News & Analysis as of

Cybersecurity Cyber Attacks

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Robinson+Cole Data Privacy + Security Insider

SAP NetWeaver Visual Composer Requires Urgent Patch

SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more

K2 Integrity

World Password Day: Increasing Security in Two Steps

K2 Integrity on

May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #441 – Identity Theft Statistics Increasing in 2025

Unfortunately, identity theft continues to increase, and according to Identitytheft.org, the statistics are going to get worse in 2025. Some of the statistics cited by Identitytheft.org include: 1.4 million complaints of...more

Womble Bond Dickinson

Cybersecurity: Salt Typhoon’s Persistence is a Cruel Lesson for Smaller Providers

Womble Bond Dickinson on

This article is based on Carri Bennet’s April 9th presentation at the Palmetto Broadband Coalition Annual Convention in Greenville, S.C. In December 2024, the White House’s Deputy National Security Adviser for Cyber and...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 6, Issue 4, April 2025

Welcome to our fourth issue of 2025 of Decoded - our technology law insights e-newsletter. We hope you enjoy this issue and thank you for reading. Sector by Sector: How Data Breaches are Wrecking Bottom Lines - “Data...more

Clark Hill PLC

Clark Hill 2025 Commercial Real Estate Outlook: The Number One Cybersecurity Threat Facing the Real Estate Sector

Clark Hill PLC on

When we talk to clients about cybersecurity, it tends to conjure up images of ransomware, systems that are encrypted and inaccessible, and stolen data. For the real estate sector, ransomware isn’t the largest cybersecurity...more

Orrick, Herrington & Sutcliffe LLP

OCC provides an update on its security breach given institutional risk

On April 14, the OCC released a letter providing more details on the recent security breach involving its email systems. The breach — identified as a major incident under the Federal Information Security Modernization Act...more

Robinson+Cole Data Privacy + Security Insider

AI Powered Bot Targeted 400,000 Websites

SentinelOne researchers have discovered AkiraBot, which is used to target small- to medium-sized company websites with generative AI, and drafted outreach messages for website chats, comments, and contact forms. SentinelOne...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Alert on Potential Legacy Oracle Cloud Compromise

BleepingComputer has confirmed the rumor that Oracle has suffered a compromise affecting its legacy environment, including the compromise of old customer credentials (originally denied by Oracle). Oracle notified some...more

Mandelbaum Barrett PC

Cybersecurity in Business Ownership: What Your Start-Up Should Know

Mandelbaum Barrett PC on

Cybersecurity is no longer a luxury; it’s a necessity. For start-ups and established businesses alike, protecting sensitive information and maintaining customer trust relies heavily on strong cybersecurity measures. With...more

Holland & Knight LLP

Sophisticated Crypto Theft Targeting High-Net-Worth Individuals

Holland & Knight LLP on

A recent court case has unveiled a new level of sophistication in attacks targeting high-net-worth cryptocurrency holders. In a meticulously orchestrated scheme, hackers managed to steal more than $40 million in bitcoin from...more

Woodruff Sawyer

Cyber 101: Understand the Basics of Cyber Liability Insurance

Woodruff Sawyer on

Cyber risk has grown demonstrably in frequency and severity in the past 10 years—and, in tandem, the cyber insurance policy has grown in breadth and complexity. This past year, a record number of organizations fell victim to...more

Hogan Lovells

NIST finalizes cybersecurity incident response framework profile aligned with CSF 2.0

Hogan Lovells on

On April 3, NIST published practical incident response guidance aligned with its CSF 2.0 framework. The guidance outlines best practices in security incident preparation and response for organizations mapped across each of...more

Orrick, Herrington & Sutcliffe LLP

OCC announces major information security incident

On April 8, the OCC announced it had notified Congress of a major information security incident, as required by the Federal Information Security Modernization Act. The incident involved unauthorized access to emails and their...more

Carlton Fields

No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion

Carlton Fields on

On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more

Alston & Bird

UK Government Publishes Cyber Governance Code of Practice for Boards and Directors

Alston & Bird on

On April 8, 2025, the UK government published the Cyber Code of Practice (the “Code”) to support board directors in governing cybersecurity risks. The Code is available online. The UK’s data protection regulator is actively...more

Robinson+Cole Data Privacy + Security Insider

WhatsApp Patches Vulnerability That Facilitates Remote Code Execution

WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more

Troutman Pepper Locke

OCC Notifies Congress of Major Email System Security Breach

Troutman Pepper Locke on

On April 8, the Office of the Comptroller of the Currency (OCC) officially notified Congress of a significant information security incident involving its email system. This notification, mandated by the Federal Information...more

Goldberg Segalla

Tax Season = Phishing Season

Goldberg Segalla on

Most professionals are aware of the April 15 tax deadline. We know that fraudsters certainly are! As Tax Day approaches in the U.S., we encourage all to be mindful of several phishing campaigns that Microsoft has observed...more

Morris, Manning & Martin, LLP

Innovation or Insecurity? Rethinking Cybersecurity in the Age of AI

In boardrooms, C-suites, and conference rooms across the country, the rapid pace of AI innovation is capturing the imagination of business leaders. Yet, amid this enthusiasm, there is a concerning trend, namely that many...more

Spilman Thomas & Battle, PLLC

The Health Record - Healthcare Law Insights, V 2, Issue 4, April 2025

Welcome to our fourth issue of 2025 of The Health Record -- our healthcare law insights e-newsletter. In this edition, we look at prior authorization transparency and physician decision-making; the impact of Medicaid cuts...more

Bennett Jones LLP

Don’t Be the Next Victim of a BEC Scam

Bennett Jones LLP on

Businesses are increasingly defrauded through common scams known as business email compromise scams (BEC scams) for which they do not have insurance to cover the resulting losses. Fortunately, there are easy-to-implement...more

Skadden, Arps, Slate, Meagher & Flom LLP

Fintech Focus Podcast | Responding to a Cyber Attack – Key Considerations for GCs and CISOs

As companies shift their thinking from “if” a cyberattack will happen to “when” an attack hits, the key differentiator in how a company emerges from an attack is often dictated by preparation and strategic planning in order...more

Bennett Jones LLP

10 Key Questions to Guide Cyber Risk Management

Bennett Jones LLP on

Asking the right questions within your organization is key to effectively managing cyber risk. Here are 10 questions that you should ask your team...more

3,948 Results
 / 
View per page
Page: of 158

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide