News & Analysis as of

Information Technology Cyber Attacks

McDermott Will & Emery

DORA-Check

McDermott Will & Emery on

Digitale Bedrohungen und Cyberangriffe nehmen jedes Jahr zu – im Jahr 2023 verursachten sie in Deutschland Schäden von über 200 Milliarden Euro, wobei 72% davon auf Cyberangriffe zurückzuführen waren (Quelle: Bitkom,...more

Hinckley Allen

Today’s Menacing Cyber Threat Environment: What Organizations Need to Know to Quickly Respond to a Data Breach and Reduce the...

Hinckley Allen on

As the last two years have clearly demonstrated, no organization is immune from cyberattacks.  Indeed, numerous studies have reported that a majority of businesses have been impacted by at least one cyberattack over the past...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #418 – New Phishing Scheme Uses Scarce Weight Loss Drugs as Hook

Scammers are always looking for new ways to dupe victims. If you battle your weight, you think about it a lot and are always looking for easier ways to lose some pounds. There is no easy way, but we are always looking for an...more

Mayer Brown

Cyber Threats on the Rise: Dissecting the Common Themes Behind Recent Cybersecurity Incidents in Hong Kong

Mayer Brown on

Hong Kong has witnessed a notable surge in cyber breach incidents in recent years. The cyberattacks have affected various organisations across the public, private and non-profit sector. Cybersecurity incidents recorded a...more

Perkins Coie

Cybersecurity for Lawyers: Open-Source Software Supply Chain Attacks

Perkins Coie on

In this post in our series on basic cybersecurity concepts for lawyers, we address open-source software (OSS) supply chain risk. OSS is software developed using an “open-source” protocol, meaning that its code is fully...more

Alston & Bird

United States Cybersecurity and Infrastructure Security Agency Issues Joint International Guidance for Event Logging and Threat...

Alston & Bird on

On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more

Warner Norcross + Judd

Managing Cybersecurity Risk for Family Offices and Businesses

Warner Norcross + Judd on

Whether caused by family member thoughtlessness, employee error or the acts of a skilled data thief, everyone is likely to be the victim of an information breach at some point. A cyberattack on a family office or family...more

DLA Piper

Hong Kong: A Practical Guide to the Proposed Critical Infrastructure Cybersecurity Legislation

DLA Piper on

Hong Kong is following other jurisdictions, including Mainland China, Singapore and the UK, in proposing to enhance cybersecurity obligations on IT systems of those operating critical infrastructure (“CI“). While the proposed...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Robinson+Cole Data Privacy + Security Insider

SharpRhino Malware Targeting IT Professionals

Information technology professionals—beware of SharpRhino—a malware variant attributed to threat actor cybercriminals associated with Hunters International. It is being reported that Hunters International is the “10th most...more

Robinson+Cole Data Privacy + Security Insider

Scattered Spider Using RansomHub and Qilin Ransomware Against Victims

We previously reported on the concerning mash-up of worldwide cybercriminals, known as Scattered Spider, working together to attack victims. New reports from Microsoft and others indicate that in the second quarter of...more

The Volkov Law Group

SEC Suffers Major Blow in Securities Fraud Case Against SolarWinds

The Volkov Law Group on

A New Your federal district judge handed down a significant decision dismissing much of the SEC’s securities fraud enforcement action against SolarWinds arising from its claims relating to SolarWinds’ cybersecurity policies,...more

Robinson+Cole Data Privacy + Security Insider

CISA Warns of Three New Vulnerabilities Actively Exploited by Threat Actors

On July 17, 2024, the Cybersecurity & Infrastructure Security Agency (CISA) issued an Alert adding three vulnerabilities to its Known Vulnerabilities Catalog. ...more

Troutman Pepper

Preserving Forensic Artifacts Following Incident Detection - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

Robinson+Cole Data Privacy + Security Insider

TeamViewer Attacked by Russian-Based Cybercriminals

TeamViewer, which provides remote connectivity products and services, announced that it detected a cybersecurity event on its internal IT system on June 26, 2024. TeamViewer stated that it did not affect the TeamViewer...more

Ballard Spahr LLP

2024 HIPAA Developments

Ballard Spahr LLP on

Over the course of the past few months, the Office of Civil Rights (OCR) and the Office of the National Coordinator for Health Information Technology (ONC), both of which are divisions of the U.S. Department of Health and...more

J.S. Held

Cybercrime vs. Cybersecurity: Learning the Tactics of Criminals to Protect Your Interests

J.S. Held on

Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more

Wyrick Robbins Yates & Ponton LLP

Living in a Material World: SEC Clarifies Expectations Regarding Form 8-K Disclosure of Material Cybersecurity Incidents

Last month, the Director of the Division of Corporation Finance (“Director”) of the Securities and Exchange Commission (“SEC”) issued new guidance regarding disclosures of material cybersecurity incidents via Form 8-K under...more

Dentons

Ep. 19 - What to Do When Your Business Associate Suffers a Ransomware Attack

Dentons on

The healthcare industry remains a popular target for ransomware attacks. If you haven’t been impacted by a ransomware attack, it’s likely only a matter of time before someone you do business with or buy services from is...more

Robinson+Cole Data Privacy + Security Insider

Intercontinental Exchange Settles with SEC Over Alleged Delay in Notification of Hack

Intercontinental Exchange, Inc. (ICE), the owner of the New York Stock Exchange, has agreed to settle with the Securities and Exchange Commission (SEC) for $10 million over allegations that it failed to timely notify the SEC...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #398 – Cybersecurity Agencies Issue Guidance for Civil Society on Mitigating Cyber Threats

The Cybersecurity and Infrastructure Security Agency (CISA) and its partners recently issued helpful guidance for entities that have limited resources to address cyber threats. The guidance, entitled “Mitigating Cyber Threats...more

ArentFox Schiff

Key Takeaways from OCR’s CY22 HIPAA Reports to Congress

ArentFox Schiff on

On February 14, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued its annual reports to Congress detailing its actions to enforce the privacy, security, and breach notification...more

Patterson Belknap Webb & Tyler LLP

Recent Ransomware Attacks Highlight the Evolving Challenges in Responding to Cyber Extortion

A spate of recent ransomware attacks illustrates the increasingly difficult calculations that businesses face following the theft or encryption of their data....more

Health Care Compliance Association (HCCA)

Privacy Briefs: April 2024

The Cybersecurity and Infrastructure Agency (CISA) is seeking comment on a proposed rule to implement reporting requirements for critical infrastructure entities, including health care entities, on cyberattacks and ransomware...more

Benesch

Document Retention for Motor Carriers and Transportation Brokers

Benesch on

Transportation services providers are increasingly facing new technology-oriented threats in day-to-day business. Recent cyberattacks and the potential for serious disruption from threat actors have drawn the attention of the...more

432 Results
 / 
View per page
Page: of 18

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide