The UK Financial Conduct Authority (FCA) has published its annual overview of insights from the Cyber Coordination Groups (CCG). Firms face an increasing threat of cyber attacks, particularly since the Covid-19 pandemic and...more
Killnet, a Russian-speaking hacking group that emerged shortly after Russia invaded Ukraine, took responsibility last week for deploying a denial-of-service attack that temporarily took several U.S. states’ websites offline....more
Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more
The televised “thud” of explosions in Ukraine has an ominous but deceptively distant tone. For many organizations the hostilities are closer at hand, in the form of cyberattacks that could spread beyond the Russian-Ukrainian...more
Russia began a physical invasion of Ukraine Wednesday night, and as the United States responded with sanctions, the threat of cyberattacks against American companies became more acute. Major American businesses – from banks...more
On July 19, 2021, the Federal Bureau of Investigations issued a Private Industry Notification to service providers and “entities associated with the Tokyo 2020 Summer Olympics that cyber actors who wish to disrupt the event...more
Recent industry feedback published by the UK Financial Conduct Authority shares insights on the identification and management of cybersecurity challenges and mitigation strategies for financial services firms. The feedback...more
The past decade has seen a huge increase in the incidents of cyber crime in Hong Kong. This has been exacerbated by the global pandemic, which has forced criminals online, with the number of cases in 2020 representing a 55%...more
Targeted hacks, phishing, malware, viruses and other attacks aimed at information technology systems are an everyday occurrence. While the first line of defense is trained personnel, businesses need to be aware of the...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
Take a journey around the world as our Cybersecurity & Preparedness Response Team reviews how the United States responded to state-sponsored cyberattacks and offers 10 lessons the private sector can use to strengthen their...more
This past September, California became the first state to take a first (small) step in addressing Internet of Things (IoT) security. IoT devices include home security cameras, home temperature controllers, and a myriad of...more
On September 28, Governor Jerry Brown approved California Senate Bill 327, making California the first state in the country to regulate the security of Internet of Things (IoT) devices. ...more
In United States v. Gasperini, the Court (Cabranes, Lynch, Carney) resolved various challenges by Fabio Gasperini, an Italian citizen, to his conviction under the Computer Fraud and Abuse Act of 1986 (“CFAA”). ...more
It is commonly said that cyberspace is the “Wild West,” a realm where there are no laws and no sheriff in sight. Even acknowledging that this view contains a degree of hyperbole, it is unfortunately no less true after last...more
The recent ransomware attack on the City of Atlanta highlights the fact that the threat of ransomware affects all organizations, regardless of the nature of their industry, business, or operations, and that political...more
The end of net neutrality — for now — is big news, because it’s a big deal; there’s just no getting around the fact that the way consumers experience the internet is going to change. What are some of the practical...more
Industry publication Data Breach Today reports hackers are increasingly exploiting weak Remote Desktop Protocol (RDP) credentials to launch ransomware attacks. “Many enterprises use remote desktop protocol to remotely...more
Baker Donelson's Data Protection, Privacy and Cybersecurity attorneys are pleased to continue a series of client alerts that address significant cyber-threats to your business and discuss ways you can protect your business...more
Two actions in the past few weeks reflect the continuing government involvement in and concern over the security of Internet of Things (IoT) devices. Attacks using connected devices have highlighted security vulnerabilities...more
The recent distributed denial of service (“DDOS”) attack on domain name service provider Dyn is likely to result in greater scrutiny by regulators and lawmakers of the potential risks associated with the increasing use of the...more
On November 16, 2016 the House Committee on Energy and Commerce’s Subcommittee on Commerce, Manufacturing, and Trade and the Subcommittee on Communications and Technology held a hearing on “Understanding the Role of Connected...more
Baker Donelson's Data Protection, Privacy and Cybersecurity attorneys are pleased to introduce a series of client alerts that will address significant cyber-threats to your business and how you can protect yourself by...more
On Oct. 21, 2016, an extremely large distributed denial-of-service (DDoS) attack on Dyn prevented many internet users on the East Coast of the U.S. from accessing websites such as Netflix, PayPal, Spotify and Twitter for...more
The recent massive distributed denial of service (DDoS) attack that caused major internet outages was led by an army of security cameras, digital video recorders, and other Internet of Things ("IoT") devices that had been...more