News & Analysis as of

Cyber Threats Data Breach

Robinson+Cole Data Privacy + Security Insider

ShinyHunters Bypassing Multifactor Authentication

Security professionals rely on the implementation of multifactor authentication (MFA) to defend against phishing attacks and intrusions. Unfortunately, we can’t completely rely on MFA to protect us as threat actors (more...more

Robinson+Cole Data Privacy + Security Insider

Single Sign-On Services Targeted in Vishing Attacks

We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more

Orrick, Herrington & Sutcliffe LLP

NYDFS issues cybersecurity threat alert regarding email scam targeting NYDFS regulated entities

On January 22, the NYDFS issued an alert informing regulated entities about an email phishing scam falsely claiming to represent the regulator. The alert warned that scammers may have sent emails urging recipients to open...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Attacks Keep Climbing

The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more

Skadden, Arps, Slate, Meagher & Flom LLP

Ransomware: What You Need to Know as Attacks, Regulation and Enforcement Increase

Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more

Robinson+Cole Data Privacy + Security Insider

Here Are the Five Top Security Threats from 2025

Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more

Clark Hill PLC

Right To Know - December 2025, Vol. 36

Clark Hill PLC on

Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Offit Kurman

Cybersecurity Insights for the Sandwich Generation with Dan Krutoy

Offit Kurman on

In this episode of The Sandwich Generation Survival Guide, host Candace Dellacona welcomes Dan Krutoy, a tech industry expert who shares advice for seniors who are often targeted by scammers using social engineering tactics,...more

Constangy, Brooks, Smith & Prophete, LLP

Hit with a cyberattack? What you do in the first 72 hours could save your business

When a cyberattack occurs, time is the most valuable asset. Much like law enforcement’s “first 48” hours rule in criminal investigations, the first 72 hours of a cyberattack, often referred to collectively as the “golden...more

Ankura

Enhancing Business Security: Common Cybersecurity Threats and Effective Protection Strategies

Ankura on

In today’s digital landscape, businesses of every size face a growing number of cybersecurity threats. From sophisticated spear phishing campaigns to disruptive malware, cyberattacks are no longer a question of if, but when....more

Robinson+Cole Data Privacy + Security Insider

Compromised Credentials Responsible for 50% of Ransomware Attacks

The statistics listed in the Quarterly Threat Report: Third Quarter, 2025, issued by Beazley Security are eye popping. They include: August and September showed a sharp increase in ransomware activity, with those months...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity resolutions for 2026

As 2025 comes to an end, there have been some valuable cybersecurity lessons for businesses. These involve vendor oversight, internal coordination, and incident response plans. Businesses should vow to address them in 2026 if...more

Lowenstein Sandler LLP

Anthropic Reports First Known AI-Orchestrated Cyber Espionage Campaign: Raising Stakes for Data Security

Lowenstein Sandler LLP on

On November 13, AI company Anthropic reported that its Threat Intelligence team had disrupted a state‑sponsored Chinese threat actor conducting what is believed to be the first largely autonomous AI‑orchestrated cyber...more

Wiley Rein LLP

Fraud and Scam Prevention Series: Navigating Increasingly Sophisticated Cybersecurity Threat and Fraud Tactics

Wiley Rein LLP on

Cybersecurity risks are evolving, in part because bad actors – including scammers and fraudsters – are leveraging widely available artificial intelligence (AI) tools for nefarious purposes. In the escalating fraud landscape,...more

Fisher Phillips

New Cybercriminal Group Targeting Transportation and Logistics Industry – How to Protect Your Organization

Fisher Phillips on

A new cybercrime threat actor calling itself “Coinbase Cartel” has begun targeting transportation, logistics, and adjacent sectors – and you should act quickly to shore up your defenses. Their model is simple: they steal data...more

Lowenstein Sandler LLP

F5 Security Incident: BIG‑IP Source Code Theft Spurs Urgent Actions

Lowenstein Sandler LLP on

On October 15, application security vendor F5, Inc. disclosed that a highly sophisticated nation-state threat actor maintained long-term, persistent access to certain F5 systems. The attackers exfiltrated portions of BIG-IP1...more

HaystackID

[Webinar] Building Elite Cyber Incident Response Capabilities at Scale - October 29th, 11:00 am CDT

HaystackID on

As cybersecurity threats grow in frequency and sophistication, the ability to respond quickly, precisely, and at scale has become mission-critical for organizations worldwide. When hackers breach your systems, the clock...more

Lowenstein Sandler LLP

On-Premises Oracle EBS Systems at Risk Due to CL0P Exploit

Lowenstein Sandler LLP on

A recent campaign by the CL0P ransomware group has targeted on-premises, customer-managed Oracle E-Business Suite (EBS) systems, resulting in the potential for widespread data exfiltration and extortion attempts. The...more

Morrison & Foerster LLP

[Webinar] CTRL+ALT+DEFEND: Insights on Emerging Threats and Best Practices for Cyber Risk Mitigation - October 29th, 1:00 pm ET

Morrison & Foerster LLP on

Join Kaylee Cox Bankston and Linda Clark for an engaging and informative webinar on October 29th exploring the most pressing cybersecurity topics of 2025 and beyond. This session will cover the latest threat landscapes,...more

Morgan Lewis - Tech & Sourcing

Cybersecurity Insurance – A Burgeoning Global Market

According to a 2025 report on cyber insurance trends published by Munich Re, the global cyber insurance market totaled $15.3 billion in 2024, and is expected to reach $16.3 billion by the end of 2025. ...more

Robinson+Cole Data Privacy + Security Insider

Oracle Zero-Day Exploited by Cl0p

Oracle has confirmed that the threat actor group Cl0p is actively exploiting a zero-day vulnerability in the Oracle E-Business Suite product, versions 12.2.3-12.2.14. On October 4, 2025, Oracle advised its customers in a...more

Wiley Rein LLP

[Webinar] Cyber Insights: What’s Behind Evolving Cyber Policy and What Does It Mean for Your Organization? - October 21st, 12:30...

Wiley Rein LLP on

Since 2004, October has marked Cybersecurity Awareness Month and for more than 15 years Wiley’s team of cybersecurity, tech, and government contracts experts has been helping organizations manage cyber risk. On October 21, as...more

Baker Donelson

Cybersecurity Awareness Month 2025: A Comprehensive Guide to Navigating Modern Cyber Threats

Baker Donelson on

Cyber threats don't wait for an invitation – and they certainly don't take a break when the calendar flips to October. As Cybersecurity Awareness Month 2025 begins, the stakes have never been higher. Every organization, from...more

Lowenstein Sandler LLP

BRICKSTORM Malware Campaign: What You Need To Know

Lowenstein Sandler LLP on

What’s Happening: Recent investigations by leading threat intelligence and incident response teams have identified a sophisticated and persistent cyber campaign leveraging the BRICKSTORM malware, attributed to UNC5221 and...more

Bracewell LLP

Houston at Ground Zero: Defending America's Critical Infrastructure From Cyber Threats

Bracewell LLP on

The effects of a cyberattack on Houston’s critical infrastructure could ripple across the United States. The city’s energy production, healthcare systems, transportation networks and chemical manufacturing form the backbone...more

511 Results
 / 
View per page
Page: of 21

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide