News & Analysis as of

Hackers Passwords

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Miller Nash LLP

Data Privacy Week Series: Review Password Hygiene

Miller Nash LLP on

In honor of Data Privacy Week, each day this week Miller Nash is releasing one of our top five recommendations for where businesses should focus their privacy compliance efforts in 2024. If you need assistance reviewing your...more

Jackson Lewis P.C.

Cybersecurity Awareness Month Series: Cybersecurity is Important for Small Business Too.

Jackson Lewis P.C. on

Small businesses may be discouraged from investing in preventive cybersecurity measures due to the expense involved and the mistaken belief that only larger companies are the target of cybercrimes. But that is not the case....more

Kohrman Jackson & Krantz LLP

Sextortion, Deepfakes, and AI Scams: How to Protect Children from Cyberattacks

Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more

Ankura

Emerging Middle Market Cyber-Attack Vectors: Are You at Risk?

Ankura on

The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more

Vinson & Elkins LLP

Here Comes the Fashion (Cybersecurity) Police: New York Attorney General Imposes Penalty for Mishandling of Consumer Data Breach

Vinson & Elkins LLP on

On October 12, 2022, New York Attorney General Letitia James fined Zoetop Business Company, Ltd. (“Zoetop”), the owner of fast-fashion brands SHEIN and ROMWE, $1.9 million for mishandling a 2018 data breach and lying to the...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2022

Robinson & Cole LLP on

CYBERSECURITY - Password Manager LastPass Admits to Hack - Password manager LastPass, reportedly used by more than 33 million users, recently announced that it was hacked, and although it reports that no passwords of...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #343 – The Pros and Cons of Password Managers

With the recent announcement by LastPass that it was hacked, and source code was compromised (LastPass is reporting that no passwords were compromised), I thought it timely to remind readers about the pros and cons of using a...more

Robinson+Cole Data Privacy + Security Insider

Password Manager LastPass Admits to Hack

Password manager LastPass, reportedly used by more than 33 million users, recently announced that it was hacked, and although it reports that no passwords of users were compromised in the incident, unfortunately, its source...more

Porter Hedges LLP

Cybersecurity Best Practices: Disclosure Requirements for Risk Management, Strategy, and Governance

Porter Hedges LLP on

In previous posts on the Porter Hedges Anti-Corruption & Compliance Blog, our team has discussed the U.S. Securities and Exchange Commission’s (“SEC”) proposal to amend its rules and require disclosures related to...more

Carlton Fields

No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs

Carlton Fields on

Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2022

Robinson & Cole LLP on

CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #315 – Redline Malware Used to Steal Saved Credentials

Passwords are so difficult to remember. We all know we shouldn’t use the same or similar passwords across platforms. Stolen password credentials are dumped on the dark web and criminals use the stolen passwords to steal other...more

Rivkin Radler LLP

NY AG: All Businesses Should Take ‘Credential Stuffing’ Attacks Seriously

Rivkin Radler LLP on

Credential stuffing has quickly become one of the top attack vectors online, according to the Office of New York State Attorney General Letitia James (OAG). On January 6, 2022, the OAG announced the result of a sweeping...more

Levenfeld Pearlstein, LLC

FBI Warns of Heightened Ransomware and Cybersecurity Risks During M&A Transactions and Over the Holidays

Federal agencies are warning businesses and consumers of heightened ransomware risks. On November 1, 2021, the FBI issued a Private Industry Notification, warning businesses that ransomware actors are using significant...more

Amundsen Davis LLC

Employers’ Rights Under the Computer Fraud and Abuse Act (CFAA) Narrowed after Supreme Court Decision in Van Buren

Amundsen Davis LLC on

In today’s digital age, employers store immense amounts of information, including confidential and proprietary information, on their on-premises systems, cloud-servers and other data storage solutions. With this collection of...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2021 #2

Robinson & Cole LLP on

CYBERSECURITY - Apple + Microsoft Release Patches for Identified Vulnerabilities - This week, both Apple and Microsoft issued patches to fix serious zeroday vulnerabilities that should be applied as soon as possible. That...more

Robinson+Cole Data Privacy + Security Insider

Passwords Used by Iranian-Backed Hackers Against Defense Contractors

When you are educating your employees about the importance of maintaining a complex password or passphrase, share this story to show why it is so important and to emphasize not to use same or similar passphrases across...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2021 #3

Robinson & Cole LLP on

CYBERSECURITY - FBI, CISA + NSA Issue Conti Ransomware Advisory - On September 22, 2021, the Federal Bureau of Investigations (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security...more

PilieroMazza PLLC

Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small...

PilieroMazza PLLC on

With almost daily news of top firms impacted by data breaches or ransomware attacks, there is no doubt that effective cybersecurity and data privacy are essential to any business. And small businesses are not immune....more

Carlton Fields

Credential Stuffing: Where Passwords Go When They Are Stolen and Some Strategies for Defense and Incident Response

Carlton Fields on

Credential stuffing is a growing cyberattack method in which cybercriminals use a set of thousands of compromised user credentials, stolen from one company, to attempt a breach into another company’s secured system. It is...more

PilieroMazza PLLC

[Webinar] Cybersecurity & Data Privacy Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small...

PilieroMazza PLLC on

With almost daily news of top firms impacted by data breaches or ransomware attacks, there is no doubt that effective cybersecurity and data privacy are essential to any business. And small businesses are not immune....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #287 – Double Down on Passwords

It has been reported by Bloomberg Law that the Colonial Pipeline ransomware attack was caused by a “single compromised password.” The Colonial Pipeline ransomware attack had consumers hoarding gasoline and disrupted...more

Bradley Arant Boult Cummings LLP

Why It Matters Whether Hashed Passwords Are Personal Information Under U.S. Law

On January 22, 2021, Bleeping Computer reported about yet another data dump by the hacker group Shiny Hunters, this time for a clothing retailer. Shiny Hunters is known for exfiltrating large databases of customer...more

Association of Certified E-Discovery...

Defining Doxing And Learning How to Avoid It

From August 2015 to August 2017, a man named Rodney Phipps was sentenced to prison for making fake phone calls to emergency services—calls that would end up sending SWAT and police to strangers’ residences in practice known...more

108 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide