News & Analysis as of

Phishing Scams Data Protection Cyber Crimes

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #416 – Impersonation is the Most Prolific Phishing Tactic in 2024

A new report published by the software company Egress this month, Phishing Threat Trends Report, is a must-read. It outlines the proliferation of phishing toolkits on the dark web (that basically allows any Tom, Dick, and...more

J.S. Held

Benefits of a vCISO in the Age of AI-Driven Cyberattacks

J.S. Held on

Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Robinson+Cole Data Privacy + Security Insider

CrowdStrike Customers Targeted by Threat Actors Using Fake Help Websites

If you are a customer of CrowdStrike, you are working on recovering from the outage that occurred on July 19, 2024. As if that isn’t enough disruption, CrowdStrike is warning customers that threat actors are taking advantage...more

Troutman Pepper

Preserving Forensic Artifacts Following Incident Detection - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

K2 Integrity

Navigating Work and Travel: Essential Actions for Companies Looking to Keep Their Data Secure

K2 Integrity on

Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more

Butler Snow LLP

Cybersecurity: What Businesses Need to Know

Butler Snow LLP on

Cybersecurity is a top concern for all industries, particularly for the pharmaceutical and medical device industries. These industries hold some of the most sensitive data and highly valuable technology, making them prime...more

Ankura

The Breaches and Threat Actors that Defined 2022

Ankura on

In 2022, threat actors and hacker groups made their mark on the digital world by causing unprecedented data breaches that left organizations of all sizes and sectors vulnerable. Even with improved cybersecurity measures in...more

Dechert LLP

Dechert Cyber Bits - Issue 30

Dechert LLP on

Cybersecurity Alert: Silicon Valley Bank and Signature Bank Fallout - Undoubtedly, cyber criminals are out in full force with phishing links and other scams trying to capitalize on the disruption and panic that many...more

Katten Muchin Rosenman LLP

5 Tips for Reducing Identity Theft Risk

Identity theft and cybercrime are now a multi-billion dollar industry causing severe harm to the individuals affected and the institutions we trust. In recognition of this unfortunate truth and Identity Theft Awareness Week,...more

Sunstein LLP

Phishing Attacks: The FTC Steps Up Its Standards

Sunstein LLP on

Phishing schemes encompass fraudulent emails, text messages, phone calls, or web sites designed to manipulate people into downloading malware, sharing sensitive information, or otherwise exposing themselves or their...more

Ankura

Malware, Spyware, and Ransomware: How They Differ and How to Respond

Ankura on

Malware is an umbrella term for all malicious software. What is malware? Malware is an umbrella term that includes all types of malicious software, including viruses, worms, Trojans, ransomware, and spyware. These...more

Robinson+Cole Data Privacy + Security Insider

Verizon’s 2022 Data Breach Investigations Report: A Must Read

I love Verizon’s annual Data Breach Investigations Report (DBIR). I have pored over its content every year since its inception in 2008. Just goes to show how long I have been working on data breaches. It is always written in...more

Goldberg Segalla

Death by a Thousand Paper Cuts: The Scourge That Is Business Email Compromise

Goldberg Segalla on

In June 2014, the CEO of Omaha-based Scoular Company sent a series of emails to his company’s controller to let him know that the company was in negotiations to buy a Chinese company. The emails highlighted the sensitivity of...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 22, Number 3. Privacy Briefs: March 2022

Report on Patient Privacy 22, no. 3 (March, 2022) - HHS said in early March that it was not aware of any specific threat to U.S. health care organizations stemming from the Russian invasion of Ukraine. “However, in the...more

Robinson+Cole Data Privacy + Security Insider

SolarWinds Hackers Focus on Downstream Vendors as Next Victims

In a blog post entitled “New activity from Russian actor Nobelium,” Microsoft’s V.P. of Customer Security & Trust Tom Burt discussed a recent alert issued by the Microsoft Threat Intelligence Center (MSTIC) regarding the...more

Clark Hill PLC

October Is National Cybersecurity Awareness Month – Be Cyber Alert and Guard Against Phishing

Clark Hill PLC on

This month is the 18th Annual National Cybersecurity Awareness Month in the United States, sponsored by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance. This year’s theme...more

Robinson+Cole Data Privacy + Security Insider

FBI, CISA + NSA Issue Conti Ransomware Advisory

On September 22, 2021, the Federal Bureau of Investigations (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) issued a cybersecurity advisory alerting companies to the...more

Fisher Phillips

In the World of Ransomware Attacks, Déjà Vu Seems to be the New Normal for Employers

Fisher Phillips on

Pick the date and news publication. After a few flips of the pages (or a scroll of the mouse), you’ll no doubt find an article about “ABC Company” reeling from a ransomware attack. This proliferation of cyberattacks is all...more

Esquire Deposition Solutions, LLC

Staying Secure in the New Hybrid Workplace

Most observers believe that the legal profession is rapidly moving toward so-called “hybrid workplaces,” a term office managers use to describe a mixed-work environment that spans brick-and-mortar law offices, home offices,...more

Robinson+Cole Data Privacy + Security Insider

FBI Warns of Hive Ransomware Following Attack Against Hospital System

On August 25, 2021, the FBI issued a Flash Alert to warn companies, especially in the health care industry, about the proliferation of attacks by threat actors using Hive ransomware....more

Jones Day

New York Department of Financial Services Announces New Guidance on Ransomware Prevention

Jones Day on

On June 30, 2021, the New York Department of Financial Services ("NYDFS") identified key cybersecurity measures to prevent and prepare for ransomware attacks. ...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #290 – 700 Million LinkedIn Users’ Data for Sale on Hacker Forum

Although a security researcher has confirmed that LinkedIn users’ data, including full names, gender, email addresses, telephone numbers, and industry information is for sale on RaidForums by a hacker self-dubbed “GOD User...more

Burr & Forman

Business Exposure to Internet Crime

Burr & Forman on

Each year, the Internet Crime Complaint Center (“IC3”) of the Federal Bureau of Investigation publishes its Internet Crime Report.  The IC3’s 2020 Internet Crime Report includes startling information about the continuing...more

Shumaker, Loop & Kendrick, LLP

Client Alert: The Risk from Phishing

We are all well aware of the risks that cyber-crime presents to businesses now. On a weekly basis, we see stories about virus attacks, hacks, and ransomware. But, how do we avoid being the victim?...more

67 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide