News & Analysis as of

Vulnerability Assessments Data Breach National Institute of Standards and Technology

Quarles & Brady LLP

Warning! ChatGPT Exploit Used by Threat Actors in Cyber Attacks

Quarles & Brady LLP on

Members of the health care and financial industries, along with other industries that hold sensitive data, are warned that a ChatGPT vulnerability is being actively exploited by threat actors to attack security flaws in AI...more

Ankura

Keeping Pace: The Evolution of Incident Response

Ankura on

Incident response (IR) has undergone a drastic transformation in the past two decades, adapting to the relentless evolution of the cyber threat landscape. In the early 2000s, as the internet became more deeply ingrained in...more

Robinson+Cole Data Privacy + Security Insider

Chinese State Hackers Exploit Zero-Day Vulnerabilities in Citrix Networking Equipment

According to the National Security Agency, actors backed by the Chinese government are actively targeting a zero-day vulnerability in two commonly-used Citrix networking devices. The exploit (CVE-2022-27518) affects Citrix...more

Polsinelli

Emerging Threats: Cyber Attacks and Side-Channel Evolution

Polsinelli on

“Side-Channel” attacks generally refer to a type of criminal cyber attacker activity that exploits vulnerabilities so that the attacker can collect and analyze “leakage” of data from a device, as a means to identify certain...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2018 #5

Robinson & Cole LLP on

Power Company Fined for Contractor Copying Data to its Own Insecure Network - Vendor management continues to be a problem for all industries, but some are scarier than others. The North American Electric Reliability Corp....more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide