News & Analysis as of

Cybersecurity Cyber Attacks

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Clark Hill PLC

Right To Know - June 2025, Vol. 30

Clark Hill PLC on

Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. State Action: North Dakota Passes Law...more

BakerHostetler

[Podcast] 2025 DSIR Deeper Dive: Deeper Dive into the Data

BakerHostetler on

We’re back with a deeper dive into the 2025 Data Security Incident Response Report, which features insights and metrics from more than 1,250 incidents in 2024. This episode dives deeper into the data, including network...more

McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Jackson Lewis P.C.

The Growing Cyber Risks from AI — and How Organizations Can Fight Back

Jackson Lewis P.C. on

Artificial Intelligence (AI) is transforming businesses—automating tasks, powering analytics, and reshaping customer interactions. But like any powerful tool, AI is a double-edged sword. While some adopt AI for protection,...more

Hogan Lovells

Australia mandates first-of-its-kind reporting of ransomware payments

Hogan Lovells on

Australia has implemented a first-of-its kind requirement for eligible businesses to report ransomware payments. From 30 May 2025, eligible businesses that make a payment in response to a cyber security incident, or become...more

Accelerynt, Inc.

The Headcount Trap: Why Large SOCs Often Lose Effectiveness

Accelerynt, Inc. on

Enterprises don’t have a staffing problem. They have a systems problem. In a recent engagement, we were engaged to help improve a global SOC operation. Despite having over 30 analysts on staff, the team was missing...more

HaystackID

AT&T Customer Data Resurfaces on Dark Web in Enhanced, Decrypted Format

HaystackID on

According to an AT&T spokesperson, this is not accurate. Social Security Numbers and Dates of Birth were already available in plain text in the original compromised dataset from 2024 (in separate files that could be...more

Fenwick & West LLP

NYTW 2025: Building Smarter Cyber Strategies with Government, Founders, and Investors

Fenwick & West LLP on

At New York Tech Week 2025, cybersecurity took the spotlight. Fenwick partner Jon Lenzner sat down with Bryan Vorndran—former assistant director of the FBI’s Cyber Division—to unpack what early-stage companies, investors, and...more

BakerHostetler

Australia’s New Ransomware Payment Reporting Law Takes Effect, Covering Both Critical Infrastructure and Other Entities

BakerHostetler on

On May 30, the ransomware payment reporting requirements of Australia’s Cyber Security Act 2024 (CSA) took effect. The new requirement applies to a broad range of entities and cyber security incidents, requiring reporting...more

Morgan Lewis - Tech & Sourcing

NIST Releases Updated Incident Response Guidance Under Its Cybersecurity Framework

During the Biden administration, there was a push to prioritize and modernize cybersecurity responses, and the National Institute of Standards and Technology (NIST) agreed to work with the technology industry to develop a new...more

Farella Braun + Martel LLP

Which Party Loses Out When Settlement Funds Are Wired to a “Spoofer” and Not Plaintiff?

Answer: the “party in the best position to prevent the fraud.” In the digital age, where cyber-attacks are becoming more sophisticated, all legal professionals should take heed of the recent decision in Thomas v. Corbyn...more

A&O Shearman

The cyber-nuclear nexus: safeguarding clean energy

A&O Shearman on

Politicians’ and tech giants’ embrace of nuclear energy to power AI heightens the urgency to protect critical infrastructure from cyber threats....more

Robinson+Cole Data Privacy + Security Insider

Google Releases June Security Bulletin for Android Devices to Fix Vulnerabilities

Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more

Womble Bond Dickinson

Overseas employees and contractors pose increased risks of data breach

Womble Bond Dickinson on

As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees.  Many large companies outsource customer services to India and other low-cost providers to take...more

Ward and Smith, P.A.

Cyber Liability Insurance: Is It Worth It?

Ward and Smith, P.A. on

In connection with the increase in the number of incidents and attacks, the scope and impact of the incidents and attacks are also growing. With the rise in frequency and impact of cybersecurity incidents and cybercrimes,...more

Hogan Lovells

Threat actors increasingly introducing malicious code into open source packages

Hogan Lovells on

The risks associated with leveraging open source libraries, and the review needed, are increasing. In the first half of 2025, cybersecurity researchers observed a sharp rise in the incidence of malicious code embedded in...more

Ropes & Gray LLP

Glow Up or Sell Out? Opportunities and Risks in the Consumer Health and Beauty Sector

Ropes & Gray LLP on

The global M&A market is forever evolving, and nowhere is this truer than in beauty, which has recently seen a notable surge in growth and popularity. McKinsey forecasts global beauty sales to grow six percent annually until...more

Pagefreezer

What Is Swatting? And How Can You Prevent It?

Pagefreezer on

What happens when online harassment crosses the digital divide? For a decade, the practice of swatting has been on the rise, and featured in news stories the world over.  Swatting is a weaponized form of harassment that turns...more

Vinson & Elkins LLP

CISA Sounds the Alarm on Threats to Operational Technology

Vinson & Elkins LLP on

Earlier this month the Cybersecurity and Infrastructure Security Agency (“CISA”), the U.S. federal agency under the Department of Homeland Security (“DHS”) whose mission is to protect the nation’s critical infrastructure from...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #445 – Apple Users: Update to iOS 18.5

Never underestimate an operating system update from any mobile phone manufacturer. This week, Apple issued iOS 18.5 which provides enhancements to the user experience, but also fixes bugs and flaws....more

Robinson+Cole Data Privacy + Security Insider

U.S. Retailers Bracing for Scattered Spider Attacks

Google sent out a warning that the cybercriminal group Scattered Spider is targeting U.S.-based retailers. Scattered Spider is believed to have been responsible for the recent attack on Marks & Spencer in the U.K. A security...more

BakerHostetler

DSIR: Deeper Dive into the Data

BakerHostetler on

Every year, BakerHostetler collects, analyzes and compares key metrics on the incident response matters we handled in the prior year. The Data Security Incident Response (DSIR) Report presents key findings and trends, along...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

Bennett Jones LLP

Q&A on Cybersecurity and Family Enterprises: How to Navigate the Digital Frontier

Bennett Jones LLP on

In an era where digital threats are more sophisticated than ever, cybersecurity has become a pressing concern for family enterprises. These businesses are attractive targets for cyberattacks and need to balance the critical...more

3,962 Results
 / 
View per page
Page: of 159

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide