News & Analysis as of

Multi-Factor Authentication Incident Response Plans

Goodwin

Beyond the Perimeter: Securing OAuth Tokens and API Access to Thwart Modern Cyber Attackers

Goodwin on

OAuth tokens streamline access but create new vulnerabilities that threat actors are exploiting. Learn how to secure token infrastructure through robust monitoring, governance, and vendor management....more

K2 Integrity

Cybersecurity Awareness Month: Identifying And Avoiding Phishing Attacks

K2 Integrity on

Cybersecurity Awareness Month was established to provide resources to organizations and their employees to help them stay safer and more secure online. It is an opportunity to focus on four key behaviors: creating strong...more

Lowenstein Sandler LLP

On-Premises Oracle EBS Systems at Risk Due to CL0P Exploit

Lowenstein Sandler LLP on

A recent campaign by the CL0P ransomware group has targeted on-premises, customer-managed Oracle E-Business Suite (EBS) systems, resulting in the potential for widespread data exfiltration and extortion attempts. The...more

Shumaker, Loop & Kendrick, LLP

Cybersecurity Tips for Businesses

Why It Matters Reputation at Risk: - Customers lose trust quickly after a breach. - Legal & Financial Consequences: Fines, lawsuits, and regulatory penalties add up fast. - Operational Disruption: Downtime and...more

Gray Reed

Impacts of Cyber Threat Landscape on Insurers and Policyholders

Gray Reed on

As cyber threats continue to evolve and increase, insurers are responding by imposing stricter requirements on policyholders to obtain and maintain coverage. This shifts how businesses should implement, manage, and oversee IT...more

Clark Hill PLC

October is Cybersecurity Awareness Month - It’s a good time to update your training program

Clark Hill PLC on

This month is the 22nd annual Cybersecurity Awareness Month, cosponsored by the Cybersecurity and Infrastructure Agency (CISA) and the National Cybersecurity Alliance. CISA’s theme this year is “Building a Cyber Strong...more

EDRM - Electronic Discovery Reference Model

Inside the Salesloft Drift Breach: Critical Lessons for SaaS Security and Governance

ComplexDiscovery Editor’s Note: The Salesloft Drift breach, which affected over 700 organizations between August 8–18, 2025, marks a defining moment in the evolution of SaaS-related supply chain attacks. With attackers...more

Shook, Hardy & Bacon L.L.P.

Ransomware Attacks Target SonicWall Firewall Vulnerability

Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over the past week, a large number of attacks by the ransomware group Akira have...more

Mayer Brown

Reducing Legal Risks From Ransomware Attacks: Lessons from Scattered Spider

Mayer Brown on

Leading businesses continue to suffer cyber attacks at the hands of sophisticated ransomware groups. For example, the threat group “Scattered Spider” (also known as UNC3944, Octo Tempest, 0ktapus) is once again making...more

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Mandelbaum Barrett PC

Cybersecurity in Business Ownership: What Your Start-Up Should Know

Mandelbaum Barrett PC on

Cybersecurity is no longer a luxury; it’s a necessity. For start-ups and established businesses alike, protecting sensitive information and maintaining customer trust relies heavily on strong cybersecurity measures. With...more

Schwabe, Williamson & Wyatt PC

Low-Budget, High-Impact Ways to Reduce Privacy and Cybersecurity Risks in 2025‎

1. Know What Laws Apply to your Organization It’s not surprising many leaders are unsure about which new laws or regulations apply to their organization. Privacy and security laws, particularly in the U.S., have changed...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Constangy, Brooks, Smith & Prophete, LLP

NY-licensed financial services companies must harden incident response plans, improve breach readiness by November 1

New York’s Cybersecurity Regulation continues its phased roll-out on November 1, when licensed financial services companies face a host of new requirements aimed at bolstering breach readiness and improving their ability to...more

Baker Donelson

Lessons From the Suffolk County Ransomware Attack That Apply to All Businesses

Baker Donelson on

In December 2021, Suffolk County, New York, experienced a significant cybersecurity breach that culminated in a ransomware attack in September 2022. The attack went undetected for months, allowing the attackers to install...more

Paul Hastings LLP

Reminder: More New York Department of Financial Services (NYDFS) Requirements Go Into Effect Next Month

Paul Hastings LLP on

As we have previously written, late last year the New York Department of Financial Services (NYDFS) adopted long-awaited amendments to its Part 500 Cybersecurity Regulations (Part 500). These are some of the most significant...more

Epiq

The Importance of Data Security in Bankruptcy Claims

Epiq on

Data security is a major concern across virtually all areas of the legal profession particularly in 2024 thanks in part to a record-breaking number of cyber incidents last year that cost companies an average of $4.45 million...more

Eversheds Sutherland (US) LLP

New York Raises the Bar Again: Revised Cybersecurity Requirements for Financial Services Companies Finalized

On November 1, 2023, the New York Department of Financial Services (NY DFS) published its highly anticipated final amendments to its influential cybersecurity requirements for financial services companies (Part 500)....more

Bradley Arant Boult Cummings LLP

Complying With the FTC's Amended Safeguards Rule

Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more

BakerHostetler

Deeper Dive into the Data

BakerHostetler on

Every year, BakerHostetler collects and analyzes various metrics about the incident response matters we handle. In 2022, we handled over 1,160 incidents. The most striking trends we saw across those incidents were an overall...more

Faegre Drinker Biddle & Reath LLP

NYDFS Releases Pre-Proposed Second Amendment to its Cybersecurity Regulations, 23 NYCRR 500

On July 29, 2022, the New York Department of Financial Services (NYDFS) published the pre-proposed second amendment to its Cybersecurity Regulations, 23 NYCRR 500 (Part 500), that if adopted, would likely require numerous...more

Balch & Bingham LLP

Business Privacy Law Lessons from Proposed Settlement with Twitter

Balch & Bingham LLP on

The Department of Justice (“DOJ”), on behalf of the Federal Trade Commission (“FTC”), filed a complaint and motion for entry of a stipulated order with the Northern District of California, which would require Twitter to pay...more

Opportune LLP

Defense In-Depth: Cybersecurity For Energy

Opportune LLP on

Glenn Hartfiel, Principal, and Geoff Yut, Consultant, at Opportune LLP discuss why recent geopolitical events are heightening the need for the implementation of improved cybersecurity measures in the energy industry, why...more

Jackson Lewis P.C.

The RIPTA Data Breach May Provide Valuable Lessons About Data Collection and Retention

Jackson Lewis P.C. on

Efforts to secure systems and data from a cyberattack often focus on measures such as multifactor authentication (MFA), endpoint monitoring solutions, antivirus protections, and role-based access management controls, and for...more

Rivkin Radler LLP

NY AG: All Businesses Should Take ‘Credential Stuffing’ Attacks Seriously

Rivkin Radler LLP on

Credential stuffing has quickly become one of the top attack vectors online, according to the Office of New York State Attorney General Letitia James (OAG). On January 6, 2022, the OAG announced the result of a sweeping...more

27 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide