News & Analysis as of

Phishing Scams

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #443 – Fake AI Tools Used to Install Noodlophile

Threat actors are leveraging the publicity around AI tools to trick users into downloading the malware known as Noodlophile through social media sites. Researchers from Morphisec have observed threat actors, believed to...more

Integreon

Cybersecurity, Wire Fraud, and Attorney Liability: The Growing Risk Landscape

Integreon on

Wire transfer fraud is on the rise, and attorneys are increasingly becoming prime targets for cybercriminals. With billions lost annually to fraudulent transactions, legal professionals who fail to implement robust...more

K2 Integrity

World Password Day: Increasing Security in Two Steps

K2 Integrity on

May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

StoneTurn

The Evolution of Cybercrime: How to Stay Safe from AI-Driven Fraud

StoneTurn on

A recent article in The Wall Street Journal highlights a case that is sadly all too familiar – a family member is in distress, and you must wire them money to help save them. Of course, as the article reveals, the family...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #440 – Text Scam Proceeds Surpass $470M in 2024

I have been getting a lot of texts that are clearly scams, and those around me have confirmed an increase in spammy texts. According to an FTC Consumer Protection Data Spotlight, individuals lost over $470 million...more

Troutman Pepper Locke

The FTC Shines Its Spotlight on the Top Text Scams of 2024

Troutman Pepper Locke on

As technology advances, so do the tactics of scammers. The Federal Trade Commission (FTC) recently released a data spotlight on the top text scams of 2024, revealing a significant increase in financial losses despite a...more

Katten Muchin Rosenman LLP

The More You Know Can Hurt You: Court Rules Financial Institutions Need 'Actual Knowledge' of Mismatches for ACH Scam Liability

On March 26, the US Court of Appeals for the Fourth Circuit issued a decision that has important ramifications for banks and credit unions that process millions of Automated Clearing House (ACH) and Electronic Funds Transfer...more

Holland & Knight LLP

Sophisticated Crypto Theft Targeting High-Net-Worth Individuals

Holland & Knight LLP on

A recent court case has unveiled a new level of sophistication in attacks targeting high-net-worth cryptocurrency holders. In a meticulously orchestrated scheme, hackers managed to steal more than $40 million in bitcoin from...more

Goldberg Segalla

Tax Season = Phishing Season

Goldberg Segalla on

Most professionals are aware of the April 15 tax deadline. We know that fraudsters certainly are! As Tax Day approaches in the U.S., we encourage all to be mindful of several phishing campaigns that Microsoft has observed...more

Bennett Jones LLP

Don’t Be the Next Victim of a BEC Scam

Bennett Jones LLP on

Businesses are increasingly defrauded through common scams known as business email compromise scams (BEC scams) for which they do not have insurance to cover the resulting losses. Fortunately, there are easy-to-implement...more

Holland & Knight LLP

Fourth Circuit Limits Beneficiary Bank Liability in BEC Schemes, Requires Actual Knowledge

Holland & Knight LLP on

Business email compromise (BEC) fraud, driven by technology and increasing sophistication by criminal organizations, has become a major issue for both consumers and financial institutions. According to a September 2024...more

Robinson+Cole Data Privacy + Security Insider

Phishing Attacks – Anyone Can Get Pwned

HaveIBeenPwned is a website that allows users to check whether their data has been involved in data breaches. The website’s creator, Troy Hunt, was the subject of a phishing attack earlier this week....more

Foster Garvey PC

This Week in Travel: Booking.com Phishing Scam, California’s AI Pricing Crackdown & More

Foster Garvey PC on

Happy Saturday from Seattle . . . Our Online Travel Update for the week ending Friday, March 14, 2025, is below. What started as a relatively quiet week in the travel industry (other than the concerning reports from several...more

Troutman Pepper Locke

Need for Enhanced Cybersecurity in Public Finance — Cyberthieves Steal Bond Proceeds

Troutman Pepper Locke on

Recent events highlight the need for enhanced cybersecurity protocols in government offices across the U.S. In late November 2024, the Township of White Lake in Michigan, intended to issue approximately $29 million in general...more

Robinson+Cole Data Privacy + Security Insider

Social Engineering + Stolen Credential Threats Continue to Dominate Cyber-Attacks

CrowdStrike recently published its 2025 Global Threat Report, which among other conclusions, emphasized that social engineering tactics aimed to steal credentials grew an astounding 442% in the second half of 2024....more

Alston & Bird

Ransom Payments at a Historic Low According to Report

Alston & Bird on

On February 4, 2025, Coveware, Inc. released its quarterly ransomware report for the fourth quarter of 2024, and identified that the percentage of victims paying ransoms fell to a historic low of 25%.  While the average...more

Hogan Lovells

Confronting social engineering in the age of artificial intelligence

Hogan Lovells on

AI-enabled technology enhances threat actors’ ability to engage in advanced and difficult-to-detect forms of social engineering to deceive employees and circumvent companies’ security controls. Companies may consider new...more

Ankura

Cybercriminals Are Moving into the Cloud and Making Your Active Directory Their New Home

Ankura on

Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more

Ward and Smith, P.A.

Data Privacy Insights Part 2: The Most Common Types of Data Breaches Businesses Face

Ward and Smith, P.A. on

As part of Data Privacy Awareness Week, Ward and Smith is spotlighting the most common types of data breaches that businesses encounter. In Part 1, we explored the industries most vulnerable to cyberattacks, highlighting the...more

K&L Gates LLP

Be Wary: Sophisticated Scam Emails Impersonating IP Attorneys

K&L Gates LLP on

Business owners should be aware of a new email scam circulating impersonating an intellectual property (IP) representative, containing false information, and offering trademark assistance. This nefarious email scam is sent by...more

Ward and Smith, P.A.

Data Privacy Insights Part 1: North Carolina Ranks High in Cybercrime Complaints

Ward and Smith, P.A. on

The FBI's Internet Crime Complaint Center (IC3) report sheds light on the growing threat of cybercrime, both nationally and within North Carolina. The state ranks among the top 15 in the U.S. for cybercrime complaints,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #428 – Getting Text Messages From E-ZPass or Toll Road Operators? They’re Scams Coming from China

This week, I received a fake text message (a smish) saying my E-ZPass account was overdue and that I urgently needed to pay it. That’s a new one and, apparently, quite effective. Luckily, I knew it was a scam, but others were...more

Ankura

The Rise of AI-Powered Cyber Attacks: How Indian Businesses Can Prepare

Ankura on

As the digital landscape evolves, so do the threats that accompany it. The rise of artificial intelligence (AI) has fundamentally transformed the nature of cybercrime, enabling attackers to execute more sophisticated and...more

965 Results
 / 
View per page
Page: of 39

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide