News & Analysis as of

Risk Management Malware

Ogletree, Deakins, Nash, Smoak & Stewart,...

Business Email Compromise Scams: What They Are, and How to Avoid Them

In an increasingly digital world, the rise in cybercrime involving email scams has become a significant threat to individuals and organizations alike. These sophisticated attacks exploit human psychology and technological...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

New York State Department of Financial Services Releases Guidance on Combating Cybersecurity Risks Associated With AI

On October 16, 2024, the New York State Department of Financial Services (NYDFS) released guidance highlighting the cybersecurity risks associated with artificial intelligence (AI) and how covered entities regulated by NYDFS...more

Foley & Lardner LLP

Cybersecurity in the Age of Industry 4.0 - Part 1

Foley & Lardner LLP on

As the manufacturing sector continues to embrace the hyper-connected era of Smart Manufacturing, known as Industry 4.0, more and more organizations are integrating advanced automation, artificial intelligence (AI), the...more

Ankura

Proactive Defense: A Step-by-Step Guide To Assessing Your Organization's Cyber Risk

Ankura on

In the continuously evolving landscape of cyber threats, organizations must be proactive in identifying and mitigating potential risks to their digital assets and operations. A critical step in building cyber resilience is...more

Woodruff Sawyer

The Growing Cyber Risks in Fintech and How to Mitigate Them

Woodruff Sawyer on

The fintech revolution has reshaped the financial world, creating new opportunities to borrow, save, transact, and invest like never before. With no signs of slowing, fintech revenues are projected to grow sixfold from $245...more

HaystackID

Alarming Insurance Gaps and Soaring Breach Rates Call for a United Front in Cybersecurity

HaystackID on

Editor's Note: The convergence of CYE's and Surfshark's analyses reveals a critical juncture in the fight against cyber threats. With the U.S. leading global data breaches and businesses facing significant insurance coverage...more

Mintz - Antitrust Viewpoints

Treasury Department Warns Financial Institutions to Prepare for AI-Age Fraud — AI: The Washington Report

Pursuant to President Biden’s October 2023 AI executive order, the US Department of Treasury (Treasury) released a report on cybersecurity risks in the financial services sector in March 2024. While recognizing the...more

Bradley Arant Boult Cummings LLP

Evolution of the Chinese Hacking Threat: Risks for Government and Industry

On May 24, 2023, Microsoft announced the detection of a direct threat to critical infrastructure organizations in Guam and elsewhere in the United States. The alert attributed observed malicious activity to a state-sponsored...more

Patterson Belknap Webb & Tyler LLP

House Subcommittees Hold Hearing on Combating Ransomware Attacks

In late September, two subcommittees of the U.S. House of Representatives held a joint hearing on responding to ransomware attacks. The hearing—held by the Subcommittee on Cybersecurity, Information Technology, and Government...more

Robinson+Cole Data Privacy + Security Insider

HC3 Warns Healthcare Organizations of NoEscape Ransomware

On October 12, 2023, the Health Sector Cybersecurity Coordination Center (HC3) issued an Alert to the healthcare industry about a “new threat actor and ransomware,” NoEscape, which is threatening health care organizations....more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

Robinson+Cole Data Privacy + Security Insider

FIN7/Carbon Spider Attacks Veeam Backup Servers

Researchers at WithSecure cybersecurity firm have seen two malware attacks against Veeam Backup and Replication servers believed to be initiated by cybercrime group FIN7, also known as Carbon Spider, which has also been...more

Mitratech Holdings, Inc

Cyber Resilience: From Third-Party to Cyber Risk Management

Mitratech Holdings, Inc on

It is safe to say that Board members, CEOs and other key decision-makers everywhere, recognize the significance of cyber risk management and the heavy investment that initiatives in this field represent. Cyber risks in the...more

Woods Rogers

Ransomware – What it is, how to avoid it, and what to do if you are infected.

Woods Rogers on

Ransomware has been one of the top cyber threats in the past several years. Thanks to the WannaCry attack of 2017 and others, most people have heard of this type of cyber threat, but many do not know how it works, how to...more

Robinson+Cole Data Privacy + Security Insider

Hackers Experimenting with Deploying Destructive Malware

It’s a cold, hard fact that hackers don’t really care about their victims or their victims’ data or business. They are greedy, evil human beings that just want the money....more

King & Spalding

Delaware Chancery Court Decision Dismissing Claims Against SolarWinds Corporation's Board Illuminates Contours of Director...

King & Spalding on

The Delaware Chancery Court’s recent opinion in Construction Industry Laborers Pension Fund et al. v. Bingle et al., C.A. No. 2021-0494-SG (Del. Ch.) dismissing claims asserted against members of SolarWinds Corporation’s...more

StoneTurn

Cyber Threat Actors 2022 – Understanding the Drivers of Crisis

StoneTurn on

Moving towards more predictive postures, leveraging multiple sources of information such as cyber threat, business, and geopolitical intelligence, allow organizations to gain a better handle on crises before they occur. By...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #338 – Be Aware of Apps Infected with Malware

Like all technology, mobile apps can be infected with malicious code, or malware, that is intended to gain access to your mobile phone when you download the app. Although app stores try their best to not allow malicious apps...more

Burr & Forman

FINRA Warns Against Russian-Sponsored Cyber Attacks

Burr & Forman on

In its April 27 Weekly Update, the Financial Industry Regulatory Authority’s (“FINRA”) National Cause and Financial Crimes Detection program urged FINRA member firms to review a cyber-threat alert arising from Russia’s...more

Woods Rogers

How to Protect Your Business Against Ransomware

Woods Rogers on

Within the past decade, technology has evolved extremely rapidly, which can be both beneficial and difficult for business owners to navigate. Just as common technology like laptops and mobile banking has evolved, so have the...more

BakerHostetler

Impact of the Ukraine/Russia Conflict on Cybersecurity in the United States

BakerHostetler on

On Feb. 24, 2022, Russia launched a large-scale military incursion into Ukraine. By all accounts, the Russian offensive attacked on multiple fronts, including against Ukraine’s network computers and communication systems. The...more

Pillsbury - Internet & Social Media Law Blog

The Many-Headed Threat of Ransomware

It may seem that the very term “ransomware” wasted little time going from “newish-sounding threat” to expected, constant presence in the news and IT meetings alike. But, of course, it’s ultimately just a modern word for one...more

Lighthouse

Cybersecurity Defense: Recommendations for Companies Impacted by the Biden Administration Executive Order

Lighthouse on

As summarized in the first installment of our two-part blog series, President Biden recently issued a sweeping Executive Order aimed at improving the nation’s cybersecurity defense. The Order is a reaction to increased...more

Epstein Becker & Green

A Guide to Practical, Regulatory, and Reputational Risk Management

Ransomware Particularly Inflicts Health Care and Life Sciences Organizations - Ransomware is a malicious cyber threat vector that employs encryption malware to prevent users from accessing their systems and data unless...more

Opportune LLP

Cyberattack Shuts Major US Fuel Pipeline: Why Colonial Pipeline & Why Now?

Opportune LLP on

Find out why the cyberattack on Colonial Pipeline will have broad implications on how the energy industry defends and responds to future incidents....more

129 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide