News & Analysis as of

Cyber Threats Supply Chain

Goodwin

The UK’s Ransomware Strategy: What the UK Government’s Response Signals

Goodwin on

Following the UK Government's launch of a public consultation on its proposed legislative measures to combat the threat of ransomware (see Goodwin’s January 2025 analysis), the UK Government published its response to the...more

Jones Day

EU Commission Proposes Revised Cybersecurity Act to Bolster EU Cyber Resilience

Jones Day on

On January 20, 2026, the EU Commission unveiled a new Cybersecurity Package (the "Package") designed to reinforce the EU's cyber resilience in response to an increasingly complex and sophisticated threat environment....more

Baker Botts L.L.P.

What is OpenClaw, and Why Should You Care?

Baker Botts L.L.P. on

Over 100,000 people just gave an AI assistant root access to their computers. That assistant can now talk to other AI assistants on a social network humans cannot post to....more

Akin Gump Strauss Hauer & Feld LLP

EU Cyber and Connectivity Proposals with Extra-Territorial Impact: Cybersecurity Act 2 and Digital Networks Act Go to Negotiations

On 20 and 21 January 2026, the European Commission presented its proposals for a Cybersecurity Act 2 (CSA2) and a Digital Networks Act (DNA). The CSA2 aims to increase Information and Communication Technologies (ICT) supply...more

Levenfeld Pearlstein, LLC

FAQ About Cybersecurity in the Construction Industry

The construction industry faces unique cybersecurity challenges that distinguish it from other sectors. With complex payment structures, multiple stakeholders, and extensive use of mobile technology on job sites, construction...more

Mitratech Holdings, Inc

[Webinar] Future-Proofing Your Operational Resilience in Europe with Continuity Planning - January 22nd, 3:00 pm - 4:00 pm CET

European organizations are facing growing operational risks—from cyber threats and regulatory change to supply-chain instability and climate-related disruptions. New regulations such as DORA, NIS2, and the UK Operational...more

Robinson+Cole Data Privacy + Security Insider

Here Are the Five Top Security Threats from 2025

Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more

Constangy, Brooks, Smith & Prophete, LLP

Warm up your defenses against cyber holiday risks

Each year, there is a holiday surge in cyberattacks employing a wide range of attack vectors. This heightened activity can make organizations more vulnerable to legal and regulatory scrutiny. This is a good time to check your...more

Lowenstein Sandler LLP

BRICKSTORM Malware Campaign UPDATE: What Else You Need To Know

Lowenstein Sandler LLP on

In September 2025, we issued a client alert warning about the BRICKSTORM malware campaign and recommended steps to strengthen your organization’s defenses. On Dec. 4, 2025, the Cybersecurity and Infrastructure Security Agency...more

Mayer Brown

We Have Been Hacked: Now What? Lessons for the Boardroom

Mayer Brown on

The almost daily prevalence of cyber-attacks has brought the issue of cybersecurity as a core governance responsibility to the front of mind of company boards. In 2024 alone, over 15 million cyberattacks were recorded...more

Mayer Brown

Securing the Final Frontier: Cybersecurity Risk, Regulation, and Compliance Trends in Space and Satellite Operations

Mayer Brown on

Space and satellite systems underpin a wide range of critical functions, including global communications, navigation, scientific research, defense operations, and essential infrastructure services. As both government and...more

Ankura

Enhancing Business Security: Common Cybersecurity Threats and Effective Protection Strategies

Ankura on

In today’s digital landscape, businesses of every size face a growing number of cybersecurity threats. From sophisticated spear phishing campaigns to disruptive malware, cyberattacks are no longer a question of if, but when....more

Jones Day

EU Geopolitical Risk Update - Key Policy & Regulatory Developments No. 123

Jones Day on

This update (No. 123 | 8 October 2025) covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity resolutions for 2026

As 2025 comes to an end, there have been some valuable cybersecurity lessons for businesses. These involve vendor oversight, internal coordination, and incident response plans. Businesses should vow to address them in 2026 if...more

Lowenstein Sandler LLP

Anthropic Reports First Known AI-Orchestrated Cyber Espionage Campaign: Raising Stakes for Data Security

Lowenstein Sandler LLP on

On November 13, AI company Anthropic reported that its Threat Intelligence team had disrupted a state‑sponsored Chinese threat actor conducting what is believed to be the first largely autonomous AI‑orchestrated cyber...more

Mayer Brown

Cyber Security and Resilience (Network and Information Systems) Bill introduced to Parliament

Mayer Brown on

The United Kingdom's government introduced the Cyber Security and Resilience (Network and Information Systems) Bill (the "Bill") to Parliament on 12 November 2025. The Bill is designed to update and strengthen the existing...more

Foley & Lardner LLP

Securing Digital Supply Chains: Confronting Cyber Threats in Logistics Networks

Foley & Lardner LLP on

On the Rise: Cyberattacks through the supply chain have increased by over 400% in recent years. Leaders need to take action. Enhance Third-Party Cybersecurity: Regularly audit suppliers’ cybersecurity practices and limit...more

American Conference Institute (ACI)

[Event] 15th Annual New York Forum on Economic Sanctions - December 3rd - 4th, New York, NY

How are multinationals managing sanctions and export control risks in today’s challenging business environment? Attend ACI’s 15th Annual New York Forum on Economic Sanctions to receive the critical information you need to...more

Lowenstein Sandler LLP

F5 Security Incident: BIG‑IP Source Code Theft Spurs Urgent Actions

Lowenstein Sandler LLP on

On October 15, application security vendor F5, Inc. disclosed that a highly sophisticated nation-state threat actor maintained long-term, persistent access to certain F5 systems. The attackers exfiltrated portions of BIG-IP1...more

Mayer Brown

2025 Cyber Incident Trends: What Your Business Needs to Know

Mayer Brown on

Malicious actors continue to exploit our connected digital ecosystem, disrupting organizations across all sectors. Some of the most significant evolutions in the cyber threat landscape stem from artificial intelligence...more

DLA Piper

UK: It’s Time to Act – The UK National Cyber Security Centre’s Wake-Up Call for Business Leaders

DLA Piper on

Visible cyber fallout is everywhere. Impact to business operations (and therefore revenue) including halted production lines, emptied supermarket shelves, online payment unavailability, and patient backlogs have all brought...more

HaystackID

Europe Under Siege: How Cybercriminals and State Actors Are Rewriting Digital Threat Rules

HaystackID on

In 2025, European organizations found themselves navigating an increasingly complex digital landscape, where traditional cybersecurity assumptions were eroded by waves of sophisticated attacks and converging threat groups....more

Baker Donelson

Cybersecurity Awareness Month 2025: A Comprehensive Guide to Navigating Modern Cyber Threats

Baker Donelson on

Cyber threats don't wait for an invitation – and they certainly don't take a break when the calendar flips to October. As Cybersecurity Awareness Month 2025 begins, the stakes have never been higher. Every organization, from...more

McDermott Will & Schulte

Salesloft Drift supply chain attack leads to widespread data theft

Threat actors stole authentication tokens for Salesloft Drift, a popular marketing automation tool, leading to widespread data exfiltration from Salesforce customer instances that occurred mostly between August 8 and 18,...more

Warner Norcross + Judd

[Event] Bridging the Risk Gap: Legal Strategies for Supply Chain Resilience - October 7th, Detroit, MI

In today’s rapidly evolving global landscape, supply chain leaders face mounting challenges — from shifting regulatory frameworks to rising cybersecurity threats and increasing geopolitical uncertainty. This half-day seminar...more

76 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide