News & Analysis as of

Cyber Attacks Cybersecurity

Mayer Brown

Hong Kong Passes First Cybersecurity Legislation for Regulating Critical Infrastructures

Mayer Brown on

INTRODUCTION - The Protection of Critical Infrastructures (Computer Systems) Bill (the "Bill"), as the first law in Hong Kong to deal with cybersecurity was passed on 19 March 2025, and will come into force on 1 January 2026....more

Robinson+Cole Data Privacy + Security Insider

SharePoint Server Vulnerabilities Exploited Despite Emergency Patch

Microsoft has confirmed that vulnerabilities in its on-premises SharePoint Server installations, a network spoofing vulnerability (CVE-202549706), and a remote code execution vulnerability (CVE-2025-49704) are being actively...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 210 | Jeff Fleming of HaystackID sits down with Kaylee & Mary

In the thirty-first episode of EDRM Trusted Partner, HaystackID’s monthly podcast series, Jeff Fleming, Managing Director for our wonderful Trusted Partner, HaystackID sits down with Kaylee & Mary to talk about his journey...more

Lowenstein Sandler LLP

Active and Critical Security Concern for SharePoint

Lowenstein Sandler LLP on

On July 20, 2025, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) issued urgent warnings about new, actively exploited vulnerabilities in Microsoft SharePoint Server. These vulnerabilities, known as...more

HaystackID

Engineering Cyber Resilience: Lessons from the Tallinn Mechanism

HaystackID on

When the lights stayed on in Kyiv during a wave of missile attacks in early 2024, Ukrainian officials quietly acknowledged a second line of defense that received far less public attention than the nation’s air-defense...more

Proskauer - California Employment Law

Defendant Bore Risk Of Loss Due To Fraud When It Wired Settlement Proceeds To Imposter

Thomas v. Corbyn Restaurant Dev. Corp., 111 Cal. App. 5th 439 (2025) - The parties involved in this personal injury lawsuit settled the case for $475,000. An unknown third-party purporting to be plaintiff’s counsel sent...more

Arnall Golden Gregory LLP

OIG Audit Finds Cybersecurity Gaps at Large Northeastern Hospital

On July 11, 2025, the U.S. Department of Health and Human Services (“HHS”), Office of Inspector General (“OIG”) posted a report that announced the findings of a cybersecurity audit it conducted of a large Northeastern...more

K2 Integrity

Navigating the Cybersecurity Minefield: Why Midsize Companies Need On-Demand Expertise in the Age of AI and Ransomware

K2 Integrity on

In today’s always-online world, cyber resilience is a business imperative. For midsize and fast-growing small companies, the stakes have never been higher. The convergence of artificial intelligence (AI), increasingly...more

Baker Donelson

Critical Microsoft SharePoint Vulnerability: What You Need to Know

Baker Donelson on

Microsoft has just disclosed a serious vulnerability in SharePoint (CVE-2025-53770) that allows unauthenticated attackers to remotely execute code in a SharePoint server hosted on-prem – no user interaction required....more

Cohen & Gresser LLP

Evading DOJ Crosshairs As Data Security Open Season Starts

Cohen & Gresser LLP on

The U.S. Department of Justice has added a new weapon to its enforcement arsenal, aimed at enhancing its ability to prevent foreign adversaries from accessing and exploiting government related data and sensitive personal data...more

Mitratech Holdings, Inc

5 Challenges in Incident Management (and How to Stay Resilient)

A single outage can spiral into hours of downtime, frustrated customers, and significant revenue loss across your business....more

A&O Shearman

PRA thematic findings from the 2024 Cyber Stress Test

A&O Shearman on

The Bank of England and the Prudential Regulation Authority (PRA) have released a letter to PRA-regulated firms and relevant financial market infrastructure (FMIs) outlining the thematic findings from the 2024 Cyber Stress...more

Robinson+Cole Data Privacy + Security Insider

CISA Alert: Liteon Electric Vehicle Chargers

If you own an electric vehicle, keep an eye on cybersecurity issues that may affect your car and its accessories. You wouldn’t think that an electric vehicle charger could include a vulnerability that allows threat actors to...more

McCarter & English Blog: Government Contracts...

