Cybersecurity Insights for the Sandwich Generation with Dan Krutoy
FCPA Compliance Report-Episode 408, Brad Davis on Social Engineering for Data Protection
The Federal Bureau of Investigation (FBI) recently released a FLASH warning highlighting malicious cyber activity conducted by threat actors operating on behalf of Iran’s Ministry of Intelligence and Security. According to...more
A recent decision from the U.S. District Court for the Western District of Texas offers a cautionary reminder for policyholders evaluating cyber coverage....more
On this episode of Culture & Compliance Chronicles, Amanda Raad and Nitish Upadhyaya from Ropes & Gray’s Insights Lab, and Richard Bistrong of Front-Line Anti-Bribery, are joined by neuropsychologist Sarah Zheng to explore...more
Last week, the Internal Revenue Service (“IRS”) announced its annual Dirty Dozen list of tax scams. The Dirty Dozen lists twelve of the most prevalent scams that, in the IRS’s estimation, represent the most significant...more
Executive Summary: A major new study by researchers at Harvard, MIT, Stanford, Carnegie Mellon, Northeastern, and other leading institutions tested what happens when AI agents — the kind that can send emails, run software,...more
Microsoft Threat Intelligence issued a report on March 6, 2026, entitled, “AI as tradecraft: How threat actors operationalize AI,” which outlines how threat actors, including those from North Korea, are “operationalizing AI...more
As 2026 unfolds, the global cyber threat landscape is rapidly evolving — driven by accelerating attacker sophistication, geopolitical pressures, and, above all, the rise of artificial intelligence as both a tool and a target....more
Today’s AI models suffer from a critical flaw. They lack human judgment and context that makes them vulnerable to what security researchers call “prompt injection attacks.” What are prompt injection attacks? Simply put, it is...more
The New York State Department of Financial Services recently published additional Frequently Asked Questions addressing compliance and providing clarity regarding the enhanced multi-factor authentication requirements in the...more
We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more
From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more
On December 19, 2025, the Federal Bureau of Investigation (FBI) published an Alert warning the public that it has data from as far back as 2023 that “malicious actors have impersonated senior U.S. state government, White...more
In this episode of The Sandwich Generation Survival Guide, host Candace Dellacona welcomes Dan Krutoy, a tech industry expert who shares advice for seniors who are often targeted by scammers using social engineering tactics,...more
For real estate practitioners, this might be the most important client alert you read this year. Imagine this scenario: you are a real estate closing attorney who has received the funds necessary to pay off a seller’s...more
As companies accelerate adoption of artificial intelligence (AI) across operations, the cyber risk landscape is changing faster than most insurance programs. Threat actors are leveraging AI to supercharge phishing, deploy...more
The holidays are upon us, and the last thing retailers want to do is respond to a security incident. Close behind, we’re sure, are changes to systems and policies at this time of year. But what can you do now to...more
We are seeing an increase in sophisticated social engineering attacks in which threat actors impersonate financial institutions and use accurate banking information to trick employees into disclosing credentials or...more
Deepfakes, social engineering, and urgent texts or calls from your IT department all continue to be effective methods hackers use to gain access to your most important accounts and assets. October is Cybersecurity Awareness...more
Passwords are the key to your digital kingdom. Passwords, also known as “credentials,” provide the user with access to all information and data that the user has been authorized to access, whether in a personal or...more
This newsletter explores the emerging legal topics and issues affecting the condominium and cooperative services industry. Thought-leading attorneys from Moritt Hock & Hamroff’s Condominium and Cooperative Services Practice...more
I love it when people come up to me and say they are “wicked paranoid” about QR codes. I have been trying to educate people on the risks of QR codes for years and that gives me satisfaction that I have prevented that person...more
On June 18, Arizona Attorney General (AG) Kris Mayes, in partnership with the Better Business Bureau (BBB), announced a new consumer educational campaign aimed at teaching Arizona residents how to avoid falling victim to a...more
Published in August 2025, the CrowdStrike Global Threat Report 2025 provides a detailed overview of the evolving cyber threat landscape, drawing on data from millions of endpoints and cloud workloads worldwide....more
Leading businesses continue to suffer cyber attacks at the hands of sophisticated ransomware groups. For example, the threat group “Scattered Spider” (also known as UNC3944, Octo Tempest, 0ktapus) is once again making...more
The hospitality industry faces mounting cybersecurity challenges as artificial intelligence (AI) enables increasingly sophisticated social engineering attacks targeting hotels, resorts, and travel service providers. Threat...more