No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
The Presumption of Innocence Podcast: Episode 39 - Unthreading the Silk Road: A Conversation With Author Nick Bilton
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Episode 282 -- CISO and CCOs -- The Evolving Partnership
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
2022 DSIR Deeper Dive: NFTs
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Understanding the Additional Risks When Making a Ransomware Payment
2022 DSIR Deeper Dive: Ransomware
Fighting the Constantly Evolving Threat of Cybercrimes
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
JONES DAY TALKS®: The eBay Cyberstalking Case: Mitigating the Compliance Risks of Employee Misconduct
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more
A recent article in The Wall Street Journal highlights a case that is sadly all too familiar – a family member is in distress, and you must wire them money to help save them. Of course, as the article reveals, the family...more
“It’s the most wonderful time of the year”—or is it? Unfortunately, it can be the most wonderful time for criminals, who try to prey on financial generosity through scams and frauds. Extra vigilance is needed during the...more
I often get asked whether law enforcement is making any headway in catching cybercriminals. Although it is a challenging task, a recent example of a big win for law enforcement deserves celebration....more
AI is technology that enables computers to simulate human intelligence and problem-solving skills, whereas deepfake is synthetic media that has been digitally manipulated to replace and mimic one person’s likeness. AI has...more
ComplexDiscovery’s Editor’s Note: Deepfake technology represents one of the most pressing challenges for cybersecurity and governance professionals today....more
DocuSign is a great and efficient way to obtain authentic signatures for contracts and invoices. As with other efficient tools, threat actors will and have found a way to use the DocuSign API to send fake invoices to divert...more
The Federal Trade Commission (FTC) keeps track of scams that are reported to it and summarizes those scams in a report outlining the most successful scams of the prior year....more
Social media has evolved tremendously since its inception—it has become part of our everyday lives and helps us stay connected with others. In fact, June 30 has been declared World Social Media Day as a day to celebrate the...more
Wire fraud threats have been on the rise in recent years, with Hong Kong becoming a particularly attractive destination for fraudsters due to its status as a global financial hub. Criminals are using increasingly...more
On June 28, 2022, the FBI issued a Public Service Announcement (PSA) warning that fraudsters are using deepfakes to impersonate job applicants during online interviews and employing stolen Personally Identifiable Information...more
If you read the hype, then you will have read that lack of regulation, speed of transactions, irreversibility of trades, and hidden identities are positive features of the crypto world. Crypto enthusiasts say that finance can...more
When it comes to scams and frauds, it's not just individuals at risk, but also companies. In Episode 2 of Digging Deeper, Chris Morgan Jones interviews Jordan Arnold about corporate scams, and they even discuss cracking the...more
As the coronavirus global health emergency continues apace, cyber criminals have continued their concerted effort to exploit this crisis for financial gain via cyberattacks and scams tied to COVID-19. In recent weeks, threat...more
You receive an email saying that due to COVID-19, a number of regularly scheduled meetings are moving to new dates and times. While hovering over the conveniently provided email link to your calendar, you notice the email...more
Fraud During the COVID-19 Pandemic - As the COVID-19 pandemic continues to alter daily life across the globe, reports of pandemic-related fraud are increasing. With the World Health Organization (WHO) declaring a “news...more
The unprecedented COVID-19 pandemic has brought with it an unprecedented effort by states and the federal government to prevent and counteract fraud. State Attorneys General are implementing innovative statewide initiatives...more
As in-house counsel, compliance, and security teams worldwide are adjusting to life amid the global pandemic, so too are criminal and nation-state cyber actors. These actors are now leveraging the pandemic, public fear, and...more
The Department of Justice (DOJ) announced a criminal complaint last Friday in the most significant COVID-19 fraud prosecution to date. A complaint is a charging document usually submitted to a court to obtain an arrest...more
As the spread of COVID-19 virus creates anxiety and uncertainty across the globe, it also creates new opportunities for cyber fraud. On Saturday, the United States Department of Justice (DOJ) filed a complaint for a Temporary...more
What do tornadoes, hurricanes, earthquakes, wildfires, and the coronavirus have in common? Scams. Disasters seem to beget scammers well versed in both price gouging and knockoff peddling, as well as phishing schemes and...more
The coronavirus—or COVID-19—has health care experts scrambling, and has caused global concern for health and well-being due to its rapid spread throughout many countries, including the United States....more
The “business compromise email” is what the FBI calls the “$5 billion scam,” but apparently an insurance company did not agree with an insured company that they had been the victim of a crime....more
In March, we reported on the Business E-mail Compromise (BEC) scam where criminals target employees responsible for wiring company money, and trick them into wiring money under false pretenses to fraudulent accounts...more