FAR 2.0 Part 39 in Arcade Mode—How Federal IT Acquisition Just Hit Reset

For those who grew up gripping a joystick and dodging alien fire in Defender, riding ostriches through floating platforms in Joust, or crossing a hectic freeway in Frogger, winning wasn’t about memorizing rules; it was about...more

Holland & Knight LLP

Settlement Alert: The Dust Settles in SEC's Cybersecurity Lawsuit Against SolarWinds

Holland & Knight LLP on

In a significant turn of events on July 2, 2025, the SEC, SolarWinds Corp. and its Chief Information Security Officer (CISO), Timothy Brown, announced through a joint letter to the U.S. District Court for the Southern...more

Health Care Compliance Association (HCCA)

Federal Judge in Change Class Actions Juggling 90 Cases, Found ‘Misconduct’ by UnitedHealth

In the 18 months since the Change Healthcare breach occurred, class action suits—filed by both patients and providers—continue to multiply, with no resolution yet in sight. In fact, in late June, the Minnesota judge presiding...more

Phelps Dunbar

How Can Companies Guard Against Rising Nation-State Cyber Threats?

Phelps Dunbar on

The messages from government agencies and cybersecurity leaders at the end of June were clear – nation-state-sponsored cybersecurity threats are on the rise. Pro-Iranian “hacktivists” are targeting U.S. infrastructure and...more

Accelerynt, Inc.

Speed Without Control: When Automation Fails to Deliver

Accelerynt, Inc. on

Why automation without operational alignment increases risk, not agility - Automation in cybersecurity is everywhere. Alerts are routed instantly. Playbooks execute in seconds. Credentials are revoked, emails quarantined,...more

Pillsbury Winthrop Shaw Pittman LLP

Texas Cyber Command: New Authority for Statewide Cybersecurity Coordination

While the Command’s authority applies only to governmental bodies, its creation signals a shift in how the state organizes its cybersecurity posture. This new law may have practical implications for vendors, contractors and...more

Robinson+Cole Data Privacy + Security Insider

June Sees Significant Jump in BECs

According to Cybersecurity Dive, “Americans lost $16.6 billion to cyber fraud and internet crimes last year (2024), up 33% from the previous year. Phishing, spoofing and extortion topped the list of complaints, but investment...more

Alston & Bird

Inside the SK Telecom Data Breach: What Happened and What Companies Can Learn

Alston & Bird on

In April 2025, SK Telecom—South Korea’s largest mobile carrier—formally notified regulators of a significant data breach that compromised sensitive SIM card data belonging to nearly 27 million users. Following an...more

Alston & Bird

New York Department of Health Issues Urgent Cybersecurity Warning Following U.S. Strikes on Iranian Nuclear Facilities

Alston & Bird on

The New York State Department of Health has issued an urgent cybersecurity advisory (the Advisory) warning of increased threat levels and a higher likelihood of cybersecurity attacks from Iranian state-backed actors following...more

Robinson+Cole Data Privacy + Security Insider

What to Know About SafePay Ransomware Group

The SafePay ransomware group has been active since fall 2024 and has increased its activity this spring and summer. According to NCC Group, SafePay hit the most victims of any threat actor in May 2025—it is linked to 248...more

Potomac Law Group, PLLC

Cybercriminals Hit Your Inbox—Now What? Recovering Funds After Business Email Compromise and Fraud Schemes

The global cyber scam industry is a multi-billion dollar racket run by crime syndicates who often operate through massive compounds known as “scam farms” in far flung locations.  On our shores, many businesses fall prey to...more

Bradley Arant Boult Cummings LLP

Defining Artificial Intelligence for Cyber and Data Privacy Insurance

A small but growing number of cyber insurers are incorporating language into their policies that specifically addresses risks from artificial intelligence (AI). The June 2025 issue of The Betterley Report’s Cyber/Privacy...more

3,997 Results
 / 
View per page
Page: of 160

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide