News & Analysis as of

Network Security Cyber Crimes

K2 Integrity

Cybersecurity Awareness Month: Evading Phishing Attacks

K2 Integrity on

This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more

K2 Integrity

Cybersecurity Awareness Month: Installing Updates to Fix Bugs and Vulnerabilities

K2 Integrity on

This article is the third in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity has been providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

NAVEX

Risk’s Digital Transformation – When IT & Third-Party Risk Reached Main Street

NAVEX on

It wasn’t long ago that the phrase digital transformation conjured the image of a large-enterprise corporate luminary delivering a keynote about the technological metamorphosis of their industry. Digitalization of legacy...more

Robinson+Cole Data Privacy + Security Insider

FBI and DHS Warn of Russian Cyberattacks Against Critical Infrastructure

U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that Russia might launch cyber-attacks against Ukrainian and U.S. networks at the same time it launches...more

Wyrick Robbins Yates & Ponton LLP

Worried about Ransomware? Ten Steps to Help Legal Counsel Understand and Mitigate the Risk

Executive teams in the U.S. live in fear of a successful ransomware attack, and who can blame them? Attacks are both prevalent and evolving. Many attackers have shifted from encrypting data and locking up systems to also (or...more

Hogan Lovells

SIDN and its fight against cybercrime

Hogan Lovells on

Stichting Internet Domeinregistratie Nederland or SIDN, the Registry operator of the country code Top Level Domain (ccTLD) .NL (the Netherlands) appears to be increasing its efforts in its fight against cybercrime....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2019 #3

Robinson & Cole LLP on

A recent Ponemon Institute study finds that small and mid-sized businesses continue to be targeted by cybercriminals, and are struggling to direct an appropriate amount of resources to combat the attacks. ...more

Skadden, Arps, Slate, Meagher & Flom LLP

Cybersecurity Considerations in Oil and Gas Transactions

One of the foremost threats companies face today is that posed by cybercriminals, and the unique vulnerabilities of companies in the oil and gas sector create heightened cybersecurity risks for those pursing transactions in...more

Robinson+Cole Data Privacy + Security Insider

U.S. Cyber Command Issues Warning About Microsoft Outlook Vulnerability

Hackers are targeting U.S. government networks, according to U.S. Cyber Command, which says there is a vulnerability of CVE-2017-1174, which is a two year old flaw in Microsoft Outlook that is being used by attackers to...more

Robinson+Cole Data Privacy + Security Insider

Customs + Border Patrol Vendor’s Network Compromises Images and License Plate Data

The United States Customs and Border Patrol (CBP) admitted last week that personal information that it collected from travelers crossing the U.S. borders was exposed in a “malicious cyber-attack” against one of its vendors....more

Hogan Lovells

Netherlands – Cybersecurity: Hackman to the rescue!

Hogan Lovells on

In May, SIDN, the Registry responsible for the country code Top Level Domain (ccTLD) extension .NL (Netherlands), published an article on the Ethical Hacker Rickey Gevers and the efforts of the Netherlands to make the Dutch...more

Robinson+Cole Data Privacy + Security Insider

FBI Warning: Russian Hackers Attacking Routers

Late last week, the Federal Bureau of Investigation (FBI) issued a warning to U.S. consumers that Russian hackers (dubbed Sofacy and a/k/a Fancy Brear and APT28 and believed to be backed by the Russian government) had...more

Robinson+Cole Data Privacy + Security Insider

Drones Used as Source to Infiltrate Corporate Networks

Drones are being used by nefarious actors to spy on networks, intercept data, disrupt communications and hack into servers more than ever. In fact, drones are becoming a more and more prevalent source for infiltrating...more

Robinson+Cole Data Privacy + Security Insider

Hyatt Data Breach Impacts 41 Locations in 11 Countries

Hyatt Hotels Corporation recently announced that it had identified malicious software code resulting in unauthorized access to customer payment card information. Hyatt disclosed that upon investigating the incident, it...more

K2 Integrity

Qakbot: Insight into a Persistent, Polymorphic Malware from the Cyber Defense Team at K2 Intelligence

K2 Integrity on

Qakbot (Qbot) first emerged in 2009 as a piece of malware designed to steal online banking credentials from infected computers. It used classic key-logger technology combined with an ability to steal active session...more

Skadden, Arps, Slate, Meagher & Flom LLP

"The Emerging Need for Cybersecurity Diligence in M&A"

Cybercrime has emerged as one of the foremost threats a company faces. As a result of a few keystrokes, a company may find its customers’ data sold on the dark web, its intellectual property in the hands of a competitor or...more

Patterson Belknap Webb & Tyler LLP

Lessons from the Bangladesh Central Bank Heist

By now, you’ve probably heard about the massive cyber attack that hit Bangladesh’s central bank last month, resulting in the loss of $81 million through fraudulent transfers to accounts in the Philippines. Although the size...more

Morrison & Foerster LLP

China Proposes Draft Privacy Legislation with Significant Potential Implications

On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide