News & Analysis as of

Cyber Threats Phishing Scams

Robinson+Cole Data Privacy + Security Insider

ShinyHunters Bypassing Multifactor Authentication

Security professionals rely on the implementation of multifactor authentication (MFA) to defend against phishing attacks and intrusions. Unfortunately, we can’t completely rely on MFA to protect us as threat actors (more...more

Alston & Bird

FBI Launches Operation Winter SHIELD in Effort to Advance Cyber Resilience Across Critical Sectors

Alston & Bird on

On January 28, 2026, the Federal Bureau of Investigation (FBI) announced the launch of Operation Winter SHIELD, a coordinated initiative designed to promote adoption of core defensive measures that are shown to mitigate...more

Lowndes

New Email Scam Impersonates Local Planning Staff to Solicit Fraudulent Fees

Lowndes on

An email phishing scheme is circulating that targets development applicants by impersonating local planning staff and demanding payment of an “Application Approval Fee” invoice. The messages claim that paying the invoice is a...more

Robinson+Cole Data Privacy + Security Insider

Single Sign-On Services Targeted in Vishing Attacks

We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more

Bressler, Amery & Ross, P.C.

Cybersecurity Threat Alert – Email Phishing Scam Targeting DFS-Regulated Entities

The New York Department of Financial Services (“DFS”) has issued the below notice to regulated entities and individuals to use caution before responding to outreach from individuals falsely claiming to represent DFS....more

Orrick, Herrington & Sutcliffe LLP

NYDFS issues cybersecurity threat alert regarding email scam targeting NYDFS regulated entities

On January 22, the NYDFS issued an alert informing regulated entities about an email phishing scam falsely claiming to represent the regulator. The alert warned that scammers may have sent emails urging recipients to open...more

Carlton Fields

No Password Required: CISO at RSA and Champion of a Passwordless Future

Carlton Fields on

Rob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and...more

Robinson+Cole Data Privacy + Security Insider

FBI Warns of North Korean Quishing Campaign

As we have warned before, threat actors using QR codes in attacks against victims continue to rise. To illustrate the risk, on January 8, 2026, the FBI issued a FLASH alert, entitled “North Korean Kimsuky Actors Leverage...more

Ervin Cohen & Jessup LLP

New Warning on Mobile Spyware: What Companies Must Do to Protect Employee Devices

On November 25, 2025, the Cybersecurity and Infrastructure Security Agency (“CISA”) issued an alert regarding advanced spyware campaigns targeting mobile devices. The warning identifies messaging apps and social media...more

Haynes Boone

Making a List, Checking it Twice: Avoiding Cyber Attacks During the Holidays

Haynes Boone on

What’s the Concern? During the holiday season—specifically, Christmas Eve, Christmas, New Year’s Eve and New Year’s Day—there tends to be a spike in cyber attacks on companies. Cyber attackers target this time of year...more

Constangy, Brooks, Smith & Prophete, LLP

Warm up your defenses against cyber holiday risks

Each year, there is a holiday surge in cyberattacks employing a wide range of attack vectors. This heightened activity can make organizations more vulnerable to legal and regulatory scrutiny. This is a good time to check your...more

Clark Hill PLC

Right To Know - December 2025, Vol. 36

Clark Hill PLC on

Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Wiley Rein LLP

[Podcast] Episode 2: AI’s Role in the Evolution of Cyber Threats

Wiley Rein LLP on

What happens when the familiar faces of trusted clients, coworkers, and peers turn out to be AI-generated imposters? In this episode of The Cyber Periscope, Pam Signorello sits down with Nate Lovett of Wiley's Cyber Insurance...more

Robinson+Cole Data Privacy + Security Insider

Threat Actors Targeting Messaging Applications

On November 24, 2025, the Cybersecurity & Infrastructure Security Agency (CISA) issued an alert titled “Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications,” which outlines how “multiple cyber threat...more

Ankura

Enhancing Business Security: Common Cybersecurity Threats and Effective Protection Strategies

Ankura on

In today’s digital landscape, businesses of every size face a growing number of cybersecurity threats. From sophisticated spear phishing campaigns to disruptive malware, cyberattacks are no longer a question of if, but when....more

K2 Integrity

‘Tis The Season To Shop Cyber Smart: Holiday Risks To Organizations And Employees

K2 Integrity on

During the holiday season, online shopping sites advertise big sales to draw consumers onto their sites. Distracted by low prices and expedited shipping times, shoppers often forget to take a moment to think about security....more

Wiley Rein LLP

Wiley’s Cyber Risks and Insurance 2026 Forecast

Wiley Rein LLP on

As we prepare to close the books on another eventful year in the cyber and privacy space, Wiley’s Cyber Insurance team is already making predictions for 2026. Q: With the increase in the use of generative AI, how have the...more

Wiley Rein LLP

Fraud and Scam Prevention Series: Navigating Increasingly Sophisticated Cybersecurity Threat and Fraud Tactics

Wiley Rein LLP on

Cybersecurity risks are evolving, in part because bad actors – including scammers and fraudsters – are leveraging widely available artificial intelligence (AI) tools for nefarious purposes. In the escalating fraud landscape,...more

Gray Reed

AI-Powered Cyberattacks Are Here: How They Are Supercharging Ransomware Attacks and How You Can Mitigate Them

Gray Reed on

In today’s landscape of evolving cyber threats, assuming your business is safe is no longer an option – it’s time to take proactive steps to defend against cyberattacks. In the arms race between cyberattacks and organizations...more

Perkins Coie

Keep the Season Bright: Holiday Cybersecurity Tips for Retailers

Perkins Coie on

The holidays are upon us, and the last thing retailers want to do is respond to a security incident. Close behind, we’re sure, are changes to systems and policies at this time of year. But what can you do now to...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity Awareness Month: Protecting people, data, business integrity

October is National Cybersecurity Awareness Month, which is celebrating its 21st year. Spearheaded, organized and led by the Cybersecurity and Infrastructure Security Agency and the National Cybersecurity Alliance, the...more

K2 Integrity

Cybersecurity Awareness Month: Identifying And Avoiding Phishing Attacks

K2 Integrity on

Cybersecurity Awareness Month was established to provide resources to organizations and their employees to help them stay safer and more secure online. It is an opportunity to focus on four key behaviors: creating strong...more

Blake, Cassels & Graydon LLP

Escroqueries au moyen de noms de domaine trompeurs : Partie I – En quoi elles consistent et comment les repérer

Le nom de domaine est devenu un des éléments clés d’une marque, permettant au public d’identifier facilement le site Web et l’adresse courriel d’une entreprise. Les escroqueries au moyen de noms de domaine trompeurs, et les...more

Mayer Brown

2025 Cyber Incident Trends: What Your Business Needs to Know

Mayer Brown on

Malicious actors continue to exploit our connected digital ecosystem, disrupting organizations across all sectors. Some of the most significant evolutions in the cyber threat landscape stem from artificial intelligence...more

HaystackID

Europe Under Siege: How Cybercriminals and State Actors Are Rewriting Digital Threat Rules

HaystackID on

In 2025, European organizations found themselves navigating an increasingly complex digital landscape, where traditional cybersecurity assumptions were eroded by waves of sophisticated attacks and converging threat groups....more

155 Results
 / 
View per page
Page: of 7

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide