News & Analysis as of

Cyber Attacks

Alston & Bird

Microsoft Announces Two New On-Premises SharePoint Vulnerabilities

Alston & Bird on

Introduction - On July 19, 2025, Microsoft announced two new vulnerabilities that are actively being exploited (CVE-2025-49704 and CVE-2025-49706) and that relate to on-premises Microsoft SharePoint instances that are exposed...more

Womble Bond Dickinson

The Cybersecurity and Infrastructure Security Agency (CISA) Agrees to Release Report detailing Telecom Infrastructure...

Womble Bond Dickinson on

The Cybersecurity and Infrastructure Security Agency (CISA) has agreed to make public a report from 2022 about US telecommunications networks' flawed security practices which relate to the Salt Typhoon attacks experienced by...more

Robinson+Cole Data Privacy + Security Insider

CISA + Partners Release Advisory on Scattered Spider

On July 29, 2025, the Cybersecurity & Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation, Canadian Centre for Cyber Security, Royal Canadian Mounted Police, the Australian Cyber Security...more

Mayer Brown

Reducing Legal Risks From Ransomware Attacks: Lessons from Scattered Spider

Mayer Brown on

Leading businesses continue to suffer cyber attacks at the hands of sophisticated ransomware groups. For example, the threat group “Scattered Spider” (also known as UNC3944, Octo Tempest, 0ktapus) is once again making...more

Husch Blackwell LLP

The Coast Guard’s Maritime Cybersecurity Rule Takes Effect

Husch Blackwell LLP on

Key point: The US Coast Guard’s new cybersecurity rule will transform the security standards and reporting requirements for vessels and marine facilities nationwide over the next three years. On July 16, 2025, the US Coast...more

Carlton Fields

No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats

Carlton Fields on

On this episode, hosts Jack Clabby of Carlton Fields and Kayley Melton, executive director of operations at the Cognitive Security Institute, sit down with Kurt Sanger — a seasoned cyber law leader and former deputy general...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

Mayer Brown

Hong Kong Passes First Cybersecurity Legislation for Regulating Critical Infrastructures

Mayer Brown on

INTRODUCTION - The Protection of Critical Infrastructures (Computer Systems) Bill (the "Bill"), as the first law in Hong Kong to deal with cybersecurity was passed on 19 March 2025, and will come into force on 1 January 2026....more

Robinson+Cole Data Privacy + Security Insider

SharePoint Server Vulnerabilities Exploited Despite Emergency Patch

Microsoft has confirmed that vulnerabilities in its on-premises SharePoint Server installations, a network spoofing vulnerability (CVE-202549706), and a remote code execution vulnerability (CVE-2025-49704) are being actively...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 210 | Jeff Fleming of HaystackID sits down with Kaylee & Mary

In the thirty-first episode of EDRM Trusted Partner, HaystackID’s monthly podcast series, Jeff Fleming, Managing Director for our wonderful Trusted Partner, HaystackID sits down with Kaylee & Mary to talk about his journey...more

Lowenstein Sandler LLP

Active and Critical Security Concern for SharePoint

Lowenstein Sandler LLP on

On July 20, 2025, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) issued urgent warnings about new, actively exploited vulnerabilities in Microsoft SharePoint Server. These vulnerabilities, known as...more

HaystackID

Engineering Cyber Resilience: Lessons from the Tallinn Mechanism

HaystackID on

When the lights stayed on in Kyiv during a wave of missile attacks in early 2024, Ukrainian officials quietly acknowledged a second line of defense that received far less public attention than the nation’s air-defense...more

Proskauer - California Employment Law

Defendant Bore Risk Of Loss Due To Fraud When It Wired Settlement Proceeds To Imposter

Thomas v. Corbyn Restaurant Dev. Corp., 111 Cal. App. 5th 439 (2025) - The parties involved in this personal injury lawsuit settled the case for $475,000. An unknown third-party purporting to be plaintiff’s counsel sent...more

Arnall Golden Gregory LLP

OIG Audit Finds Cybersecurity Gaps at Large Northeastern Hospital

On July 11, 2025, the U.S. Department of Health and Human Services (“HHS”), Office of Inspector General (“OIG”) posted a report that announced the findings of a cybersecurity audit it conducted of a large Northeastern...more

K2 Integrity

Navigating the Cybersecurity Minefield: Why Midsize Companies Need On-Demand Expertise in the Age of AI and Ransomware

K2 Integrity on

In today’s always-online world, cyber resilience is a business imperative. For midsize and fast-growing small companies, the stakes have never been higher. The convergence of artificial intelligence (AI), increasingly...more

Baker Donelson

Critical Microsoft SharePoint Vulnerability: What You Need to Know

Baker Donelson on

Microsoft has just disclosed a serious vulnerability in SharePoint (CVE-2025-53770) that allows unauthenticated attackers to remotely execute code in a SharePoint server hosted on-prem – no user interaction required....more

Cohen & Gresser LLP

Evading DOJ Crosshairs As Data Security Open Season Starts

Cohen & Gresser LLP on

The U.S. Department of Justice has added a new weapon to its enforcement arsenal, aimed at enhancing its ability to prevent foreign adversaries from accessing and exploiting government related data and sensitive personal data...more

Mitratech Holdings, Inc

5 Challenges in Incident Management (and How to Stay Resilient)

A single outage can spiral into hours of downtime, frustrated customers, and significant revenue loss across your business....more

A&O Shearman

PRA thematic findings from the 2024 Cyber Stress Test

A&O Shearman on

The Bank of England and the Prudential Regulation Authority (PRA) have released a letter to PRA-regulated firms and relevant financial market infrastructure (FMIs) outlining the thematic findings from the 2024 Cyber Stress...more

Robinson+Cole Data Privacy + Security Insider

CISA Alert: Liteon Electric Vehicle Chargers

If you own an electric vehicle, keep an eye on cybersecurity issues that may affect your car and its accessories. You wouldn’t think that an electric vehicle charger could include a vulnerability that allows threat actors to...more

McCarter & English Blog: Government Contracts...

FAR 2.0 Part 39 in Arcade Mode—How Federal IT Acquisition Just Hit Reset

For those who grew up gripping a joystick and dodging alien fire in Defender, riding ostriches through floating platforms in Joust, or crossing a hectic freeway in Frogger, winning wasn’t about memorizing rules; it was about...more

Holland & Knight LLP

Settlement Alert: The Dust Settles in SEC's Cybersecurity Lawsuit Against SolarWinds

Holland & Knight LLP on

In a significant turn of events on July 2, 2025, the SEC, SolarWinds Corp. and its Chief Information Security Officer (CISO), Timothy Brown, announced through a joint letter to the U.S. District Court for the Southern...more

Health Care Compliance Association (HCCA)

Federal Judge in Change Class Actions Juggling 90 Cases, Found ‘Misconduct’ by UnitedHealth

In the 18 months since the Change Healthcare breach occurred, class action suits—filed by both patients and providers—continue to multiply, with no resolution yet in sight. In fact, in late June, the Minnesota judge presiding...more

Phelps Dunbar

How Can Companies Guard Against Rising Nation-State Cyber Threats?

Phelps Dunbar on

The messages from government agencies and cybersecurity leaders at the end of June were clear – nation-state-sponsored cybersecurity threats are on the rise. Pro-Iranian “hacktivists” are targeting U.S. infrastructure and...more

Accelerynt, Inc.

Speed Without Control: When Automation Fails to Deliver

Accelerynt, Inc. on

Why automation without operational alignment increases risk, not agility - Automation in cybersecurity is everywhere. Alerts are routed instantly. Playbooks execute in seconds. Credentials are revoked, emails quarantined,...more

4,935 Results
 / 
View per page
Page: of 198

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide