologies Unit (CETU), participated in the Incident Response Forum Masterclass 2025 (Incident Response Masterclass). In the session, titled “SEC...more

DarrowEverett LLP

Generative AI and Trade Secrets: A New Frontier for IP Litigation

DarrowEverett LLP on

As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more

Fisher Phillips

Workplace Law Update: 10 Essential Items on Your May To-Do List

Fisher Phillips on

It’s hard to keep up with all the recent changes to labor and employment law, especially given the rapid pace at which the new administration has been moving on initiatives impacting the workplace and beyond. For the latest...more

Robinson+Cole Data Privacy + Security Insider

Threat Actors Use AI to Launch Identity Theft Scams

Identity theft will continue to rise in 2025. According to the Better Business Bureau of Missouri (BBB), it received over 16,000 identity theft complaints in the past three years. Scammers are “increasingly using advanced...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 6, Issue 4, April 2025

Welcome to our fourth issue of 2025 of Decoded - our technology law insights e-newsletter. We hope you enjoy this issue and thank you for reading. Sector by Sector: How Data Breaches are Wrecking Bottom Lines - “Data...more

Robinson+Cole Data Privacy + Security Insider

AI Powered Bot Targeted 400,000 Websites

SentinelOne researchers have discovered AkiraBot, which is used to target small- to medium-sized company websites with generative AI, and drafted outreach messages for website chats, comments, and contact forms. SentinelOne...more

Axinn, Veltrop & Harkrider LLP

Axinn Associates at the Spring Meeting: Considerations on Data Privacy and AI Usage for Healthcare Companies

The February 2024 ransomware attack on Change Healthcare was the largest healthcare data breach in U.S. history. The attack disrupted operations—impacting patient care and provider finances—and potentially exposed the...more

Morris, Manning & Martin, LLP

Innovation or Insecurity? Rethinking Cybersecurity in the Age of AI

In boardrooms, C-suites, and conference rooms across the country, the rapid pace of AI innovation is capturing the imagination of business leaders. Yet, amid this enthusiasm, there is a concerning trend, namely that many...more

DLA Piper

SEC Roundtable Presents Both Risks and Opportunities of AI in the Financial Industry

DLA Piper on

The Securities and Exchange Commission (SEC) recently hosted a Roundtable on Artificial Intelligence in the Financial Industry in Washington, DC (SEC AI Roundtable). The day-long event, which took place on March 27, 2025,...more

A&O Shearman

Zooming in on AI #18: Cybersecurity requirements for AI systems

A&O Shearman on

The Artificial Intelligence Act (AI Act) is the world's first comprehensive legal framework for AI regulation, which entered into force on August 1, 2024. The AI Act aims to ensure that AI systems are trustworthy, safe and...more

J.S. Held

2025 J.S. Held Global Risk Report: Managing Cyber Risk

J.S. Held on

Cyber incidents such as the 2024 event involving Change Healthcare, which compromised the personal information of over 100 million people, highlight the evolving nature of cyber threats – increasingly becoming risk management...more

Quarles & Brady LLP

Warning! ChatGPT Exploit Used by Threat Actors in Cyber Attacks

Quarles & Brady LLP on

Members of the health care and financial industries, along with other industries that hold sensitive data, are warned that a ChatGPT vulnerability is being actively exploited by threat actors to attack security flaws in AI...more

Ankura

The Transformative Role of Artificial Intelligence in Cybersecurity

Ankura on

AI-Powered: Corporate Strategies Versus Hacker Tactics - How can companies use artificial intelligence to respond more efficiently to threats, and what innovative attack methods are hackers developing with the help of AI?...more

StoneTurn

2025 and Cybersecurity: What is Your Strategy?

StoneTurn on

Cybersecurity in 2025 will continue to face escalating challenges from AI-driven threats, geopolitical tensions, and increased regulatory scrutiny. Organizations must adapt to sophisticated cyberattacks fueled by AI,...more

Hogan Lovells

Navigating the complexities of cyber insurance: a guide for policyholders

Hogan Lovells on

In today's digital age, the cyber threat landscape is changing faster than ever before. As businesses and individuals increasingly rely on technology, understanding the complexities of cyber insurance has never been more...more

Hogan Lovells

Confronting social engineering in the age of artificial intelligence

Hogan Lovells on

AI-enabled technology enhances threat actors’ ability to engage in advanced and difficult-to-detect forms of social engineering to deceive employees and circumvent companies’ security controls. Companies may consider new...more

Robinson+Cole Data Privacy + Security Insider

DeepSeek AI’s Security Woes + Impersonations: What You Need to Know

Soon after the Chinese generative artificial intelligence (AI) company DeepSeek emerged to compete with ChatGPT and Gemini, it was forced offline when “large-scale malicious attacks” targeted its servers. Speculation points...more

IR Global

From AI to Data Privacy: Themes in Healthcare Law

IR Global on

A lot is changing across the healthcare landscape, as fast-paced developments in technology allow providers and clinics to see more patients virtually and harness the power of big data to better visualize healthcare trends....more

Spilman Thomas & Battle, PLLC

Decoded Technology Law Insights, V 6, Issue 1, January 2025

Welcome to our sixth volume and first issue of 2025 of Decoded - our technology law insights e-newsletter. We have been publishing for six years and could not continue without our committed readers and your insights....more

Ankura

The Rise of AI-Powered Cyber Attacks: How Indian Businesses Can Prepare

Ankura on

As the digital landscape evolves, so do the threats that accompany it. The rise of artificial intelligence (AI) has fundamentally transformed the nature of cybercrime, enabling attackers to execute more sophisticated and...more

Mayer Brown

President Biden Issues Executive Order on Strengthening and Promoting Innovation in the Nations Cybersecurity

Mayer Brown on

INTRODUCTION... On January 16, 2025, President Biden issued an Executive Order (EO) on Strengthening and Promoting Innovation in the Nation’s Cybersecurity, to further address increasing threats from nation-state actors...more

Blank Rome LLP

The BR International Trade Report: January 2025

Blank Rome LLP on

Welcome to this month’s issue of The BR International Trade Report, Blank Rome’s monthly digital newsletter highlighting international trade, sanctions, cross-border investment, geopolitical risk issues, trends, and laws...more

Hogan Lovells

Slew of OCR activity underscores agency’s focus on security and AI

Hogan Lovells on

Recent enforcement actions, audit activity, proposed rulemakings, and guidance issued by the U.S. Department of Health and Human Services (“HHS”), Office for Civil Rights (“OCR”) highlight the agency’s focus on health data...more

Ankura

Enhancing Cross-Border e-Discovery and Data Breach Investigations with AI

Ankura on

Today’s interconnected world presents significant challenges for managing cross-border e-discovery and data breach investigations. These processes—critical for legal proceedings and cybersecurity—are often complicated by...more

191 Results
 / 
View per page
Page: of 8

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide