News & Analysis as of

Cyber Threats Risk Mitigation

Robinson+Cole Data Privacy + Security Insider

Single Sign-On Services Targeted in Vishing Attacks

We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more

MoFo Tech

AI Trends For 2026 - AI-Driven Threats and the Next Phase of Cyber Defense

MoFo Tech on

From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more

Patomak Global Partners

Is Your IT Risk Management Framework “Future-Proof”?

Technology risks constantly evolve. Effective IT Risk Management Programs can identify, address and, as needed, adapt to emerging risks. This analysis illustrates how an effective IT Risk Management Framework can identify an...more

Shumaker, Loop & Kendrick, LLP

"Analysis of New Cyber Threats: Artificial Intelligence (AI)‑Driven Risks Accelerating in 2026"

AI is no longer an emerging risk; it is now a central driver of offensive and defensive cyber capabilities. As organizations adopt AI tools to improve efficiency, adversaries are leveraging the same technology to automate...more

Constangy, Brooks, Smith & Prophete, LLP

Protect your crown jewels before a hack becomes a heist

On October 19, the Louvre Museum in Paris was burglarized in broad daylight. Priceless jewels were taken. The physical security of the museum has been faulted, but the museum has also been criticized for using outdated...more

Alston & Bird

How AI is Changing the Incident Response Landscape: What GCs Need to Know

Alston & Bird on

Our Privacy, Cyber & Data Strategy Team examines the profound implications of the evolution of AI-driven cyberattacks and offers practical steps general counsel can take to proactively defend against them....more

Wiley Rein LLP

’Tis the Season to Evaluate Cyber Readiness and Resilience

Wiley Rein LLP on

The holiday season is a time of celebration, but it’s also a prime opportunity for cyber threat actors. With many employees on leave and organizations operating with reduced staffing, malicious activity can go unnoticed....more

Lowenstein Sandler LLP

BRICKSTORM Malware Campaign UPDATE: What Else You Need To Know

Lowenstein Sandler LLP on

In September 2025, we issued a client alert warning about the BRICKSTORM malware campaign and recommended steps to strengthen your organization’s defenses. On Dec. 4, 2025, the Cybersecurity and Infrastructure Security Agency...more

McDermott Will & Schulte

Key takeaways | AI Governance and Security Assessment Workshop

McDermott Will & Schulte on

During the AI Governance and Security Assessment Workshop, Shawn Helms and Jason Krieser of McDermott Will & Schulte and Patrick Murphy of Palo Alto Networks Unit 42, discussed ways to govern the use of generative artificial...more

Robinson+Cole Data Privacy + Security Insider

Compromised Credentials Responsible for 50% of Ransomware Attacks

The statistics listed in the Quarterly Threat Report: Third Quarter, 2025, issued by Beazley Security are eye popping. They include: August and September showed a sharp increase in ransomware activity, with those months...more

StoneTurn

AI and LLMs in Corporate Cybersecurity: Choosing the Right Solution for Your Organization

StoneTurn on

This article examines how cybersecurity teams can leverage AI and LLM technologies like Microsoft Copilot and Open WebUI while managing associated security risks through proper logging and monitoring practices. It provides...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity resolutions for 2026

As 2025 comes to an end, there have been some valuable cybersecurity lessons for businesses. These involve vendor oversight, internal coordination, and incident response plans. Businesses should vow to address them in 2026 if...more

Wiley Rein LLP

Fraud and Scam Prevention Series: Navigating Increasingly Sophisticated Cybersecurity Threat and Fraud Tactics

Wiley Rein LLP on

Cybersecurity risks are evolving, in part because bad actors – including scammers and fraudsters – are leveraging widely available artificial intelligence (AI) tools for nefarious purposes. In the escalating fraud landscape,...more

Perkins Coie

House Bill Introduced to Shield the U.S. From Cybersecurity Risks Posed by Quantum Computing

Perkins Coie on

Congress members have proposed legislation that would introduce new measures to enhance the United States’ cybersecurity resilience in the face of advancing quantum computing capabilities. On August 8, 2025, a bipartisan...more

Gray Reed

AI-Powered Cyberattacks Are Here: How They Are Supercharging Ransomware Attacks and How You Can Mitigate Them

Gray Reed on

In today’s landscape of evolving cyber threats, assuming your business is safe is no longer an option – it’s time to take proactive steps to defend against cyberattacks. In the arms race between cyberattacks and organizations...more

McCarter & English, LLP

Keeping the Lights On: Cybersecurity & Data Privacy Concerns in the Commercial Real Estate Industry

Cybersecurity and data privacy matters impact everything around us, including our physical space. Commercial real estate space represents a large part of every city across the globe, whether it is owned or leased. What would...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity Awareness Month: Protecting people, data, business integrity

October is National Cybersecurity Awareness Month, which is celebrating its 21st year. Spearheaded, organized and led by the Cybersecurity and Infrastructure Security Agency and the National Cybersecurity Alliance, the...more

Lowenstein Sandler LLP

On-Premises Oracle EBS Systems at Risk Due to CL0P Exploit

Lowenstein Sandler LLP on

A recent campaign by the CL0P ransomware group has targeted on-premises, customer-managed Oracle E-Business Suite (EBS) systems, resulting in the potential for widespread data exfiltration and extortion attempts. The...more

Morrison & Foerster LLP

[Webinar] CTRL+ALT+DEFEND: Insights on Emerging Threats and Best Practices for Cyber Risk Mitigation - October 29th, 1:00 pm ET

Morrison & Foerster LLP on

Join Kaylee Cox Bankston and Linda Clark for an engaging and informative webinar on October 29th exploring the most pressing cybersecurity topics of 2025 and beyond. This session will cover the latest threat landscapes,...more

Morgan Lewis - Tech & Sourcing

Cybersecurity Insurance – A Burgeoning Global Market

According to a 2025 report on cyber insurance trends published by Munich Re, the global cyber insurance market totaled $15.3 billion in 2024, and is expected to reach $16.3 billion by the end of 2025. ...more

Baker Donelson

Cybersecurity Awareness Month 2025: Seven Foundational Pillars of Good Personal Cyber Hygiene

Baker Donelson on

Deepfakes, social engineering, and urgent texts or calls from your IT department all continue to be effective methods hackers use to gain access to your most important accounts and assets. October is Cybersecurity Awareness...more

McCarter & English, LLP

The End of an Era: A Decade of Cybersecurity Protections Expire

With the new fiscal year upon us, it is official – the legal protections for sharing of cyber threat information among private sector entities and with the federal government were not renewed by Congress and have expired. The...more

Lowenstein Sandler LLP

BRICKSTORM Malware Campaign: What You Need To Know

Lowenstein Sandler LLP on

What’s Happening: Recent investigations by leading threat intelligence and incident response teams have identified a sophisticated and persistent cyber campaign leveraging the BRICKSTORM malware, attributed to UNC5221 and...more

Robinson+Cole Data Privacy + Security Insider

Legal Services Industry Targeted by BRICKSTORM

The Mandiant and Google Threat Intelligence Group has been responding to and monitoring malware dubbed BRICKSTORM targeting “a range of industry verticals, most notably legal services, Software as a Service (SaaS) providers,...more

Robinson+Cole Data Privacy + Security Insider

Akira Still Using SonicWall Devices for Attacks

Although SonicWall has provided a patch for a vulnerability for its VPN affecting its Gen5, Gen6, and Gen7 firewall appliances (which allowed threat actors unauthorized access to SonicWall appliances), Rapid7 has reported...more

173 Results
 / 
View per page
Page: of 7

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide