News & Analysis as of

Cyber Attacks

Mayer Brown

FCC Urges Communications Providers to Strengthen Ransomware Defenses

Mayer Brown on

On January 29, 2026, the Federal Communications Commission’s (“FCC” or the “Commission”) Public Safety and Homeland Security Bureau issued a Public Notice (DA 26-96) to highlight best practices that communications providers...more

Wiley Rein LLP

Congress Reauthorizes CISA 2015 Through September – But Then What?

Wiley Rein LLP on

The landmark Cybersecurity Information Sharing Act of 2015 (CISA 2015) has been reauthorized retroactively from its original September 30, 2025 expiration for a limited one-year period. This development was the result of the...more

Davis Wright Tremaine LLP

FCC Issues Cybersecurity Best Practices for Defending Against Ransomware Attacks

The Federal Communications Commission's (FCC) Public Safety and Homeland Security Bureau (Bureau) recently released a public notice (Notice) emphasizing the threat of ransomware to communications networks and urging providers...more

Robinson+Cole Data Privacy + Security Insider

ShinyHunters Bypassing Multifactor Authentication

Security professionals rely on the implementation of multifactor authentication (MFA) to defend against phishing attacks and intrusions. Unfortunately, we can’t completely rely on MFA to protect us as threat actors (more...more

Wiley Rein LLP

Episode 3: Beyond the Malware: The Leadership Test Hiding Inside Every Ransomware Event

Wiley Rein LLP on

What determines whether a ransomware event becomes a controlled disruption or a full blown crisis? In this episode of The Cyber Periscope, Pam Signorello sits down with Dr. Stephen Boyce, CEO and President of The Cyber...more

Baker Botts L.L.P.

What is OpenClaw, and Why Should You Care?

Baker Botts L.L.P. on

Over 100,000 people just gave an AI assistant root access to their computers. That assistant can now talk to other AI assistants on a social network humans cannot post to....more

Robinson+Cole Data Privacy + Security Insider

Single Sign-On Services Targeted in Vishing Attacks

We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more

Dinsmore & Shohl LLP

Cyber Threat Actor Group, Nitrogen, Unveils New Countermeasure in Ransom Negotiations

Dinsmore & Shohl LLP on

Through the combined efforts between Dinsmore’s cybersecurity team and Armada Growth Partners (AGP), new intelligence on the Techniques, Tactics, and Procedures (TTP) for the Nitrogen ransomware group has been identified....more

MoFo Tech

AI Trends For 2026 - AI-Driven Threats and the Next Phase of Cyber Defense

MoFo Tech on

From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more

Freeman Mathis & Gary

A first look at NIST’s new cyber AI framework

Freeman Mathis & Gary on

The National Institute of Standards and Technology (NIST) recently released their initial preliminary draft of NIST IR 8596, also known as the Cybersecurity Framework Profile for Artificial Intelligence. This new...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Attacks Keep Climbing

The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more

Levenfeld Pearlstein, LLC

FAQ About Cybersecurity in the Construction Industry

The construction industry faces unique cybersecurity challenges that distinguish it from other sectors. With complex payment structures, multiple stakeholders, and extensive use of mobile technology on job sites, construction...more

Skadden, Arps, Slate, Meagher & Flom LLP

Ransomware: What You Need to Know as Attacks, Regulation and Enforcement Increase

Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more

Robinson+Cole Data Privacy + Security Insider

FBI Warns of North Korean Quishing Campaign

As we have warned before, threat actors using QR codes in attacks against victims continue to rise. To illustrate the risk, on January 8, 2026, the FBI issued a FLASH alert, entitled “North Korean Kimsuky Actors Leverage...more

Constangy, Brooks, Smith & Prophete, LLP

Protect your crown jewels before a hack becomes a heist

On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more

Herbert Smith Freehills Kramer

New Year, New TLD Apply for your ".BRAND"

This year, organisations around the world are being offered the opportunity to acquire their own branded internet extensions: ".BRAND" top-level domains. Moving your brand from the left of the dot(.) to the right of the...more

Troutman Pepper Locke

FTC Announces Settlement With Crypto Firm Over Exploited Security Vulnerability

Troutman Pepper Locke on

The Federal Trade Commission (FTC) announced a proposed consent order with Illusory Systems Inc. (Illusory), a Utah-based blockchain infrastructure company that operates the Nomad Token Bridge. The settlement resolves the...more

Benesch

Dental/DSO Intelligence Monthly Report: December 2025/January 2026

Benesch on

Dental support organizations (DSOs) sustained notable expansion activity in late 2025. The November 2025 DSO Deal Roundup highlights that multiple platforms grew through both affiliations and de novo practice openings in...more

Alston & Bird

How AI is Changing the Incident Response Landscape: What GCs Need to Know

Alston & Bird on

Our Privacy, Cyber & Data Strategy Team examines the profound implications of the evolution of AI-driven cyberattacks and offers practical steps general counsel can take to proactively defend against them....more

HaystackID

ESA Breach: Collaborative Networks Expose Critical Development Infrastructure

HaystackID on

Europe’s gateway to the cosmos has stumbled on terrestrial ground, reminding the global research community that the most advanced engineering ambitions remain tethered to fragile digital infrastructures. On December 30, 2025,...more

Mitratech Holdings, Inc

Third-Party Data Breaches: What You Need to Know

A third-party data breach occurs when malicious actors compromise a vendor, supplier, contractor, or other organization to gain access to sensitive information or systems of the victim’s customers, clients, or business...more

Robinson+Cole Data Privacy + Security Insider

Here Are the Five Top Security Threats from 2025

Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more

Haynes Boone

Making a List, Checking it Twice: Avoiding Cyber Attacks During the Holidays

Haynes Boone on

What’s the Concern? During the holiday season—specifically, Christmas Eve, Christmas, New Year’s Eve and New Year’s Day—there tends to be a spike in cyber attacks on companies. Cyber attackers target this time of year...more

Pillsbury - Global Trade & Sanctions Law

EU Sanctions a Further 41 Vessels Thought to Be Part of Russia’s “Shadow Fleet” and Targets Hybrid Threat Actors

On 18 December 18, 2025, the European Union (EU) added 41 vessels to its sanctions list, targeting Russia’s so-called “shadow fleet,” an opaque network of tankers used to circumvent restrictions on Russian oil exports. The...more

Zelle  LLP

Viewpoint: Prudent or Not, an Insured’s Extra Expense Must Be Strictly ‘Necessary’

Zelle LLP on

In a well-reasoned recent opinion, an Illinois appellate court strictly construed a cyber policy, ruling that reasonable—but contractually unnecessary—payments made by an insured following a cyberattack did not constitute...more

5,068 Results
 / 
View per page
Page: of 203

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide