News & Analysis as of

Phishing Scams Cyber Crimes

StoneTurn

The Evolution of Cybercrime: How to Stay Safe from AI-Driven Fraud

StoneTurn on

A recent article in The Wall Street Journal highlights a case that is sadly all too familiar – a family member is in distress, and you must wire them money to help save them. Of course, as the article reveals, the family...more

Troutman Pepper Locke

Need for Enhanced Cybersecurity in Public Finance — Cyberthieves Steal Bond Proceeds

Troutman Pepper Locke on

Recent events highlight the need for enhanced cybersecurity protocols in government offices across the U.S. In late November 2024, the Township of White Lake in Michigan, intended to issue approximately $29 million in general...more

Ankura

Cybercriminals Are Moving into the Cloud and Making Your Active Directory Their New Home

Ankura on

Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more

HaystackID

AI-Driven Phishing: An Emerging Threat to Corporate Security

HaystackID on

In an era marked by rapid technological advancement, artificial intelligence has emerged as a transformative force in cybersecurity threats, particularly in the domain of sophisticated phishing attacks. Recent developments...more

Akin Gump Strauss Hauer & Feld LLP

CryptoLink - November 2024 Updates

CryptoLink is a compilation of news stories published by outside organizations. Akin aggregates the stories, but the information contained in them does not necessarily represent the beliefs or opinions of the firm. Akin's...more

J.S. Held

How to Defend Against Identity Theft This Tax Season

J.S. Held on

In recent years, identity theft cases have surged, especially during tax season. According to the Internal Revenue Service (IRS), in 2022, the federal agency identified and prevented USD 5.7 billion in tax-related fraud, and...more

Foley Hoag LLP - Security, Privacy and the...

Holiday Cyber Security Scams: Protecting Your Business During the Festive Season Without Being a Grinch

As the holiday season is upon us, businesses must remain vigilant against the increased threat of cybersecurity hacks and scams. Cybercriminals often exploit the festive atmosphere and increased online activity to target...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #421 – Threat Actors Using DocuSign API to Send Fake Invoices

DocuSign is a great and efficient way to obtain authentic signatures for contracts and invoices. As with other efficient tools, threat actors will and have found a way to use the DocuSign API to send fake invoices to divert...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #418 – New Phishing Scheme Uses Scarce Weight Loss Drugs as Hook

Scammers are always looking for new ways to dupe victims. If you battle your weight, you think about it a lot and are always looking for easier ways to lose some pounds. There is no easy way, but we are always looking for an...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2024

23andMe agreed to pay $30 million and provide three years of security monitoring to settle a lawsuit accusing the genetics testing company of failing to protect the privacy of 6.9 million customers whose personal information...more

Ankura

‘Dark’ AI: The Emergence of Generative AI Tools Tailored for Threat Actors

Ankura on

Technological advancements are plentiful in the world of cybersecurity and are often seen as a double-edged sword, a sentiment that holds true in the rise of generative AI. As AI gains traction for its versatility and power,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #416 – Impersonation is the Most Prolific Phishing Tactic in 2024

A new report published by the software company Egress this month, Phishing Threat Trends Report, is a must-read. It outlines the proliferation of phishing toolkits on the dark web (that basically allows any Tom, Dick, and...more

Alston & Bird

AI vs. AI: Recent Developments in the Cyber Landscape

Alston & Bird on

The ubiquity of artificial intelligence (AI) has heightened companies’ exposure to cyberattacks of increasingly greater sophistication. Our Privacy, Cyber & Data Strategy Team explores how businesses can enhance their...more

J.S. Held

Benefits of a vCISO in the Age of AI-Driven Cyberattacks

J.S. Held on

Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more

Smart & Biggar

Don’t take the bait: avoiding trademark phishing scams

Smart & Biggar on

The College of Patent Agents & Trademark Agents (CPATA) recently issued an alert regarding a surge in fraudulent emails targeting trademark owners. As is typical of these “phishing” scams, the emails often pressure recipients...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Mitratech Holdings, Inc

One of the Millions Impacted in the USDoD Social Security Data Breach? Here’s What to Do Next.

Millions of individuals could be at the mercy of cybercriminals after a hacking group launched a large-scale data breach impacting 2.9 billion records, including Social Security numbers and other sensitive information. The...more

Dorsey & Whitney LLP

Cybercrime Trends: A Midyear Review

Dorsey & Whitney LLP on

Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more

Robinson+Cole Data Privacy + Security Insider

CrowdStrike Customers Targeted by Threat Actors Using Fake Help Websites

If you are a customer of CrowdStrike, you are working on recovering from the outage that occurred on July 19, 2024. As if that isn’t enough disruption, CrowdStrike is warning customers that threat actors are taking advantage...more

Troutman Pepper Locke

Preserving Forensic Artifacts Following Incident Detection - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper Locke on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

Katten Muchin Rosenman LLP

Gone Phishing – Vigilance in the New Scam Era - Kattison Avenue | Issue 12

"Thank you for your order." "We tried delivering your package." We have all seen these subject lines in our inbox, but some are not so innocent. Business impersonation scams are not new, but some of their tricks are. These...more

Foodman CPAs & Advisors

Smishing Y Phishing Inician Las Estafas De La Docena Sucia Anual Del IRS

El 3/28/24, el IRS inició su lista anual de la Docena Sucia (“Dirty Dozen”) con una advertencia para que los contribuyentes estén al tanto de la evolución de las estafas de smishing y phishing diseñadas para robar información...more

Foodman CPAs & Advisors

Smishing And Phishing Scams Kick Off IRS Annual Dirty Dozen

On 3/28/24, the IRS kicked off its annual Dirty Dozen list with a warning for taxpayers to be aware of evolving smishing and phishing scams designed to steal sensitive taxpayer information. Smishing and phishing scams arrive...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #393 – Phishing, Smishing, Vishing and Qrishing Schemes Continue to Dupe Users

The recent increase in smishing and vishing schemes is prompting me to remind readers of schemes designed to trick users into providing credentials to perpetrate fraud. We have previously written on phishing, smishing,...more

Spilman Thomas & Battle, PLLC

Decoded Technology Law Insights, V 5, Issue 3, April 2024

Using AI to Build Cyber Resilience for Critical Infrastructure - "Cyber resilience serves as a literal survival strategy, offering a framework to detect threats, understand attacks, recover swiftly, and adapt to...more

235 Results
 / 
View per page
Page: of 10

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide