News & Analysis as of

Cyber Attacks Risk Management

Robinson+Cole Data Privacy + Security Insider

What to Know About SafePay Ransomware Group

The SafePay ransomware group has been active since fall 2024 and has increased its activity this spring and summer. According to NCC Group, SafePay hit the most victims of any threat actor in May 2025—it is linked to 248...more

Potomac Law Group, PLLC

Cybercriminals Hit Your Inbox—Now What? Recovering Funds After Business Email Compromise and Fraud Schemes

The global cyber scam industry is a multi-billion dollar racket run by crime syndicates who often operate through massive compounds known as “scam farms” in far flung locations.  On our shores, many businesses fall prey to...more

Bradley Arant Boult Cummings LLP

Defining Artificial Intelligence for Cyber and Data Privacy Insurance

A small but growing number of cyber insurers are incorporating language into their policies that specifically addresses risks from artificial intelligence (AI). The June 2025 issue of The Betterley Report’s Cyber/Privacy...more

Robinson+Cole Data Privacy + Security Insider

FBI Warns Airline and Transportation Sectors About Scattered Spider

On June 27, 2025, the Federal Bureau of Investigation (FBI) issued a warning on X to the airline and transportation sectors that the notorious cyber criminal ring Scattered Spider is attacking those sectors....more

Robinson+Cole Data Privacy + Security Insider

Joint Release Warns of Iranian-Backed Cyber-Attacks

On June 30, 2025, a Joint Advisory was issued by the National Security Agency, the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation and the Department of Defense Cyber Crime Center issued...more

Husch Blackwell LLP

FBI Notes Increase in Cyber Activity Targeting Operational Technology

Husch Blackwell LLP on

On June 30, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the Department of Defense Cyber Crime Center (DC3) published a...more

K2 Integrity

Social Media Day: Educating Employees On The Risks Of Social Media

K2 Integrity on

Social media is used by both organizations and employees—as a marketing tool for business, for entertainment, or for interacting with friends and family....more

Woodruff Sawyer

Managing Your Supply Chain Cyber Risk

Woodruff Sawyer on

Most organizations rely on complex supply chains, and that reliance has become a point of vulnerability for cyberattacks. This spring, we have witnessed a large-scale cyberattack on a major British multinational retailer due...more

Paul Hastings LLP

The Changing Cyber Threat Landscape and Lessons Learned From Data Breaches

Paul Hastings LLP on

Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of...more

Maynard Nexsen

Urgent Cybersecurity Briefing: Scattered Spider Attacks

Maynard Nexsen on

Several insurance companies have been targeted this month by cyberattacks, including AFLAC, Erie Insurance, and Philadelphia Insurance. The threat actor, Scattered Spider, is now focusing on the insurance industry. We want to...more

Robinson+Cole Data Privacy + Security Insider

New Hires More Likely to Fall for Phishing + Social Engineering Attacks

When assessing cybersecurity risk in your organization, it is important to understand your users and their behavior. A new study by Keepnet sheds light on new hire behavior concerning phishing susceptibility. According to its...more

Accelerynt, Inc.

You Passed the Test. But Can You Survive the Attack?

Accelerynt, Inc. on

“Life can only be understood backwards; but it must be lived forwards.” – Søren Kierkegaard - Most security programs are designed to pass a test. Policies are documented. Controls are mapped. Tools are deployed. And for a...more

Paul Hastings LLP

NYDFS Urges Covered Entities to Review Security Practices Amidst World Turmoil

Paul Hastings LLP on

Citing “escalating global conflict,” the New York Department of Financial Services issued an alert on Monday, June 22, 2025, to its regulated covered entities, urging them to be vigilant against potential security threats,...more

StoneTurn

Assessing the Iranian Cyber Arsenal: Post “12 Day War” Threat to Your Company

StoneTurn on

As tensions flare in the Middle East, speculation is growing over the potential impacts of Iranian cyberattacks targeting US based companies and infrastructure. We saw similar reactions in 2020 following the death of the head...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #447 – Understanding Cybersquatting

We are seeing an increase in cybersquatting incidents. What is cybersquatting and how can it affect you? According to Sentinel One, cybersquatting, or domain squatting, “involves the registration, selling, or use of an...more

Robinson+Cole Data Privacy + Security Insider

CISO’s: Take a Look at CSC’s CISO Outlook 2025 Report

Cybersecurity firm CSC recently issued its CISO Outlook 2025 Report, which predicts cybersecurity challenges CISOs will face in the next year. The report, from a survey of 300 CISOs and cybersecurity professionals globally,...more

BakerHostetler

[Podcast] 2025 DSIR Deeper Dive: Deeper Dive into the Data

BakerHostetler on

We’re back with a deeper dive into the 2025 Data Security Incident Response Report, which features insights and metrics from more than 1,250 incidents in 2024. This episode dives deeper into the data, including network...more

McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Jackson Lewis P.C.

The Growing Cyber Risks from AI — and How Organizations Can Fight Back

Jackson Lewis P.C. on

Artificial Intelligence (AI) is transforming businesses—automating tasks, powering analytics, and reshaping customer interactions. But like any powerful tool, AI is a double-edged sword. While some adopt AI for protection,...more

Accelerynt, Inc.

The Headcount Trap: Why Large SOCs Often Lose Effectiveness

Accelerynt, Inc. on

Enterprises don’t have a staffing problem. They have a systems problem. In a recent engagement, we were engaged to help improve a global SOC operation. Despite having over 30 analysts on staff, the team was missing...more

Fenwick & West LLP

NYTW 2025: Building Smarter Cyber Strategies with Government, Founders, and Investors

Fenwick & West LLP on

At New York Tech Week 2025, cybersecurity took the spotlight. Fenwick partner Jon Lenzner sat down with Bryan Vorndran—former assistant director of the FBI’s Cyber Division—to unpack what early-stage companies, investors, and...more

Morgan Lewis - Tech & Sourcing

NIST Releases Updated Incident Response Guidance Under Its Cybersecurity Framework

During the Biden administration, there was a push to prioritize and modernize cybersecurity responses, and the National Institute of Standards and Technology (NIST) agreed to work with the technology industry to develop a new...more

Farella Braun + Martel LLP

Which Party Loses Out When Settlement Funds Are Wired to a “Spoofer” and Not Plaintiff?

Answer: the “party in the best position to prevent the fraud.” In the digital age, where cyber-attacks are becoming more sophisticated, all legal professionals should take heed of the recent decision in Thomas v. Corbyn...more

A&O Shearman

The cyber-nuclear nexus: safeguarding clean energy

A&O Shearman on

Politicians’ and tech giants’ embrace of nuclear energy to power AI heightens the urgency to protect critical infrastructure from cyber threats....more

948 Results
 / 
View per page
Page: of 38

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide