News & Analysis as of

Cyber Threats Incident Response Plans

Wiley Rein LLP

Congress Reauthorizes CISA 2015 Through September – But Then What?

Wiley Rein LLP on

The landmark Cybersecurity Information Sharing Act of 2015 (CISA 2015) has been reauthorized retroactively from its original September 30, 2025 expiration for a limited one-year period. This development was the result of the...more

Alston & Bird

FBI Launches Operation Winter SHIELD in Effort to Advance Cyber Resilience Across Critical Sectors

Alston & Bird on

On January 28, 2026, the Federal Bureau of Investigation (FBI) announced the launch of Operation Winter SHIELD, a coordinated initiative designed to promote adoption of core defensive measures that are shown to mitigate...more

Clark Hill PLC

Cannabis Group Series | Securing the Seed: Cybersecurity Challenges in the Cannabis Industry

Clark Hill PLC on

As the cannabis industry continues to grow and evolve, so do the challenges it faces, particularly in the realm of cybersecurity. With increasing digitization, cyber threats pose a significant risk to cannabis businesses,...more

TNG Consulting

Navigating Social Media Awareness, Threats, and Response in K-12 Settings

TNG Consulting on

In K-12 environments, social media is a central hub of student life, where friendships grow, information spreads, and risks can emerge. The digital world mirrors the school community, and what happens online rarely stays...more

Dinsmore & Shohl LLP

Cyber Threat Actor Group, Nitrogen, Unveils New Countermeasure in Ransom Negotiations

Dinsmore & Shohl LLP on

Through the combined efforts between Dinsmore’s cybersecurity team and Armada Growth Partners (AGP), new intelligence on the Techniques, Tactics, and Procedures (TTP) for the Nitrogen ransomware group has been identified....more

MoFo Tech

AI Trends For 2026 - AI-Driven Threats and the Next Phase of Cyber Defense

MoFo Tech on

From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Attacks Keep Climbing

The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more

Shumaker, Loop & Kendrick, LLP

"Analysis of New Cyber Threats: Artificial Intelligence (AI)‑Driven Risks Accelerating in 2026"

AI is no longer an emerging risk; it is now a central driver of offensive and defensive cyber capabilities. As organizations adopt AI tools to improve efficiency, adversaries are leveraging the same technology to automate...more

Orrick, Herrington & Sutcliffe LLP

RegFi Episode 84: Grappling With Cyber Risk, Now and in a Post-Quantum World

Orrick’s James Chou joins RegFi co-hosts Jerry Buckley and Sherry Safchuk for a wide-ranging discussion on how cyber risk is evolving for financial services providers. The conversation explores the growing sophistication of...more

Levenfeld Pearlstein, LLC

FAQ About Cybersecurity in the Construction Industry

The construction industry faces unique cybersecurity challenges that distinguish it from other sectors. With complex payment structures, multiple stakeholders, and extensive use of mobile technology on job sites, construction...more

Skadden, Arps, Slate, Meagher & Flom LLP

Ransomware: What You Need to Know as Attacks, Regulation and Enforcement Increase

Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more

Robinson+Cole Data Privacy + Security Insider

FBI Warns of North Korean Quishing Campaign

As we have warned before, threat actors using QR codes in attacks against victims continue to rise. To illustrate the risk, on January 8, 2026, the FBI issued a FLASH alert, entitled “North Korean Kimsuky Actors Leverage...more

Ervin Cohen & Jessup LLP

New Warning on Mobile Spyware: What Companies Must Do to Protect Employee Devices

On November 25, 2025, the Cybersecurity and Infrastructure Security Agency (“CISA”) issued an alert regarding advanced spyware campaigns targeting mobile devices. The warning identifies messaging apps and social media...more

Constangy, Brooks, Smith & Prophete, LLP

Protect your crown jewels before a hack becomes a heist

On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more

Alston & Bird

How AI is Changing the Incident Response Landscape: What GCs Need to Know

Alston & Bird on

Our Privacy, Cyber & Data Strategy Team examines the profound implications of the evolution of AI-driven cyberattacks and offers practical steps general counsel can take to proactively defend against them....more

Morgan Lewis

Understanding the Cybersecurity Risks Flooding the Water and Wastewater Systems Sector

Morgan Lewis on

US critical infrastructure has historically been a prime target for threat actors due to the significant and far-reaching consequences of cyberattacks. Today, ongoing geopolitical tensions and escalating global conflict have...more

Robinson+Cole Data Privacy + Security Insider

Here Are the Five Top Security Threats from 2025

Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more

Haynes Boone

Making a List, Checking it Twice: Avoiding Cyber Attacks During the Holidays

Haynes Boone on

What’s the Concern? During the holiday season—specifically, Christmas Eve, Christmas, New Year’s Eve and New Year’s Day—there tends to be a spike in cyber attacks on companies. Cyber attackers target this time of year...more

Carlton Fields

No Password Required: Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor

Carlton Fields on

Live from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, virtual CISO at Trace3. Jack Clabby of Carlton Fields and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina’s...more

Constangy, Brooks, Smith & Prophete, LLP

Warm up your defenses against cyber holiday risks

Each year, there is a holiday surge in cyberattacks employing a wide range of attack vectors. This heightened activity can make organizations more vulnerable to legal and regulatory scrutiny. This is a good time to check your...more

Ropes & Gray LLP

On the Fourth Day of Data… All is Calm, All is Bright? Securing Agentic AI Before the Lights Go Out

Ropes & Gray LLP on

As 2025 draws to a close and some organizations slip into a quieter holiday rhythm, their AI systems continue humming in the background—summarizing customer inquiries, triaging security alerts, generating code, and...more

Wiley Rein LLP

’Tis the Season to Evaluate Cyber Readiness and Resilience

Wiley Rein LLP on

The holiday season is a time of celebration, but it’s also a prime opportunity for cyber threat actors. With many employees on leave and organizations operating with reduced staffing, malicious activity can go unnoticed....more

Lowenstein Sandler LLP

BRICKSTORM Malware Campaign UPDATE: What Else You Need To Know

Lowenstein Sandler LLP on

In September 2025, we issued a client alert warning about the BRICKSTORM malware campaign and recommended steps to strengthen your organization’s defenses. On Dec. 4, 2025, the Cybersecurity and Infrastructure Security Agency...more

Mayer Brown

We Have Been Hacked: Now What? Lessons for the Boardroom

Mayer Brown on

The almost daily prevalence of cyber-attacks has brought the issue of cybersecurity as a core governance responsibility to the front of mind of company boards. In 2024 alone, over 15 million cyberattacks were recorded...more

McDermott Will & Schulte

Key takeaways | AI Governance and Security Assessment Workshop

McDermott Will & Schulte on

During the AI Governance and Security Assessment Workshop, Shawn Helms and Jason Krieser of McDermott Will & Schulte and Patrick Murphy of Palo Alto Networks Unit 42, discussed ways to govern the use of generative artificial...more

202 Results
 / 
View per page
Page: of 9

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide