News & Analysis as of

Cyber Threats

Mitratech Holdings, Inc

[Webinar] Future-Proofing Your Operational Resilience in Europe with Continuity Planning - January 22nd, 3:00 pm - 4:00 pm CET

European organizations are facing growing operational risks—from cyber threats and regulatory change to supply-chain instability and climate-related disruptions. New regulations such as DORA, NIS2, and the UK Operational...more

Ervin Cohen & Jessup LLP

New Warning on Mobile Spyware: What Companies Must Do to Protect Employee Devices

On November 25, 2025, the Cybersecurity and Infrastructure Security Agency (“CISA”) issued an alert regarding advanced spyware campaigns targeting mobile devices. The warning identifies messaging apps and social media...more

Perkins Coie

Privacy and Data Security Recap 2025—National Security

Perkins Coie on

2025 saw a range of activity at the intersection of privacy, data security, and national security, including new types of threats, significant U.S. regulatory actions by multiple agencies, legislative lapses and new...more

Constangy, Brooks, Smith & Prophete, LLP

Protect your crown jewels before a hack becomes a heist

On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more

Jones Day

EU Geopolitical Risk Update Key Policy & Regulatory Developments No. 124

Jones Day on

This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more

Fisher Phillips

Top 2026 Predictions for the Tech Sector

Fisher Phillips on

Our Tech Sector thought leaders have pulled together their top predictions for the new year so that employers can get a running start to 2026....more

Alston & Bird

How AI is Changing the Incident Response Landscape: What GCs Need to Know

Alston & Bird on

Our Privacy, Cyber & Data Strategy Team examines the profound implications of the evolution of AI-driven cyberattacks and offers practical steps general counsel can take to proactively defend against them....more

Morgan Lewis

Understanding the Cybersecurity Risks Flooding the Water and Wastewater Systems Sector

Morgan Lewis on

US critical infrastructure has historically been a prime target for threat actors due to the significant and far-reaching consequences of cyberattacks. Today, ongoing geopolitical tensions and escalating global conflict have...more

Robinson+Cole Data Privacy + Security Insider

Here Are the Five Top Security Threats from 2025

Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more

Haynes Boone

Making a List, Checking it Twice: Avoiding Cyber Attacks During the Holidays

Haynes Boone on

What’s the Concern? During the holiday season—specifically, Christmas Eve, Christmas, New Year’s Eve and New Year’s Day—there tends to be a spike in cyber attacks on companies. Cyber attackers target this time of year...more

Hogan Lovells

Domain Name News: November/December 2025

Hogan Lovells on

This is the November/December 2025 edition of Anchovy News. Here you will find articles concerning ICANN, the domain name industry and the recuperation of domain names across the globe....more

Carlton Fields

No Password Required: Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor

Carlton Fields on

Live from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, virtual CISO at Trace3. Jack Clabby of Carlton Fields and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina’s...more

Constangy, Brooks, Smith & Prophete, LLP

Warm up your defenses against cyber holiday risks

Each year, there is a holiday surge in cyberattacks employing a wide range of attack vectors. This heightened activity can make organizations more vulnerable to legal and regulatory scrutiny. This is a good time to check your...more

Clark Hill PLC

Right To Know - December 2025, Vol. 36

Clark Hill PLC on

Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Ropes & Gray LLP

On the Fourth Day of Data… All is Calm, All is Bright? Securing Agentic AI Before the Lights Go Out

Ropes & Gray LLP on

As 2025 draws to a close and some organizations slip into a quieter holiday rhythm, their AI systems continue humming in the background—summarizing customer inquiries, triaging security alerts, generating code, and...more

Wiley Rein LLP

[Podcast] Episode 2: AI’s Role in the Evolution of Cyber Threats

Wiley Rein LLP on

What happens when the familiar faces of trusted clients, coworkers, and peers turn out to be AI-generated imposters? In this episode of The Cyber Periscope, Pam Signorello sits down with Nate Lovett of Wiley's Cyber Insurance...more

Wiley Rein LLP

’Tis the Season to Evaluate Cyber Readiness and Resilience

Wiley Rein LLP on

The holiday season is a time of celebration, but it’s also a prime opportunity for cyber threat actors. With many employees on leave and organizations operating with reduced staffing, malicious activity can go unnoticed....more

Lowenstein Sandler LLP

BRICKSTORM Malware Campaign UPDATE: What Else You Need To Know

Lowenstein Sandler LLP on

In September 2025, we issued a client alert warning about the BRICKSTORM malware campaign and recommended steps to strengthen your organization’s defenses. On Dec. 4, 2025, the Cybersecurity and Infrastructure Security Agency...more

Troutman Pepper Locke

FCA Settlement Signals Increased Cybersecurity Focus

Troutman Pepper Locke on

The U.S. Department of Justice (DOJ) recently announced a $421,234 settlement with Swiss Automation Inc. to resolve alleged False Claims Act (FCA) violations related to its failure to provide adequate cybersecurity for...more

Shumaker, Loop & Kendrick, LLP

"When Artificial Intelligence Becomes the Hacker: Legal Risks and Compliance Strategies for Autonomous Cyber Threats"

In mid‑September 2025, Anthropic's Threat Intelligence team reported detecting and disrupting what it assesses as the first large-scale cyber-espionage campaign orchestrated primarily by an Artificial Intelligence (AI)...more

Mayer Brown

We Have Been Hacked: Now What? Lessons for the Boardroom

Mayer Brown on

The almost daily prevalence of cyber-attacks has brought the issue of cybersecurity as a core governance responsibility to the front of mind of company boards. In 2024 alone, over 15 million cyberattacks were recorded...more

Offit Kurman

Cybersecurity Insights for the Sandwich Generation with Dan Krutoy

Offit Kurman on

In this episode of The Sandwich Generation Survival Guide, host Candace Dellacona welcomes Dan Krutoy, a tech industry expert who shares advice for seniors who are often targeted by scammers using social engineering tactics,...more

Mayer Brown

Securing the Final Frontier: Cybersecurity Risk, Regulation, and Compliance Trends in Space and Satellite Operations

Mayer Brown on

Space and satellite systems underpin a wide range of critical functions, including global communications, navigation, scientific research, defense operations, and essential infrastructure services. As both government and...more

McDermott Will & Schulte

Key takeaways | AI Governance and Security Assessment Workshop

McDermott Will & Schulte on

During the AI Governance and Security Assessment Workshop, Shawn Helms and Jason Krieser of McDermott Will & Schulte and Patrick Murphy of Palo Alto Networks Unit 42, discussed ways to govern the use of generative artificial...more

Robinson+Cole Data Privacy + Security Insider

Threat Actors Targeting Messaging Applications

On November 24, 2025, the Cybersecurity & Infrastructure Security Agency (CISA) issued an alert titled “Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications,” which outlines how “multiple cyber threat...more

1,569 Results
 / 
View per page
Page: of 63

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide