News & Analysis as of

Cybersecurity Fraud

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Robinson+Cole Data Privacy + Security Insider

What to Know About SafePay Ransomware Group

The SafePay ransomware group has been active since fall 2024 and has increased its activity this spring and summer. According to NCC Group, SafePay hit the most victims of any threat actor in May 2025—it is linked to 248...more

Potomac Law Group, PLLC

Cybercriminals Hit Your Inbox—Now What? Recovering Funds After Business Email Compromise and Fraud Schemes

The global cyber scam industry is a multi-billion dollar racket run by crime syndicates who often operate through massive compounds known as “scam farms” in far flung locations.  On our shores, many businesses fall prey to...more

IR Global

Increase In Fraudulent Business Filings

IR Global on

How Can You Protect Yourself and Your Business? What Is A Fraudulent Business Filing? The phrase is relatively self-explanatory: any business filing obtained, changed, or filed without authorization and/or involving...more

Zelle  LLP

N.M. Cyber Ruling Will Spur Litigation As Coverage Remedy

Zelle LLP on

A June 16 appellate decision involving the construction of a cyberinsurance policy demonstrates a concerning lack of judicial understanding about the nature and scope of cyber liability coverage and implicitly incentivizes...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #449 – Scammers Hijacking Websites to Insert Fake Support Number

Malwarebytes recently reported that it has found scammers hijacking websites of name brands, including banks, software companies, and social media platforms to trick victims into calling a fraudulent telephone number instead...more

Womble Bond Dickinson

2025 National Health Care Fraud Takedown Sets Record as Largest in U.S. History, Charging 324 Defendants for Over $14.6 Billion in...

Womble Bond Dickinson on

On June 30, 2025, the Department of Justice announced the results of its 2025 National Health Care Fraud Takedown (“2025 Takedown”). ...more

NAVEX

Watch Out for Hoax Reports to Your Hotline

NAVEX on

We’ve recently been made aware of an increase in anonymous hoax emails and online reports posted to multiple companies through their internal reporting systems. The wording of these posts were identical and alleged violation...more

Thomas Fox - Compliance Evangelist

Great Women in Compliance: GWIC X EC Q2 2025 - Exploring Compliance Innovations

We are back with another GWIC X EC crossover episode. Today we have the quartet of Great Women in Compliance of Kristy Grant-Hart, Karen Moore, Lisa Fine and Hemma Lomax. The GWIC quartet discuss various intriguing topics...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #447 – Understanding Cybersquatting

We are seeing an increase in cybersquatting incidents. What is cybersquatting and how can it affect you? According to Sentinel One, cybersquatting, or domain squatting, “involves the registration, selling, or use of an...more

Hogan Lovells

Annual update on .UK domain names suspended for criminal activity

Hogan Lovells on

Nominet, the Registry responsible for running the .UK country code Top-Level Domain (ccTLD), has published its annual report on .UK domain names that have been suspended due to criminal activity. The report covers the 12...more

Jackson Lewis P.C.

The Growing Cyber Risks from AI — and How Organizations Can Fight Back

Jackson Lewis P.C. on

Artificial Intelligence (AI) is transforming businesses—automating tasks, powering analytics, and reshaping customer interactions. But like any powerful tool, AI is a double-edged sword. While some adopt AI for protection,...more

Farella Braun + Martel LLP

Fraud Risks in Nonprofit Organizations: Learning From Real-Life Case Studies

The Washington Post (2013) found that one-sixth of all embezzlement cases in the U.S. involve nonprofit and religious organizations, ranking just behind the financial sector. This statistic is jarring but not entirely...more

Farella Braun + Martel LLP

Which Party Loses Out When Settlement Funds Are Wired to a “Spoofer” and Not Plaintiff?

Answer: the “party in the best position to prevent the fraud.” In the digital age, where cyber-attacks are becoming more sophisticated, all legal professionals should take heed of the recent decision in Thomas v. Corbyn...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #446 – Department of Motor Vehicles Warns Drivers About Smishing Text Surge

Smishing schemes involving Departments of Motor Vehicles nationwide have increased. Scammers are sending SMS text messages falsely claiming to be from the DMV that “are designed to deceive recipients into clicking malicious...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 6, Issue 5, June 2025

Why this is important: Banks are spending big on generative AI (genAI). That’s the thrust of this article. Two hundred U.S. bank executives were recently polled for a report published in April. That report showed that six in...more

Proskauer on Privacy

California Court Holds Defendants Liable for Fraudulent Wire Transfer

Proskauer on Privacy on

Wire transfer fraud has long been a popular target for cyber criminals. A case of first impression decided by the California Court of Appeal, Fourth Appellate District demonstrates the high stakes for victims of this...more

Ropes & Gray LLP

SEC Speaks 2025: Key Takeaways from Division of Enforcement Panels

Ropes & Gray LLP on

The SEC’s Division of Enforcement intends to remain a “cop on the beat,” and will refocus on traditional core enforcement areas, such as insider trading, accounting and disclosure fraud, market manipulation, and breaches of...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

Fisher Phillips

North Korean Scammers are Posing as IT Freelancers: Here’s How You Can Protect Your Business

Fisher Phillips on

Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more

Farella Braun + Martel LLP

Employers Must Be Vigilant to Protect Against Security Risks from Fraudulent Hires

The FBI is warning employers about increasing security risks from fraudulent job applications, resulting in hackers infiltrating companies and gaining access to sensitive data. To protect against these risks, employers should...more

Eversheds Sutherland (US) LLP

Preparing for Regulation S-P and takeaways from the SEC’s session at the Incident Response Forum Masterclass 2025

On April 22, 2025, Laura D’Allaird, Chief of the SEC’s Cyber and Emerging Technologies Unit (CETU), participated in the Incident Response Forum Masterclass 2025 (Incident Response Masterclass). In the session, titled “SEC...more

Morrison & Foerster LLP

Key Takeaways from the National Association of Attorneys General 2025 General Symposium

Beginning on April 7, 2025, the National Association of Attorneys General (NAAG) held its three-day Symposium in Nashville, Tennessee. Throughout the forum, attorneys general, their senior staff, federal officials, and other...more

JAMS

[PODCAST] When Scammers Strike: How Mediation Can Help Resolve Consumer Fraud Claims

JAMS on

In this podcast, JAMS neutrals Peter Kamminga, Esq., Ph.D., and Jeffrey Grubman, Esq., discuss the rise in financial scams targeting consumers and the various ways in which those scams typically take shape, including...more

Hogan Lovells

North Korea-linked threat actors utilize falsified companies and job interviews to distribute malware

Hogan Lovells on

A threat actor group with ties to the Democratic People’s Republic of Korea (“North Korea”) called Contagious Interview is using front companies to spread malware through fake job interviews. This group has a history of...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #441 – Identity Theft Statistics Increasing in 2025

Unfortunately, identity theft continues to increase, and according to Identitytheft.org, the statistics are going to get worse in 2025. Some of the statistics cited by Identitytheft.org include: 1.4 million complaints of...more

379 Results
 / 
View per page
Page: of 16

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide