News & Analysis as of

Cyber Threats Cybersecurity

EDRM - Electronic Discovery Reference Model

Crypto-Procrastination: The Dangerous Delay in Preparing for Post-Quantum Data Security

Somewhere right now, an adversary is quietly siphoning encrypted financial data off a major bank’s network—not to read it today, but to crack it open the moment quantum computers catch up....more

Spilman Thomas & Battle, PLLC

The Health Record - Healthcare Law Insights, V3,Issue 2, 2026

Welcome to our second issue of 2026 of The Health Record -- our healthcare law insights e-newsletter. In this edition, we look at recent guidance from HHS urging healthcare providers to step up cybersecurity efforts,...more

Robinson+Cole Data Privacy + Security Insider

SolarWinds Web Help Desk Vulnerability Targeted by Threat Actors

Security researchers at Huntress Labs have identified a vulnerability in SolarWinds’s Web Help Desk that threat actors are exploiting to allow them to execute code remotely....more

Shumaker, Loop & Kendrick, LLP

Protecting Your Business’ Social Media Accounts from Hackers

For small and medium-sized businesses, social media platforms like Facebook and Instagram are essential marketing tools. However, account takeovers by hackers pose a serious and growing threat that every business owner should...more

Goodwin

The UK’s Ransomware Strategy: What the UK Government’s Response Signals

Goodwin on

Following the UK Government's launch of a public consultation on its proposed legislative measures to combat the threat of ransomware (see Goodwin’s January 2025 analysis), the UK Government published its response to the...more

Ary Rosenbaum - The Rosenbaum Law Firm P.C.

From Fax Machines to Phishing: Why Cybersecurity Is Now a 401(k) Fiduciary Duty

When I started back in the 401(k) business in 1998, everything was done by paper and telephone. Distribution requests were mailed or faxed. Investment changes were taken over the phone. Beneficiary designations were signed in...more

Jones Day

EU Commission Proposes Revised Cybersecurity Act to Bolster EU Cyber Resilience

Jones Day on

On January 20, 2026, the EU Commission unveiled a new Cybersecurity Package (the "Package") designed to reinforce the EU's cyber resilience in response to an increasingly complex and sophisticated threat environment....more

BakerHostetler

[Podcast] Regulatory Horizons: Cybersecurity and FDA Regulated Companies

BakerHostetler on

Cybersecurity is no longer just an IT or privacy issue. For FDA regulated companies, it’s a patient safety issue, a product quality issue, and increasingly a regulatory enforcement issue. FDA has made it clear that...more

Arnall Golden Gregory LLP

Healthcare Authority Newsletter - February 2026 #1

News Briefs - Physicians Seeing Major Benefits to Using Ambient AI Scribes - Ambient AI scribes are being hailed by physicians as a game changer that helps free them to focus on their patients rather than their computer...more

Wiley Rein LLP

Congress Reauthorizes CISA 2015 Through September – But Then What?

Wiley Rein LLP on

The landmark Cybersecurity Information Sharing Act of 2015 (CISA 2015) has been reauthorized retroactively from its original September 30, 2025 expiration for a limited one-year period. This development was the result of the...more

Davis Wright Tremaine LLP

Congress Extends CISA 2015 Through September 2026

Congress has renewed the Cybersecurity Information Sharing Act of 2015 (CISA 2015) until September 30, 2026, as part of the spending bill signed by the president yesterday, February 3, 2026. The renewal comes as welcome news...more

Robinson+Cole Data Privacy + Security Insider

ShinyHunters Bypassing Multifactor Authentication

Security professionals rely on the implementation of multifactor authentication (MFA) to defend against phishing attacks and intrusions. Unfortunately, we can’t completely rely on MFA to protect us as threat actors (more...more

Alston & Bird

FBI Launches Operation Winter SHIELD in Effort to Advance Cyber Resilience Across Critical Sectors

Alston & Bird on

On January 28, 2026, the Federal Bureau of Investigation (FBI) announced the launch of Operation Winter SHIELD, a coordinated initiative designed to promote adoption of core defensive measures that are shown to mitigate...more

Lowndes

New Email Scam Impersonates Local Planning Staff to Solicit Fraudulent Fees

Lowndes on

An email phishing scheme is circulating that targets development applicants by impersonating local planning staff and demanding payment of an “Application Approval Fee” invoice. The messages claim that paying the invoice is a...more

Clark Hill PLC

Cannabis Group Series | Securing the Seed: Cybersecurity Challenges in the Cannabis Industry

Clark Hill PLC on

As the cannabis industry continues to grow and evolve, so do the challenges it faces, particularly in the realm of cybersecurity. With increasing digitization, cyber threats pose a significant risk to cannabis businesses,...more

Baker Botts L.L.P.

What is OpenClaw, and Why Should You Care?

Baker Botts L.L.P. on

Over 100,000 people just gave an AI assistant root access to their computers. That assistant can now talk to other AI assistants on a social network humans cannot post to....more

Robinson+Cole Data Privacy + Security Insider

Single Sign-On Services Targeted in Vishing Attacks

We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more

Dinsmore & Shohl LLP

Cyber Threat Actor Group, Nitrogen, Unveils New Countermeasure in Ransom Negotiations

Dinsmore & Shohl LLP on

Through the combined efforts between Dinsmore’s cybersecurity team and Armada Growth Partners (AGP), new intelligence on the Techniques, Tactics, and Procedures (TTP) for the Nitrogen ransomware group has been identified....more

MoFo Tech

AI Trends For 2026 - AI-Driven Threats and the Next Phase of Cyber Defense

MoFo Tech on

From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more

Bressler, Amery & Ross, P.C.

Cybersecurity Threat Alert – Email Phishing Scam Targeting DFS-Regulated Entities

The New York Department of Financial Services (“DFS”) has issued the below notice to regulated entities and individuals to use caution before responding to outreach from individuals falsely claiming to represent DFS....more

Patomak Global Partners

Is Your IT Risk Management Framework “Future-Proof”?

Technology risks constantly evolve. Effective IT Risk Management Programs can identify, address and, as needed, adapt to emerging risks. This analysis illustrates how an effective IT Risk Management Framework can identify an...more

Akin Gump Strauss Hauer & Feld LLP

EU Cyber and Connectivity Proposals with Extra-Territorial Impact: Cybersecurity Act 2 and Digital Networks Act Go to Negotiations

On 20 and 21 January 2026, the European Commission presented its proposals for a Cybersecurity Act 2 (CSA2) and a Digital Networks Act (DNA). The CSA2 aims to increase Information and Communication Technologies (ICT) supply...more

Orrick, Herrington & Sutcliffe LLP

NYDFS issues cybersecurity threat alert regarding email scam targeting NYDFS regulated entities

On January 22, the NYDFS issued an alert informing regulated entities about an email phishing scam falsely claiming to represent the regulator. The alert warned that scammers may have sent emails urging recipients to open...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Attacks Keep Climbing

The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more

Shumaker, Loop & Kendrick, LLP

"Analysis of New Cyber Threats: Artificial Intelligence (AI)‑Driven Risks Accelerating in 2026"

AI is no longer an emerging risk; it is now a central driver of offensive and defensive cyber capabilities. As organizations adopt AI tools to improve efficiency, adversaries are leveraging the same technology to automate...more

1,436 Results
 / 
View per page
Page: of 58

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide