News & Analysis as of

Cybersecurity Cyber Crimes

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Awatif Mohammad Shoqi Advocates & Legal...

Learn more about privacy violations and secret disclosure under the UAE.

In today's world, violations of individual privacy and secret disclosure are a serious problem. It may be eavesdropping, interception, recording, and the spreading of personal information without the consent of the other...more

Fisher Phillips

Court Confirms Kentucky Consumer Protection Act Doesn’t Cover Employees, But Legal Risks Remain: 5 Steps for Employers to Avoid...

Fisher Phillips on

A federal district court recently found that employees aren’t protected by Kentucky’s consumer protection law because they don’t qualify as consumers, handing a solid win to employers. The April 21 decision in Viviali v. One...more

Fisher Phillips

North Korean Scammers are Posing as IT Freelancers: Here’s How You Can Protect Your Business

Fisher Phillips on

Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more

Fisher Phillips

Cyber Threat Escalates: PowerSchool Cybercriminal Returns to Extort Individual Schools Months After Massive Data Breach...

Fisher Phillips on

When PowerSchool announced in January that it fell victim to a massive data breach at the end of 2024, it assured the thousands of schools and over 50 million students who use the education software that the matter had been...more

Woodruff Sawyer

Fiduciary Duty in the Digital Age: Cybersecurity Best Practices for ERISA Plans

Woodruff Sawyer on

Cybercriminals look for two things when seeking a victim—access and opportunity. ERISA retirement plans offer both. Cybercriminals exploit weaknesses in systems, software, or human behavior to find opportunities for easy...more

StoneTurn

The Evolution of Cybercrime: How to Stay Safe from AI-Driven Fraud

StoneTurn on

A recent article in The Wall Street Journal highlights a case that is sadly all too familiar – a family member is in distress, and you must wire them money to help save them. Of course, as the article reveals, the family...more

Ice Miller

As the Department of Justice Affirms and Advances Its Cyber-Fraud Initiative, Government Contractors Should Take Steps to Ensure...

Ice Miller on

While some areas of white-collar enforcement have been deprioritized by the Trump Administration, the Department of Justice (DOJ) remains committed to its Civil Cyber-Fraud Initiative as demonstrated by two recent False...more

Carlton Fields

No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion

Carlton Fields on

On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more

Troutman Pepper Locke

Need for Enhanced Cybersecurity in Public Finance — Cyberthieves Steal Bond Proceeds

Troutman Pepper Locke on

Recent events highlight the need for enhanced cybersecurity protocols in government offices across the U.S. In late November 2024, the Township of White Lake in Michigan, intended to issue approximately $29 million in general...more

Frost Brown Todd

Managing Data Security and Privacy Risks in Enterprise AI

Frost Brown Todd on

Artificial intelligence (AI), particularly generative AI, thrives on vast amounts of data, fueling AI capabilities, insights, and predictions. But with this reliance on data comes potential privacy and security risks. And...more

Kohrman Jackson & Krantz LLP

Cleveland Municipal Court Hit by Cyber Attack

Cleveland Municipal Court has been shut down the past two weeks as it grapples with a cyber incident. The nature and scope of this incident is not yet publicly known, but it is reasonable to suggest that the Court may have...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Robinson+Cole Data Privacy + Security Insider

Criminal Charges Lodged Against Alleged Phobos Ransomware Affiliates

Unfortunately, I’ve had unpleasant dealings with the Phobos ransomware group. My interactions with Phobos have been fodder for a good story when I educate client employees on recent cyber-attacks to prevent them from becoming...more

Ankura

Cybercriminals Are Moving into the Cloud and Making Your Active Directory Their New Home

Ankura on

Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more

A&O Shearman

White-collar crime developments in Italy: trends and developments

A&O Shearman on

There has been an increase in enforcement action and strategies relating to cybercrimes, supply-chain related offenses, VAT fraud, corruption, and money laundering. A significant shift has been prompted by the EU Corporate...more

Foley & Lardner LLP

Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity and Potential Implications Under the Trump...

Foley & Lardner LLP on

On January 16, 2025, President Joe Biden signed the “Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity.” This directive seeks to tackle the increasingly complex and evolving cybersecurity...more

Kohrman Jackson & Krantz LLP

The Columbus City Hall Cyber Attack: Key Takeaways

This past July, the City of Columbus, Ohio experienced a significant data breach. Hackers were able to breach Columbus’ network and gained access to private information of city employees and residents. Initially, the City...more

HaystackID

Protecting Educational Data: Insights from the PowerSchool Breach

HaystackID on

The PowerSchool data breach, discovered on December 28, 2024, serves as a powerful reminder of the persistent cybersecurity challenges confronting the education sector. PowerSchool, a leading provider of education technology,...more

Robinson+Cole Data Privacy + Security Insider

Rhysida Hits American Addiction Centers + Publishes 2.8TB of Data

American Addiction Centers (AAC) has notified 422,424 individuals that their personal information was stolen in a cyber-attack attributed to the Rhysida criminal organization. The incident was discovered on September 26,...more

HaystackID

AI-Driven Phishing: An Emerging Threat to Corporate Security

HaystackID on

In an era marked by rapid technological advancement, artificial intelligence has emerged as a transformative force in cybersecurity threats, particularly in the domain of sophisticated phishing attacks. Recent developments...more

Foley Hoag LLP - Security, Privacy and the...

U.S. House Report Addresses AI Concerns, Including Privacy and Data Security

Overall, the Report recognized the complex interplay between AI advancement and privacy/security concerns, advocating for a balanced approach that promotes innovation while protecting individual rights and national interests....more

Katten Muchin Rosenman LLP

The U.S. Govenment Charges China-Based Hacker for Exploiting Zero-Day Vulnerability

On December 10, 2024, the federal government unsealed an indictment in federal court in Indiana, charging Chinese national Guan Tianfeng (Guan) for his role in allegedly breaking into thousands of Sophos Ltd. (Sophos)...more

Baker Donelson

How Remote Hiring Practices Could Lead to Infiltration of Your Organization: North Korea Operatives are Exploiting Remote Hiring...

Baker Donelson on

In today's fast-paced digital world, businesses often seek to access a global pool of skilled professionals by turning to remote talent to fill gaps in their IT needs. Although this practice has many advantages, it also...more

Ropes & Gray LLP

Deck the Halls with Cyber Walls: Navigating National Security in the Digital Age

Ropes & Gray LLP on

Cybersecurity and national security collided in significant ways in 2024, with governments and private-sector entities grappling with the legal, technical, and policy challenges of a rapidly evolving cyber landscape....more

K2 Integrity

Don’t Let Cyber Scams Ruin the Holidays: Keep the Holiday Season Festive for Your Organization

K2 Integrity on

“It’s the most wonderful time of the year”—or is it? Unfortunately, it can be the most wonderful time for criminals, who try to prey on financial generosity through scams and frauds. Extra vigilance is needed during the...more

1,273 Results
 / 
View per page
Page: of 51

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide