News & Analysis as of

Software Cyber Crimes

Robinson+Cole Data Privacy + Security Insider

College Student Behind Cyber Extortions

The U.S. Attorney’s Office for the District of Massachusetts has charged a student at Assumption University with hacking into two U.S.-based companies’ systems and demanding a ransom....more

Goodwin

EU Adopts Cyber Resilience Act for Connected Devices

Goodwin on

On October 10, 2024, the European Council officially adopted the Cyber Resilience Act (CRA), a regulation designed to ensure that products with digital features are secure to use and resilient against cyber threats, and that...more

Foley & Lardner LLP

Rolling With the Punches in a Networked World: CCOE Cybersecurity Panel Discussion

Foley & Lardner LLP on

Whether the game is football, baseball, hockey, or Indy Car racing, no team goes into their major championship matchup without training. Companies need to train as well if they intend to operate on the internet and expect to...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Guidepost Solutions LLC

Change Healthcare Ransomware Attack: 10 Lessons Learned

Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more

Guidepost Solutions LLC

Cyber Bullets for Small Law Firms

In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more

K2 Integrity

Cybersecurity Awareness Month: Evading Phishing Attacks

K2 Integrity on

This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more

K2 Integrity

Cybersecurity Awareness Month: Installing Updates to Fix Bugs and Vulnerabilities

K2 Integrity on

This article is the third in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity has been providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

Ankura

Ransomware: The Top 5 Myths and Misconceptions

Ankura on

Ransomware has become a major threat to businesses across the world as cyber-attacks are becoming increasingly sophisticated, resulting in devastating financial damage for companies that fall victim. Not only are important...more

Ankura

FDA Authorized to Establish New Cybersecurity Standards for Medical Devices: What it Means for Industry

Ankura on

On December 29, 2022, President Biden signed a new statute that will significantly impact medical device cybersecurity regulation. Section 3305 of the Consolidated Appropriations Act of 2023 (“Section 3305”) authorizes the...more

Ankura

Notable Cyberattack Methods and Common Targets of 2022

Ankura on

Cyberattacks are a constant threat to businesses, organizations, governments, and individuals worldwide. In order to stay secure against cybercriminal activity, it is essential to understand the various cyberattack methods...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

Decoding the Recent Apple Security Updates

Takeaway: The recent vulnerabilities in Apple software has exemplified the importance of patch management and keeping devices up to date with the latest operating systems and software in order to protect the security of...more

Faegre Drinker Biddle & Reath LLP

Discerning Data Cyber Vulnerability Alert: Log4j

According to numerous government and media sources, malicious cyber actors are targeting a new “zero day” vulnerability on a massive scale. This vulnerability, referred to as “Log4j” or “Log4Shell,” has resulted in widespread...more

Hogan Lovells

NYDFS recommends critical new practices to reduce supply chain risk in wake of SolarWinds attack

Hogan Lovells on

On April 27, 2021, the New York State Department of Financial Services (“DFS” or the “Department”) released a report regarding its investigation into the response by DFS covered entities to the SolarWinds supply chain attack....more

Robinson+Cole Data Privacy + Security Insider

Microsoft Urges Customers to Patch Exchange Server “Zero Day” Vulnerabilities

In a rare sharing of information about vulnerabilities in a blog post, Microsoft this week urged customers to download software patches to Microsoft Exchange Server after it detected “multiple 0—Day exploits being used to...more

Robinson+Cole Data Privacy + Security Insider

SolarWinds Cyber-Attack Has Significant Implications for Developers and Contractors

ICYMI, on Wednesday, January 6, 2021, the United States Department of Justice (DOJ) issued an update about what it termed “a major incident under the Federal Information Security Modernization Act”: the global SolarWinds...more

Patterson Belknap Webb & Tyler LLP

Hack of IT Service Provider May Affect Thousands of Private Businesses

On December 13, the software and service provider SolarWinds announced that its Orion software platform had been the target of a sophisticated cyber-attack that may have resulted in malicious code being pushed to as many as...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Hits Legal Case Management Provider TrialWorks

TrialWorks, a legal case management software platform announced to its customers on October 13, 2019, that it was experiencing a hosting outage at their data center and that they would provide updates as they learned more...more

King & Spalding

United States Department Of Justice Seeks To Dismantle Massive Kelihos Botnet, Files Complaint In Federal District Court

King & Spalding on

The United States Department of Justice (“DOJ”) recently announced that it would be undertaking an “extensive effort to disrupt and dismantle the Kelihos botnet – a global network of tens of thousands of infected computers...more

Robinson+Cole Data Privacy + Security Insider

Fiat moves to dismiss proposed class action suit

Late last week, Fiat filed a Motion to Dismiss the proposed class action against it following reports of hacking into vehicle information systems and its announcement that it was recalling 1.4 million Dodge, Ram and Jeep...more

Robinson+Cole Data Privacy + Security Insider

Shareholders sue mobile security firm for failing to disclose hacking incident before IPO

MobileIron, Inc. was sued late last week by shareholders in a proposed class action for allegedly failing to disclose a hacking incident just weeks before its initial public offering (IPO). The suit, filed on behalf of...more

Polsinelli

Mobile Health Devices and Cybersecurity: Federal Guidance for Management of Threats in Medical Devices

Polsinelli on

New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more

Carlton Fields

Spoofing Whales: How Companies Can Protect Their CEOs and CFOs from the "Business Email Compromise”

Carlton Fields on

Cyber scammers continually innovate new means to extract valuable information from unsuspecting victims. And a new form of cyber fraud is exploiting the close relationship between CEOs and CFOs. Identifying this threat — and...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide