News & Analysis as of

Software Cyber Threats

HaystackID

Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity

HaystackID on

Editor’s Note: In this exploration of cybersecurity in the digital era, the article “Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity” considers the crucial intersection of...more

Foley & Lardner LLP

Combatting Supply Chain Cyber Threats: Safeguarding Data and Protecting Digital Supply Chains

Foley & Lardner LLP on

As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Ankura

Understanding Cyber Resilience: Key Principles of a Modern Security Strategy

Ankura on

In today's fast-paced digital world, organizations face an increasingly complex and evolving landscape of cyber threats. Cyberattacks are no longer a question of if but when, making it imperative for businesses to not only...more

Mitratech Holdings, Inc

5 Reasons to Invest in Enterprise Risk Management Software

From financial uncertainties to cybersecurity threats, regulatory changes, and everything in between, just how imperative is Enterprise Risk Management (ERM) technology in today’s business environment? According to a...more

Guidepost Solutions LLC

Cyber Bullets for Small Law Firms

In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more

BakerHostetler

Threat Actors Target Academic Researchers in Phishing Schemes

BakerHostetler on

The FBI has announced that university aerospace researchers, both foreign and in the U.S., have become a target of a specific phishing scheme that is being conducted by threat actors. Specifically, researchers with access to...more

Paul Hastings LLP

“FAR” Reaching Consequences: Proposed FAR Cybersecurity Requirements Will Add New Obligations for Contractors

Paul Hastings LLP on

Earlier this month the Federal Acquisition Regulation (“FAR”) Council released two draft rules which would impose new cybersecurity requirements for federal contractors. The proposed rules, Cyber Threat and Incident Reporting...more

Foley & Lardner LLP

Takeaways from Black Hat USA 2023

Foley & Lardner LLP on

Foley & Lardner LLP ventured into the searing 104-degree heat of Las Vegas this August to co-sponsor a breakfast gathering at the Black Hat USA 2023 conference, attended by founders, CISOs, and investors. Many thanks to our...more

Bradley Arant Boult Cummings LLP

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

Ankura

FDA Authorized to Establish New Cybersecurity Standards for Medical Devices: What it Means for Industry

Ankura on

On December 29, 2022, President Biden signed a new statute that will significantly impact medical device cybersecurity regulation. Section 3305 of the Consolidated Appropriations Act of 2023 (“Section 3305”) authorizes the...more

Tucker Arensberg, P.C.

New Alert from U.S. Government about “Endemic” Cyber Vulnerability

Tucker Arensberg, P.C. on

When was the last time your company’s software was updated? If it was more than six months ago, your cybernetwork is at serious risk of exposure by hackers and you may be at risk of not complying with the new, 72-hour...more

Faegre Drinker Biddle & Reath LLP

Discerning Data Cyber Vulnerability Alert: Log4j

According to numerous government and media sources, malicious cyber actors are targeting a new “zero day” vulnerability on a massive scale. This vulnerability, referred to as “Log4j” or “Log4Shell,” has resulted in widespread...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Lewis Roca

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Lewis Roca on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Robinson+Cole Data Privacy + Security Insider

Apple + Microsoft Release Patches for Identified Vulnerabilities

This week, both Apple and Microsoft issued patches to fix serious zero-day vulnerabilities that should be applied as soon as possible. That means that if you have an iPhone or iPad, you may want to plug your phone or iPad in...more

Womble Bond Dickinson

News Scan Finds Multiple Threats to Your Privacy

Womble Bond Dickinson on

Your personal information is threatened by more pernicious tools and attacks each year. While this blog often describes poorly written privacy laws stifling business and dangerous bureaucratic overreach by privacy...more

Robinson+Cole Data Privacy + Security Insider

Vulnerabilities Found in Classroom Management Software

Although many students are returning to in-class learning, many others are still in a hybrid situation or fully remote at their own request. The rapid transition from in-school to the at-home learning setting has necessitated...more

Hogan Lovells

Post-market medical devices, cybersecurity, and the U.S. FDA’s growing concerns

Hogan Lovells on

From insulin pumps and pacemakers to defibrillators, medical devices increasingly rely on wireless and internet connectivity for efficient operations. Unfortunately, these interconnections also leave devices vulnerable to an...more

Association of Certified E-Discovery...

Chips Ahoy: #Meltdown and #Spectre Implications for Legal Professionals Part I

Recent press reports talk about a newly discovered form of security threat that involves attackers exploiting common features of modern microprocessors (aka chips) that power our computers, tablets, smartphones, and other...more

McManis Faulkner

Cybersecurity Awareness Month: How to Protect Your Firm Against Cyber Threats

McManis Faulkner on

October is Cybersecurity awareness month. Now is a better time than ever to look at your current practices at the office and even at home. It is important to know that we all play a role in keeping our work and personal data...more

King & Spalding

“Bug Bounty” Programs Grow In Popularity

King & Spalding on

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide