News & Analysis as of

Cyber Attacks Technology Sector

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 6, Issue 4, April 2025

Welcome to our fourth issue of 2025 of Decoded - our technology law insights e-newsletter. We hope you enjoy this issue and thank you for reading. Sector by Sector: How Data Breaches are Wrecking Bottom Lines - “Data...more

Spilman Thomas & Battle, PLLC

The Health Record - Healthcare Law Insights, V 2, Issue 4, April 2025

Welcome to our fourth issue of 2025 of The Health Record -- our healthcare law insights e-newsletter. In this edition, we look at prior authorization transparency and physician decision-making; the impact of Medicaid cuts...more

A&O Shearman

Zooming in on AI #18: Cybersecurity requirements for AI systems

A&O Shearman on

The Artificial Intelligence Act (AI Act) is the world's first comprehensive legal framework for AI regulation, which entered into force on August 1, 2024. The AI Act aims to ensure that AI systems are trustworthy, safe and...more

HaystackID

Jaguar Land Rover Breach Highlights Growing Cybersecurity Risks in Automotive Sector

HaystackID on

A major cyberattack on Jaguar Land Rover (JLR) has cast a spotlight on the persistent threat of ransomware targeting global corporations. The HELLCAT ransomware group is behind this latest breach, exposing internal documents,...more

Skadden, Arps, Slate, Meagher & Flom LLP

The Informed Board - November 2024

At what point has a director served too long? What about term limits? A mandatory retirement age? When do a director’s skills become stale? These issues are addressed in this issue of The Informed Board, as well as why proxy...more

Perkins Coie

‘Tis the Season… for Cybercriminals: A Holiday Reminder for Retailers

Perkins Coie on

As the holiday shopping season kicks into high gear, it also becomes a prime opportunity for cybercriminals to target retailers, their suppliers, and their customers.  As The Hacker News reports, criminal use of artificial...more

Skadden, Arps, Slate, Meagher & Flom LLP

Recent SEC Cyber-Related Enforcement Actions Emphasize the Importance of Robust Disclosure Controls

On October 22, 2024, the Securities and Exchange Commission (SEC) announced enforcement actions against several technology companies for making materially misleading disclosures regarding cybersecurity risks and intrusions....more

A&O Shearman

Cyber-attack victim obtains injunction to prevent publication of stolen data

A&O Shearman on

Following a high-profile cyber-attack earlier in the year which impacted the medical data of NHS patients, the English High Court granted Synnovis an interim injunction which prevents the publication of the stolen data. This...more

Accelerynt, Inc.

Silent Threats, Unseen Risks: A Call to Transform Operational Security

Accelerynt, Inc. on

What if a single compromised credential could silently bring down your entire organization? Our recent threat hunts across Fortune 100 clients suggest that this isn't just a possibility—it's a reality....more

J.S. Held

Cybercrime vs. Cybersecurity: Learning the Tactics of Criminals to Protect Your Interests

J.S. Held on

Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more

Spilman Thomas & Battle, PLLC

Decoded Technology Law Insights, V 5, Issue 4, May 2024

MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more

HaystackID

Ambient Light Sensors to Malware Threats: MIT Unveils Smartphone Privacy Risks Amid Market Turbulence

HaystackID on

Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more

American Conference Institute (ACI)

[Event] 8th Forum on FinTech & Emerging Payment Systems - April 9th - 10th, New York, NY

ACI’s 8th Annual Legal, Regulatory, and Compliance Forum on Fintech & Emerging Payment Systems will provide in-depth guidance on the latest regulatory developments at the Federal and State Level that you need to be aware of....more

Fenwick & West LLP

Opportunities Abound in New National Defense Authorization Act

Fenwick & West LLP on

The Fiscal Year 2024 National Defense Authorization Act (“FY2024 NDAA”) continues the national security imperative to enhance the country’s scientific and technological developments and to adopt emerging technologies and...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 10, December 2023

Revisiting…Are Automakers Making Sufficient Efforts to Protect Customer Data? As a follow-up to our previous article and webinar, “Are Automakers Making Sufficient Efforts to Protect Customer Data?", we are addressing the...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 9, September 2023

Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more

Pillsbury - Internet & Social Media Law Blog

News of Note for the Internet-Minded (8/30/23) – Ransomware, Quantum Attacks and a New LLM

In this week’s News of Note, ransomware attacks break records and wipe data for a majority of a cloud provider’s customers, while one RaaS case delivers useful details about cybercriminal techniques and tactics. Also, the...more

Bradley Arant Boult Cummings LLP

Technological and Legal Defenses Against Privacy Attacks on Machine Learning Models

Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more

Bradley Arant Boult Cummings LLP

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 5, May 2023

Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more

Polsinelli

Guidance for the ‘Burden of Cybersecurity Compliance’ Emerges

Polsinelli on

Two months ago, the White House released its National Cybersecurity Strategy.  Since then, various government agencies have issued new cybersecurity guidance for certain critical infrastructure subsectors.  For example, the...more

A&O Shearman

The opportunities and legal risks of quantum computing

A&O Shearman on

Real progress has been made in making quantum computing a reality. How does it work, what are its potential applications, and how might quantum inventions be protected?...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Spilman Thomas & Battle, PLLC

Tech Vendors and Cybersecurity – Are They Responsible?

It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more

Ankura

The 80/20 Rule in MDR: People, Not Technology, Catch the Biggest Threats

Ankura on

While Managed Detection and Response (MDR) takes advantage of the latest technology, it is important to recognize that humans are still the best at making the complex, nuanced decisions that are sometimes necessary in...more

66 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide