News & Analysis as of

Information Technology Data Protection Malware

Wiley Rein LLP

Continued Remote Hiring Concerns in IT Sector: What to Look for in 2025 and How to Mitigate Business Risk

Wiley Rein LLP on

Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more

Polsinelli

Mitigating Your Greatest Data Privacy Risk

Polsinelli on

Third-party vendors pose a significant risk - The greatest data privacy threat to companies is commonly thought to be that company’s employees. While employees can be a threat, the majority of data breaches and ...more

Burr & Forman

FINRA Warns Against Russian-Sponsored Cyber Attacks

Burr & Forman on

In its April 27 Weekly Update, the Financial Industry Regulatory Authority’s (“FINRA”) National Cause and Financial Crimes Detection program urged FINRA member firms to review a cyber-threat alert arising from Russia’s...more

NAVEX

Watch Out for Hoax Reports to Your Hotline

NAVEX on

Recent compliance-related news coverage has identified an increase in anonymous hoax emails and online reports posted to companies through their internal reporting systems. Whether filed via email or through an online...more

Lighthouse

Cybersecurity Defense: Recommendations for Companies Impacted by the Biden Administration Executive Order

Lighthouse on

As summarized in the first installment of our two-part blog series, President Biden recently issued a sweeping Executive Order aimed at improving the nation’s cybersecurity defense. The Order is a reaction to increased...more

Robinson+Cole Data Privacy + Security Insider

Phishing, Vishing, and Smishing—Your Employees Need to Know the Newest Schemes

New dictionary words have been formed to describe online scams. Phishing, one that everyone knows by now, is when a scammer uses a pretext in an email to get someone to click on a link or attachment in the email to deploy...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Patch Tuesday Includes Six Zero Day-Related Vulnerabilities

IT professionals leave room in their schedules for Microsoft’s monthly Patch Tuesday just as I leave room in my schedule every Wednesday night for blog writing. ...more

Robinson+Cole Data Privacy + Security Insider

Cisco/Talos Researchers Find Attackers Using Slack and Discord to Distribute Malware

Another example of the resiliency and creativity of cyber-attackers is outlined in a new blog by Cisco/Talos researchers, which outlines how, over the past year, and in particular as a result of the migration from work at the...more

Robinson+Cole Data Privacy + Security Insider

DSH Warns of North Korean Advanced Persistent Threat Group Kimsuky Tactics

The Department of Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) this week issued Alert (AA20-301A) titled North Korean Advanced Persistent Threat Focus: Kimsuky warning U.S. businesses, and...more

Polsinelli

Imminent Ransomware Attack Detected

Polsinelli on

The CISA, FBI and HHS have issued an alert (https://us-cert.cisa.gov/ncas/alerts/aa20-302a) regarding an imminent threat to hospitals and health care providers. Federal agencies have credible information to suggest that a...more

Seyfarth Shaw LLP

COVID-19 Remote Workforce Risks – Preservation, Compliance, Privacy, and Data Security Risks

Seyfarth Shaw LLP on

In response to the COVID-19 crisis, nearly all companies and organizations were abruptly forced to transition portions of, and in many cases, their entire workforce to remote work. ...more

Seyfarth Shaw LLP

The Impact of COVID-19 on Cybersecurity

Seyfarth Shaw LLP on

Seyfarth Synopsis: As individuals and businesses continue to focus on the rising number of confirmed Coronavirus cases throughout the world and what steps they can take to guard against infection, malicious actors are...more

Fox Rothschild LLP

CISA Makes Major Changes To Its Essential Infrastructure Workforce Guidance

Fox Rothschild LLP on

Several states that have issued shelter-in-place orders or required nonessential businesses to close to slow the spread of COVID-19, reference or rely upon the Department of Homeland Security's Cybersecurity & Infrastructure...more

McAfee & Taft

Yes, even your IT systems are susceptible to COVID-19

McAfee & Taft on

Current events have often been used for malicious IT attacks, and COVID-19 is unfortunately no different. With the recent uptick in coronavirus cases has come an uptick in email spam, ransomware, malicious domains, and other...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #221 – How Do We Personally Prepare for a Cyber-Attack on Critical Infrastructure?

Pretty much the only time I don’t feel like I am Chicken Little predicting a massive cyber-attack is when I am with my colleagues at the FBI, Secret Service, NSA and my students in the Brown Executive Masters of Cybersecurity...more

Robinson+Cole Data Privacy + Security Insider

FIN8 Back in Business Stealing Credit Card Information with Badhatch

Security research firm Gigamon has reported that the nasty cybercriminal group FIN8 may have reappeared in June after a two year silence. FIN8 is known for implementing malware on point of sale systems to steal credit card...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - June 2019

Robinson & Cole LLP on

Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #143 - North Korea/U.S. Summit Gift Bags Remind us of Dangers of USB Devices

The Singapore summit was the focus of news stories this week. The media descended on Singapore to capture all of the news. When journalists started posting pictures of the contents of the gift bags that they were given at the...more

Fisher Phillips

What Employers Need to Know About the Dark Web

Fisher Phillips on

The average internet user may be largely unaware that there are actually different “levels” of the internet. First, there is the surface level of the internet where companies post their webpages, and where employees may...more

Bradley Arant Boult Cummings LLP

Understanding cyber insurance risks of target companies

Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more

Robinson+Cole Data Privacy + Security Insider

Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS

The FBI and Department of Homeland Security issued a joint statement on October 20 warning of an increased danger of a malicious “multi-stage intrusion campaign” to critical infrastructure industries, including the energy...more

21 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide