News & Analysis as of

Malware

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #467 – Employee Access of Malicious Website Causes Nevada Breach

Nevada suffered a ransomware attack in August 2025 that caused a significant disruption in services. The attackers deleted the state’s backups, encrypted virtual machines, and deployed ransomware that affected 60 state...more

Freeman Mathis & Gary

AI-powered cyber threats: What everyone needs to know

Freeman Mathis & Gary on

A new report from Anthropic, a leading Artificial Intelligence (AI) company, highlights a troubling development in the cybersecurity landscape: threat actors are now using AI to automate nearly every step of a cyber extortion...more

Lowenstein Sandler LLP

On-Premises Oracle EBS Systems at Risk Due to CL0P Exploit

Lowenstein Sandler LLP on

A recent campaign by the CL0P ransomware group has targeted on-premises, customer-managed Oracle E-Business Suite (EBS) systems, resulting in the potential for widespread data exfiltration and extortion attempts. The...more

Baker Donelson

Cybersecurity Awareness Month 2025: Seven Foundational Pillars of Good Personal Cyber Hygiene

Baker Donelson on

Deepfakes, social engineering, and urgent texts or calls from your IT department all continue to be effective methods hackers use to gain access to your most important accounts and assets. October is Cybersecurity Awareness...more

HaystackID

BRICKSTORM: China-Linked Hackers Lurk Undetected in Law Firm Infrastructure for Over a Year

HaystackID on

Law firms across America are discovering a disturbing truth: while they protected their primary computers and networks with the latest cybersecurity tools, sophisticated Chinese hackers have been quietly stealing their most...more

Lowenstein Sandler LLP

BRICKSTORM Malware Campaign: What You Need To Know

Lowenstein Sandler LLP on

What’s Happening: Recent investigations by leading threat intelligence and incident response teams have identified a sophisticated and persistent cyber campaign leveraging the BRICKSTORM malware, attributed to UNC5221 and...more

Robinson+Cole Data Privacy + Security Insider

Legal Services Industry Targeted by BRICKSTORM

The Mandiant and Google Threat Intelligence Group has been responding to and monitoring malware dubbed BRICKSTORM targeting “a range of industry verticals, most notably legal services, Software as a Service (SaaS) providers,...more

Troutman Pepper Locke

Peabody Settlement Reaffirms Massachusetts AG’s Commitment to Protecting Consumer Personal Information

Troutman Pepper Locke on

Regulators will ensure corporate accountability by imposing stringent sanctions on businesses that are perceived as neglecting the protection of consumer personal information. ...more

BakerHostetler

Weekly Blockchain Blog - September 2025 #2

BakerHostetler on

Fintech and Digital Asset Companies Announce New Blockchains, Payment Networks - According to a recent press release, a crypto investment firm and a major U.S. payments and fintech company have jointly developed a...more

Ankura

The Silent Epidemic: Infostealers and the Evolution of Cybercrime in 2025

Ankura on

"Infostealers" have transformed from niche threats into the backbone of modern cybercrime, fueling a $4.88 million average breach cost in 2024. In this article we synthesize the latest threat intelligence to expose critical...more

Hogan Lovells

Domain Name News: July/August 2025

Hogan Lovells on

This is the July/August 2025 edition of Anchovy News. Here you will find articles concerning ICANN, the domain name industry and the recuperation of domain names across the globe. In this issue we cover: Domain name industry...more

Robinson+Cole Data Privacy + Security Insider

CISA Releases Malware Analysis Report for Microsoft SharePoint Vulnerabilities

Threat actors continue to exploit ToolShell to gain unauthorized access to on-premises SharePoint servers. On August 6, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a malware analysis report...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #452 – Temu + TikTok—Assess Risk Before Downloading

We have repeatedly warned our readers about the risks associated with TikTok. We are reminding our readers that the popular Temu app raises the same concerns....more

Cozen O'Connor

The State AG Report – 06.26.2025

Cozen O'Connor on

Here are curated AG and federal regulatory news stories highlighting key areas in which state and federal regulators’ decisions are having an impact across the US: • All AGs Settle with Purdue Pharma over Opioid-Related...more

Cozen O'Connor

No Buyer’s Remorse for Nebraska AG Over Temu Data Use Lawsuit

Cozen O'Connor on

Nebraska AG Mike Hilgers sued PDD Holdings Inc. and WhaleCo Inc., d/b/a Temu, alleging that Temu’s shopping app operates as malware designed to gain unauthorized access to users’ data in violation of state consumer protection...more

StoneTurn

Assessing the Iranian Cyber Arsenal: Post “12 Day War” Threat to Your Company

StoneTurn on

As tensions flare in the Middle East, speculation is growing over the potential impacts of Iranian cyberattacks targeting US based companies and infrastructure. We saw similar reactions in 2020 following the death of the head...more

Hogan Lovells

Threat actors increasingly introducing malicious code into open source packages

Hogan Lovells on

The risks associated with leveraging open source libraries, and the review needed, are increasing. In the first half of 2025, cybersecurity researchers observed a sharp rise in the incidence of malicious code embedded in...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #443 – Fake AI Tools Used to Install Noodlophile

Threat actors are leveraging the publicity around AI tools to trick users into downloading the malware known as Noodlophile through social media sites. Researchers from Morphisec have observed threat actors, believed to...more

Hogan Lovells

North Korea-linked threat actors utilize falsified companies and job interviews to distribute malware

Hogan Lovells on

A threat actor group with ties to the Democratic People’s Republic of Korea (“North Korea”) called Contagious Interview is using front companies to spread malware through fake job interviews. This group has a history of...more

BakerHostetler

Weekly Blockchain Blog - April 2025 #4

BakerHostetler on

Companies Announce Digital Asset Payment Networks - The issuer of the USDC stablecoin recently published a white paper outlining its plans to launch “CPN,” a new payments network that aims to “bring[] financial institutions...more

BakerHostetler

Weekly Blockchain Blog - April 2025 #3

BakerHostetler on

U.S. Digital Asset Companies Announce New Product Launches - A major U.S. cryptocurrency exchange recently announced that certain customers can now trade “over 11,000 U.S.-listed stocks and ETFs, bringing equities and...more

Goldberg Segalla

Tax Season = Phishing Season

Goldberg Segalla on

Most professionals are aware of the April 15 tax deadline. We know that fraudsters certainly are! As Tax Day approaches in the U.S., we encourage all to be mindful of several phishing campaigns that Microsoft has observed...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Malware Analysis Report on RESURGE Malware

On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure....more

BakerHostetler

Weekly Blockchain Blog - March 2025 #4

BakerHostetler on

Digital Asset Companies Announce Strategic Acquisitions - According to a recent press release, a major U.S. cryptocurrency exchange has entered into an agreement to acquire NinjaTrader, a U.S. retail futures trading...more

Robinson+Cole Data Privacy + Security Insider

Joint Alert Warns of Medusa Ransomware

On March 12, 2025, a joint cybersecurity advisory was issued by the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the Multi-State Information Sharing and Analysis Center to advise...more

776 Results
 / 
View per page
Page: of 32

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide