News & Analysis as of

Cyber Attacks Hackers Data Protection

Ankura

The Transformative Role of Artificial Intelligence in Cybersecurity

Ankura on

AI-Powered: Corporate Strategies Versus Hacker Tactics - How can companies use artificial intelligence to respond more efficiently to threats, and what innovative attack methods are hackers developing with the help of AI?...more

Fisher Phillips

How Schools Should Respond to the PowerSchool Cyberattack

Fisher Phillips on

The country’s largest provider of cloud-based education software for K-12 schools announced on January 7 that it fell victim to a massive data breach – which may lead to questions about the implications for your school....more

Kohrman Jackson & Krantz LLP

The Columbus City Hall Cyber Attack: Key Takeaways

This past July, the City of Columbus, Ohio experienced a significant data breach. Hackers were able to breach Columbus’ network and gained access to private information of city employees and residents. Initially, the City...more

Katten Muchin Rosenman LLP

The U.S. Govenment Charges China-Based Hacker for Exploiting Zero-Day Vulnerability

On December 10, 2024, the federal government unsealed an indictment in federal court in Indiana, charging Chinese national Guan Tianfeng (Guan) for his role in allegedly breaking into thousands of Sophos Ltd. (Sophos)...more

NAVEX

DORA: Exploring Finance Compliance Requirements

NAVEX on

Numbers never lie. The second most targeted industry in terms of hacking and breaches is Finance, which was the victim somewhere in the realm of 2,306 to 2,792 cyberattacks in 2023 (depending on the source). With each data...more

Robinson+Cole Data Privacy + Security Insider

The Impact of Stolen Credentials

This week, Schneider Electric confirmed that it is investigating a security incident involving its JIRA internal development platform. The attacker group, “Grep,” allege that it stole 40 GB of data from the JIRA platform by...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Robinson+Cole Data Privacy + Security Insider

Scary Halloween News: Jumpy Pisces Using Play Ransomware to Attack Organizations

Unit 42 recently reported that it has identified “Jumpy Pisces, a North Korean state-sponsored threat group associated with the Reconnaissance General Bureau of the Korean People’s Army, as a key player in a recent ransomware...more

Hinckley Allen

Today’s Menacing Cyber Threat Environment: What Organizations Need to Know to Quickly Respond to a Data Breach and Reduce the...

Hinckley Allen on

As the last two years have clearly demonstrated, no organization is immune from cyberattacks.  Indeed, numerous studies have reported that a majority of businesses have been impacted by at least one cyberattack over the past...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Report Highlights Attacks Against Healthcare Organizations

On October 22, 2024, Microsoft issued a threat trend research report entitled “US Healthcare at risk: Strengthening resilience against ransomware attacks.” In it, Microsoft declares that ransomware attacks against the...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #418 – New Phishing Scheme Uses Scarce Weight Loss Drugs as Hook

Scammers are always looking for new ways to dupe victims. If you battle your weight, you think about it a lot and are always looking for easier ways to lose some pounds. There is no easy way, but we are always looking for an...more

Allen Matkins

SEC Continues Its Persecution Of Crime Victims

Allen Matkins on

More than a decade ago, I expressed concern about the Securities and Exchange Commission's predilection for targeting victims of crimes.   That concern related to an enforcement action against a company that had been...more

K2 Integrity

Cybersecurity Awareness Month: Creating and Managing Long, Unique Passwords

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #416 – Impersonation is the Most Prolific Phishing Tactic in 2024

A new report published by the software company Egress this month, Phishing Threat Trends Report, is a must-read. It outlines the proliferation of phishing toolkits on the dark web (that basically allows any Tom, Dick, and...more

Mayer Brown

Cyber Threats on the Rise: Dissecting the Common Themes Behind Recent Cybersecurity Incidents in Hong Kong

Mayer Brown on

Hong Kong has witnessed a notable surge in cyber breach incidents in recent years. The cyberattacks have affected various organisations across the public, private and non-profit sector. Cybersecurity incidents recorded a...more

Fox Rothschild LLP

Data Breach 101: a Curriculum Spoiler for NC College Students

Fox Rothschild LLP on

A letter or three per year, alerting of a data breach at a company with which you’ve interacted, is now par for the course. Hackers, and the companies whose data they seek, are engaged in a near-daily volley of attacks and...more

Baker Donelson

Happy Hack-tober! Don't be Scared: How to Protect Your Business from RaaS Threats

Baker Donelson on

October is here, and as we prepare for pumpkin spice lattes, fall sweaters, and scary decorations, there's one thing your business can't afford to ignore this month: cybersecurity. Welcome to Hack-tober, or as it's officially...more

Woodruff Sawyer

The Voluntary Parting Exclusion: What You Need to Know

Woodruff Sawyer on

The US Internet Crime Complaint Center (IC3) received more than 880,000 cybercrime complaints in 2023. Overall financial losses from cybercrime last year reached $12.5 billion, a record-setting year-over-year increase of...more

Wiley Rein LLP

Athletes, Arenas, and Cyberattacks: The Evolving Landscape of Cybersecurity in Sports

Wiley Rein LLP on

As cybersecurity threats continue to evolve, the sports industry faces unique challenges in safeguarding its data, athletes, and events. During a recent panel discussion at the Aspen Cyber Summit, Reynold Hoover, CEO of the...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Baker Botts L.L.P.

'Ransom Cartel' Leader Indicted: A Reminder of Cybercrime’s Growing Reach

Baker Botts L.L.P. on

The recent indictment of Maksim Silnikau, a Belarusian and Ukrainian national, is a clear reminder that cybercriminals are becoming more sophisticated and bold....more

Robinson+Cole Data Privacy + Security Insider

Scattered Spider Using RansomHub and Qilin Ransomware Against Victims

We previously reported on the concerning mash-up of worldwide cybercriminals, known as Scattered Spider, working together to attack victims. New reports from Microsoft and others indicate that in the second quarter of...more

Robinson+Cole Data Privacy + Security Insider

CrowdStrike Customers Targeted by Threat Actors Using Fake Help Websites

If you are a customer of CrowdStrike, you are working on recovering from the outage that occurred on July 19, 2024. As if that isn’t enough disruption, CrowdStrike is warning customers that threat actors are taking advantage...more

Robinson+Cole Data Privacy + Security Insider

CISA Warns of Three New Vulnerabilities Actively Exploited by Threat Actors

On July 17, 2024, the Cybersecurity & Infrastructure Security Agency (CISA) issued an Alert adding three vulnerabilities to its Known Vulnerabilities Catalog. ...more

Troutman Pepper Locke

Preserving Forensic Artifacts Following Incident Detection - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper Locke on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

848 Results
 / 
View per page
Page: of 34

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide