News & Analysis as of

Cybersecurity Malware

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Goldberg Segalla

Tax Season = Phishing Season

Goldberg Segalla on

Most professionals are aware of the April 15 tax deadline. We know that fraudsters certainly are! As Tax Day approaches in the U.S., we encourage all to be mindful of several phishing campaigns that Microsoft has observed...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Malware Analysis Report on RESURGE Malware

On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure....more

BakerHostetler

Weekly Blockchain Blog - March 2025 #4

BakerHostetler on

Digital Asset Companies Announce Strategic Acquisitions - According to a recent press release, a major U.S. cryptocurrency exchange has entered into an agreement to acquire NinjaTrader, a U.S. retail futures trading...more

Robinson+Cole Data Privacy + Security Insider

Joint Alert Warns of Medusa Ransomware

On March 12, 2025, a joint cybersecurity advisory was issued by the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the Multi-State Information Sharing and Analysis Center to advise...more

BakerHostetler

Weekly Blockchain Blog - February 2025 #4

BakerHostetler on

U.S. Digital Asset Companies Continue Product Launches, Market Expansion - U.S. nonfungible token (NFT) marketplace OpenSea recently announced the launch of its new OS2 digital asset trading platform, which expands into...more

Alston & Bird

Ghost (Cring) Ransomware: Understanding The Threat & How Enterprises Can Defend Themselves

Alston & Bird on

On February 19, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), issued...more

Robinson+Cole Data Privacy + Security Insider

Nation State Backed Groups Using AI for Malicious Purposes

The Google Threat Intelligence Group (GTIG) recently published a new report “Adversarial Misuse of Generative AI,” which is well worth the read. The report shares findings on how government-backed threat actors use and misuse...more

Wiley Rein LLP

Continued Remote Hiring Concerns in IT Sector: What to Look for in 2025 and How to Mitigate Business Risk

Wiley Rein LLP on

Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more

Jackson Lewis P.C.

OCR Proposed Tighter Security Rules for HIPAA Regulated Entities, including Business Associates and Group Health Plans

Jackson Lewis P.C. on

As the healthcare sector continues to be a top target for cyber criminals, the Office for Civil Rights (OCR) issued proposed updates to the HIPAA Security Rule (scheduled to be published in the Federal Register January 6). It...more

HaystackID

International Cyber Defense Coalition Reports Significant Progress in Protecting Ukrainian Digital Infrastructure

HaystackID on

December 2024 marks a pivotal milestone in international cybersecurity cooperation as the Tallinn Mechanism concludes its first year of operations, having mobilized over $210 million in targeted assistance for Ukraine’s...more

Ankura

North Korean “Laptop Farm” IT Worker Scam Targets Multiple High-Profile Companies

Ankura on

Major U.S. companies targeted by North Korean threat actors disguised as remote IT workers. Multiple individuals responsible for stealing millions of dollars have already been apprehended by U.S. authorities....more

K2 Integrity

Don’t Let Cyber Scams Ruin the Holidays: Keep the Holiday Season Festive for Your Organization

K2 Integrity on

“It’s the most wonderful time of the year”—or is it? Unfortunately, it can be the most wonderful time for criminals, who try to prey on financial generosity through scams and frauds. Extra vigilance is needed during the...more

McDermott Will & Emery

SEC Settlements Signal Increased Scrutiny of Cybersecurity Disclosures

McDermott Will & Emery on

On October 22, 2024, the US Securities and Exchange Commission (SEC, or Commission) brought settled actions against four publicly traded companies that were downstream victims of the Russia-linked cyberattack on SolarWinds...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Business Email Compromise Scams: What They Are, and How to Avoid Them

In an increasingly digital world, the rise in cybercrime involving email scams has become a significant threat to individuals and organizations alike. These sophisticated attacks exploit human psychology and technological...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

New York State Department of Financial Services Releases Guidance on Combating Cybersecurity Risks Associated With AI

On October 16, 2024, the New York State Department of Financial Services (NYDFS) released guidance highlighting the cybersecurity risks associated with artificial intelligence (AI) and how covered entities regulated by NYDFS...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Foley & Lardner LLP

Cybersecurity in the Age of Industry 4.0 - Part 1

Foley & Lardner LLP on

As the manufacturing sector continues to embrace the hyper-connected era of Smart Manufacturing, known as Industry 4.0, more and more organizations are integrating advanced automation, artificial intelligence (AI), the...more

Health Care Compliance Association (HCCA)

Seven Years After Worldwide NotPetya Attacks, OCR Singles Out PA System, Collects Nearly $1M

Unleashed on June 27, 2017, NotPetya caused an estimated $10 billion in damages globally, among the costliest ransomware attacks in history. In 2018, the Trump administration—in tandem with the British government—blamed...more

Latham & Watkins LLP

Recent Developments for Directors - August 2024

Latham & Watkins LLP on

Last month, the SEC announced another enforcement action emphasizing the need for early disclosure of cybersecurity events. In the recent action, the company had taken three weeks to act on internal alerts of malware on its...more

Baker Botts L.L.P.

'Ransom Cartel' Leader Indicted: A Reminder of Cybercrime’s Growing Reach

Baker Botts L.L.P. on

The recent indictment of Maksim Silnikau, a Belarusian and Ukrainian national, is a clear reminder that cybercriminals are becoming more sophisticated and bold....more

Robinson+Cole Data Privacy + Security Insider

SharpRhino Malware Targeting IT Professionals

Information technology professionals—beware of SharpRhino—a malware variant attributed to threat actor cybercriminals associated with Hunters International. It is being reported that Hunters International is the “10th most...more

Fisher Phillips

If a Cybersecurity Firm Can Fall For the Latest AI Workplace Scam, So Can You: 10 Steps to Protect Your Business

Fisher Phillips on

A prominent cybersecurity training company just fell victim to an increasingly common scam when it hired a remote worker who turned out to be a North Korean cybercriminal that used AI deepfake tools to fake his identity and...more

Woodruff Sawyer

2024 Guide to Cyber Liability Insurance

Woodruff Sawyer on

Twenty-one percent (21%) of S&P 500 companies experienced breaches in 2023, according to a report by SecurityScorecard. IBM states the average cost of a data breach globally last year was $4.45 million—a 15% increase over the...more

Hogan Lovells

FBI obtains 7,000 LockBit decryption keys providing some victims relief

Hogan Lovells on

Victims of LockBit ransomware attacks can reach out to the FBI for decryption keys and all companies can prepare against ransomware attacks. The FBI secured 7,000 LockBit decryption keys, providing victims of LockBit...more

Ankura

Proactive Defense: A Step-by-Step Guide To Assessing Your Organization's Cyber Risk

Ankura on

In the continuously evolving landscape of cyber threats, organizations must be proactive in identifying and mitigating potential risks to their digital assets and operations. A critical step in building cyber resilience is...more

524 Results
 / 
View per page
Page: of 21

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide