News & Analysis as of

Hackers Data Breach National Security

Awatif Mohammad Shoqi Advocates & Legal...

Legal Consequences Under the UAE's Cybercrimes Law.

A nation's reputation is crucial, and the UAE has implemented strong legislation to address these issues under the Federal Law No. (34) of 2021 (cybercrimes law). These laws specifically target online activities concerning...more

Alston & Bird

Chinese Hackers Exploit Gap in Cloud Environment Used by U.S. Government

Alston & Bird on

According to recent reports issued by Microsoft and U.S. government agencies, hackers recently exploited a gap in Microsoft’s cloud environment, enabling the malicious actors to access the email accounts of employees at the...more

Robinson+Cole Data Privacy + Security Insider

Chinese State Hackers Exploit Zero-Day Vulnerabilities in Citrix Networking Equipment

According to the National Security Agency, actors backed by the Chinese government are actively targeting a zero-day vulnerability in two commonly-used Citrix networking devices. The exploit (CVE-2022-27518) affects Citrix...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2022 #2

Robinson & Cole LLP on

CYBERSECURITY - Cloaked Ursa Using Trusted Online Storage Services to Evade Detection - According to research by Palo Alto’s Unit 42, the most recent campaign by advanced persistent threat Cloaked Ursa (aka APT 20,...more

Stinson - Government Contracting Matters

Department of Homeland Security Issues “SHIELDS UP” Advisory for All Organizations Regardless of Size

This week the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Agency (CISA) issued a “SHIELDS UP” advisory.  While it does not identify specific threats in the advisory, CISA states that the “Russian...more

Health Care Compliance Association (HCCA)

FBI: More Awareness, Due Diligence Needed To Fight China in New ‘Space Race’ for Data

Report on Patient Privacy 21, no. 10 (October, 2021) - Conducting a risk analysis is a basic tenet of security compliance, with the overarching goal of understanding where protected health information (PHI) “lives” in an...more

Robinson+Cole Data Privacy + Security Insider

Passwords Used by Iranian-Backed Hackers Against Defense Contractors

When you are educating your employees about the importance of maintaining a complex password or passphrase, share this story to show why it is so important and to emphasize not to use same or similar passphrases across...more

Health Care Compliance Association (HCCA)

To Combat Cyber Crime, White House Initiative Promises Tools; Some Seek Funding, New Laws

Report on Patient Privacy 21 no. 9 (September, 2021) - As ransomware attacks become epidemic and breaches get larger, the Biden administration is partnering with private industry to bolster security and education in an...more

Bilzin Sumberg

Do the 2021 Federal Ransomware Laws Foretell Passage of Federal Data Privacy Laws?

Bilzin Sumberg on

In the last several weeks, the Executive and Legislative branches of the United States federal government have taken bipartisan measures to defend the country’s infrastructure from the critical national security threat posed...more

Holland & Hart LLP

Post-Ransomware Attack: Is it Time to Return to True Systems Segmentation?

Holland & Hart LLP on

In the end, food companies must balance the process efficiencies and controls that data transmission and functionality over the internet provide with the risk of cyberattacks that cripple production. A sizeable chunk of...more

Lighthouse

Cybersecurity Defense: Biden Administration Executive Order a Great Start Towards a More Robust National Framework

Lighthouse on

On May 12, President Biden issued a landmark Executive Order (“the Order”) aimed at improving the country’s cybersecurity threat defense. This Order is an attempt to create a “whole of government” response to increasingly...more

Faegre Drinker Biddle & Reath LLP

Federal Legislation Considers Banning Ransom Payments to Hackers

The year 2021 continues to reveal an alarming rise in ransomware attacks. Two of the most notable of such attacks include the ransomware attack on CNA Financial Corp., with resulting payment of $40 million in ransom, and the...more

PilieroMazza PLLC

8 Key Takeaways from Executive Order on Improving the Nation’s Cybersecurity for Government Contractors

PilieroMazza PLLC on

On May 12, 2021, the Biden administration released a far-reaching executive order intended to improve the U.S. government’s cybersecurity posture, both internally and in any private information technology (IT) systems that...more

Nelson Mullins Riley & Scarborough LLP

Presidential Transition and Cybersecurity Following the 2020 Data Breach

Key Takeaways: The Trump Administration has remained relatively silent about the 2020 data breach (believed to be connected to Russian state actors). It is unclear at this point whether the Trump Administration will take any...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 6, September 2020

TikTok Will Partner with Oracle in the United States After Microsoft Loses Bid - "TikTok and Oracle will become business partners in the United States — a deal meant to satisfy the Trump administration's national security...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 4, August 2020

Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more

Womble Bond Dickinson

Thieves Breach Twitter Security to Commandeer Famous Accounts

Womble Bond Dickinson on

The Twitter accounts of major companies and individuals were briefly taken over as part of a bitcoin scam. Former and current heads of states, global corporations, and presidential candidates had their twitter accounts...more

Morgan Lewis

Cyberattack Forces Gas Pipeline Shutdown

Morgan Lewis on

A cyberattack on a single gas compression facility resulted in the shutdown of a natural gas pipeline for two days, according to a recent alert from the US Department of Homeland Security’s Cybersecurity and Infrastructure...more

Foley Hoag LLP - Security, Privacy and the...

US Security Officials Warning of Cyber Attacks in Wake of Iran Strike

On January 4, 2020, the US Department of Homeland Security posted at National Terrorism Advisory System Bulletin, in the wake of the killing of a senior Iranian military leader by a US drone. That DHS advisory states: The...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2018 #4

Robinson & Cole LLP on

A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more

Womble Bond Dickinson

What Companies Can Learn from the DNC Hack

Womble Bond Dickinson on

In summer 2015, the spies of a foreign country gained access to a private company’s domain name – pick any company you like, or several, since we don’t know which ones or how many. And within those domains, they created false...more

Jones Day

Global Privacy & Cybersecurity Update Vol. 16

Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - United States and China Renew Promise Not to Hack - On October 4, U.S. and Chinese officials agreed to not engage in targeted hacking. Per a...more

Robinson+Cole Data Privacy + Security Insider

Cybersecurity + Law Enforcement: The Cutting Edge Symposium | Friday, October 16, 2015 RWU Law Bristol, RI

Cybersecurity, encryption, and government surveillance are daily challenges for public officials, corporations, and lawyers. On October 16, the Roger Williams University School of Law will present Cybersecurity and Law...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide