News & Analysis as of

Social Engineering

Robinson+Cole Data Privacy + Security Insider

FBI Warns: Iran Cyber Actors Using Telegram to Push Malware

The Federal Bureau of Investigation (FBI) recently released a FLASH warning highlighting malicious cyber activity conducted by threat actors operating on behalf of Iran’s Ministry of Intelligence and Security. According to...more

Bradley Arant Boult Cummings LLP

Texas Federal Court Reinforces Single Limit for Social Engineering Loss Arising from Multiple Payments

A recent decision from the U.S. District Court for the Western District of Texas offers a cautionary reminder for policyholders evaluating cyber coverage....more

Ropes & Gray LLP

[Podcast] Culture & Compliance Chronicles: The Human Factor—Psychology and Cybersecurity in the Digital Age with Sarah Zheng

Ropes & Gray LLP on

On this episode of Culture & Compliance Chronicles, Amanda Raad and Nitish Upadhyaya from Ropes & Gray’s Insights Lab, and Richard Bistrong of Front-Line Anti-Bribery, are joined by neuropsychologist Sarah Zheng to explore...more

Farrell Fritz, P.C.

IRS Releases 2026 “Dirty Dozen” List of Tax Scams

Farrell Fritz, P.C. on

Last week, the Internal Revenue Service (“IRS”) announced its annual Dirty Dozen list of tax scams. The Dirty Dozen lists twelve of the most prevalent scams that, in the IRS’s estimation, represent the most significant...more

Akerman LLP

Pandora’s Bots: Autonomous Agentic AI as Enterprise Risk

Akerman LLP on

Executive Summary: A major new study by researchers at Harvard, MIT, Stanford, Carnegie Mellon, Northeastern, and other leading institutions tested what happens when AI agents — the kind that can send emails, run software,...more

Robinson+Cole Data Privacy + Security Insider

North Korean Threat Groups Using AI in Remote Technical Employee Schemes

Microsoft Threat Intelligence issued a report on March 6, 2026, entitled, “AI as tradecraft: How threat actors operationalize AI,” which outlines how threat actors, including those from North Korea, are “operationalizing AI...more

The Volkov Law Group

Cybersecurity’s New Frontline: What the 2026 CrowdStrike Global Threat Report Reveals

The Volkov Law Group on

As 2026 unfolds, the global cyber threat landscape is rapidly evolving — driven by accelerating attacker sophistication, geopolitical pressures, and, above all, the rise of artificial intelligence as both a tool and a target....more

Foley & Lardner LLP

Prompt Injection: Social Engineering Attacks on AI

Foley & Lardner LLP on

Today’s AI models suffer from a critical flaw. They lack human judgment and context that makes them vulnerable to what security researchers call “prompt injection attacks.” What are prompt injection attacks? Simply put, it is...more

Constangy, Brooks, Smith & Prophete, LLP

New York publishes FAQs on enhanced multi-factor authentication rules

The New York State Department of Financial Services recently published additional Frequently Asked Questions addressing compliance and providing clarity regarding the enhanced multi-factor authentication requirements in the...more

Robinson+Cole Data Privacy + Security Insider

Single Sign-On Services Targeted in Vishing Attacks

We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more

MoFo Tech

AI Trends For 2026 - AI-Driven Threats and the Next Phase of Cyber Defense

MoFo Tech on

From deepfakes and malicious code to sophisticated social engineering, threat actors are increasingly using AI to sharpen attacks against companies and organizations. These tools allow cyberattacks to scale and adapt,...more

Robinson+Cole Data Privacy + Security Insider

FBI Warns of Increase in AI-Generated Impersonations of Senior U.S. Officials

On December 19, 2025, the Federal Bureau of Investigation (FBI) published an Alert warning the public that it has data from as far back as 2023 that “malicious actors have impersonated senior U.S. state government, White...more

Offit Kurman

Cybersecurity Insights for the Sandwich Generation with Dan Krutoy

Offit Kurman on

In this episode of The Sandwich Generation Survival Guide, host Candace Dellacona welcomes Dan Krutoy, a tech industry expert who shares advice for seniors who are often targeted by scammers using social engineering tactics,...more

Freeman Mathis & Gary

Are you actually covered? A cyber insurance warning for real estate attorneys

Freeman Mathis & Gary on

For real estate practitioners, this might be the most important client alert you read this year. Imagine this scenario: you are a real estate closing attorney who has received the funds necessary to pay off a seller’s...more

Lowenstein Sandler LLP

AI, Deepfakes, and Coverage Drift: What Policyholders Need To Know Now

Lowenstein Sandler LLP on

As companies accelerate adoption of artificial intelligence (AI) across operations, the cyber risk landscape is changing faster than most insurance programs. Threat actors are leveraging AI to supercharge phishing, deploy...more

Perkins Coie

Keep the Season Bright: Holiday Cybersecurity Tips for Retailers

Perkins Coie on

The holidays are upon us, and the last thing retailers want to do is respond to a security incident. Close behind, we’re sure, are changes to systems and policies at this time of year. But what can you do now to...more

Clark Hill PLC

Sophisticated social engineering schemes targeting business bank accounts

Clark Hill PLC on

We are seeing an increase in sophisticated social engineering attacks in which threat actors impersonate financial institutions and use accurate banking information to trick employees into disclosing credentials or...more

Baker Donelson

Cybersecurity Awareness Month 2025: Seven Foundational Pillars of Good Personal Cyber Hygiene

Baker Donelson on

Deepfakes, social engineering, and urgent texts or calls from your IT department all continue to be effective methods hackers use to gain access to your most important accounts and assets. October is Cybersecurity Awareness...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #463 – How a Weak Password Can Take a Whole Company Down

Passwords are the key to your digital kingdom. Passwords, also known as “credentials,” provide the user with access to all information and data that the user has been authorized to access, whether in a personal or...more

Moritt Hock & Hamroff LLP

MHH Condo/Co-op Digest, (October 2025)

This newsletter explores the emerging legal topics and issues affecting the condominium and cooperative services industry. Thought-leading attorneys from Moritt Hock & Hamroff’s Condominium and Cooperative Services Practice...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #461 – Threat Actors Using Malicious QR Codes to Harvest Sensitive Data Stored with Cookies

I love it when people come up to me and say they are “wicked paranoid” about QR codes. I have been trying to educate people on the risks of QR codes for years and that gives me satisfaction that I have prevented that person...more

Troutman Pepper Locke

Arizona AG and BBB Launch Educational Campaign on Modern Consumer Scams

Troutman Pepper Locke on

On June 18, Arizona Attorney General (AG) Kris Mayes, in partnership with the Better Business Bureau (BBB), announced a new consumer educational campaign aimed at teaching Arizona residents how to avoid falling victim to a...more

Morgan Lewis - Tech & Sourcing

Key Takeaways from the CrowdStrike Global Threat Report 2025

Published in August 2025, the CrowdStrike Global Threat Report 2025 provides a detailed overview of the evolving cyber threat landscape, drawing on data from millions of endpoints and cloud workloads worldwide....more

Mayer Brown

Reducing Legal Risks From Ransomware Attacks: Lessons from Scattered Spider

Mayer Brown on

Leading businesses continue to suffer cyber attacks at the hands of sophisticated ransomware groups. For example, the threat group “Scattered Spider” (also known as UNC3944, Octo Tempest, 0ktapus) is once again making...more

Neal, Gerber & Eisenberg LLP

AI and Social Engineering Practice Tips

The hospitality industry faces mounting cybersecurity challenges as artificial intelligence (AI) enables increasingly sophisticated social engineering attacks targeting hotels, resorts, and travel service providers. Threat...more

104 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide