News & Analysis as of

Cyber Attacks Data Security Cybersecurity

Mayer Brown

Hong Kong Passes First Cybersecurity Legislation for Regulating Critical Infrastructures

Mayer Brown on

INTRODUCTION - The Protection of Critical Infrastructures (Computer Systems) Bill (the "Bill"), as the first law in Hong Kong to deal with cybersecurity was passed on 19 March 2025, and will come into force on 1 January 2026....more

Robinson+Cole Data Privacy + Security Insider

SharePoint Server Vulnerabilities Exploited Despite Emergency Patch

Microsoft has confirmed that vulnerabilities in its on-premises SharePoint Server installations, a network spoofing vulnerability (CVE-202549706), and a remote code execution vulnerability (CVE-2025-49704) are being actively...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 210 | Jeff Fleming of HaystackID sits down with Kaylee & Mary

In the thirty-first episode of EDRM Trusted Partner, HaystackID’s monthly podcast series, Jeff Fleming, Managing Director for our wonderful Trusted Partner, HaystackID sits down with Kaylee & Mary to talk about his journey...more

Lowenstein Sandler LLP

Active and Critical Security Concern for SharePoint

Lowenstein Sandler LLP on

On July 20, 2025, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) issued urgent warnings about new, actively exploited vulnerabilities in Microsoft SharePoint Server. These vulnerabilities, known as...more

HaystackID

Engineering Cyber Resilience: Lessons from the Tallinn Mechanism

HaystackID on

When the lights stayed on in Kyiv during a wave of missile attacks in early 2024, Ukrainian officials quietly acknowledged a second line of defense that received far less public attention than the nation’s air-defense...more

Arnall Golden Gregory LLP

OIG Audit Finds Cybersecurity Gaps at Large Northeastern Hospital

On July 11, 2025, the U.S. Department of Health and Human Services (“HHS”), Office of Inspector General (“OIG”) posted a report that announced the findings of a cybersecurity audit it conducted of a large Northeastern...more

Baker Donelson

Critical Microsoft SharePoint Vulnerability: What You Need to Know

Baker Donelson on

Microsoft has just disclosed a serious vulnerability in SharePoint (CVE-2025-53770) that allows unauthenticated attackers to remotely execute code in a SharePoint server hosted on-prem – no user interaction required....more

Cohen & Gresser LLP

Evading DOJ Crosshairs As Data Security Open Season Starts

Cohen & Gresser LLP on

The U.S. Department of Justice has added a new weapon to its enforcement arsenal, aimed at enhancing its ability to prevent foreign adversaries from accessing and exploiting government related data and sensitive personal data...more

Mitratech Holdings, Inc

5 Challenges in Incident Management (and How to Stay Resilient)

A single outage can spiral into hours of downtime, frustrated customers, and significant revenue loss across your business....more

Robinson+Cole Data Privacy + Security Insider

CISA Alert: Liteon Electric Vehicle Chargers

If you own an electric vehicle, keep an eye on cybersecurity issues that may affect your car and its accessories. You wouldn’t think that an electric vehicle charger could include a vulnerability that allows threat actors to...more

Robinson+Cole Data Privacy + Security Insider

June Sees Significant Jump in BECs

According to Cybersecurity Dive, “Americans lost $16.6 billion to cyber fraud and internet crimes last year (2024), up 33% from the previous year. Phishing, spoofing and extortion topped the list of complaints, but investment...more

Potomac Law Group, PLLC

Cybercriminals Hit Your Inbox—Now What? Recovering Funds After Business Email Compromise and Fraud Schemes

The global cyber scam industry is a multi-billion dollar racket run by crime syndicates who often operate through massive compounds known as “scam farms” in far flung locations.  On our shores, many businesses fall prey to...more

Stikeman Elliott LLP

23andMe : une faille de sécurité qui rappelle l’importance d’une gouvernance proactive en matière de protection des renseignements...

Stikeman Elliott LLP on

En 2023, une cyberattaque d’envergure a exposé les données génétiques personnelles de millions d’utilisateurs de 23andMe, une société américaine offrant des services d’analyse du code génétique aux particuliers, poussant les...more

Husch Blackwell LLP

FBI Notes Increase in Cyber Activity Targeting Operational Technology

Husch Blackwell LLP on

On June 30, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the Department of Defense Cyber Crime Center (DC3) published a...more

Morgan Lewis - Tech & Sourcing

Navigating Evolving Cyber Regulations in the United States

Cyber regulations are crucial for the protection of individuals and businesses and aid in risk minimization; failure to comply with these regulations can result in severe consequences such as financial penalties, legal...more

K2 Integrity

Social Media Day: Educating Employees On The Risks Of Social Media

K2 Integrity on

Social media is used by both organizations and employees—as a marketing tool for business, for entertainment, or for interacting with friends and family....more

Paul Hastings LLP

The Changing Cyber Threat Landscape and Lessons Learned From Data Breaches

Paul Hastings LLP on

Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of...more

Robinson+Cole Data Privacy + Security Insider

New Hires More Likely to Fall for Phishing + Social Engineering Attacks

When assessing cybersecurity risk in your organization, it is important to understand your users and their behavior. A new study by Keepnet sheds light on new hire behavior concerning phishing susceptibility. According to its...more

Paul Hastings LLP

NYDFS Urges Covered Entities to Review Security Practices Amidst World Turmoil

Paul Hastings LLP on

Citing “escalating global conflict,” the New York Department of Financial Services issued an alert on Monday, June 22, 2025, to its regulated covered entities, urging them to be vigilant against potential security threats,...more

BakerHostetler

[Podcast] 2025 DSIR Deeper Dive: Deeper Dive into the Data

BakerHostetler on

We’re back with a deeper dive into the 2025 Data Security Incident Response Report, which features insights and metrics from more than 1,250 incidents in 2024. This episode dives deeper into the data, including network...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Accelerynt, Inc.

The Headcount Trap: Why Large SOCs Often Lose Effectiveness

Accelerynt, Inc. on

Enterprises don’t have a staffing problem. They have a systems problem. In a recent engagement, we were engaged to help improve a global SOC operation. Despite having over 30 analysts on staff, the team was missing...more

HaystackID

AT&T Customer Data Resurfaces on Dark Web in Enhanced, Decrypted Format

HaystackID on

According to an AT&T spokesperson, this is not accurate. Social Security Numbers and Dates of Birth were already available in plain text in the original compromised dataset from 2024 (in separate files that could be...more

Morgan Lewis - Tech & Sourcing

NIST Releases Updated Incident Response Guidance Under Its Cybersecurity Framework

During the Biden administration, there was a push to prioritize and modernize cybersecurity responses, and the National Institute of Standards and Technology (NIST) agreed to work with the technology industry to develop a new...more

Robinson+Cole Data Privacy + Security Insider

Google Releases June Security Bulletin for Android Devices to Fix Vulnerabilities

Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more

1,277 Results
 / 
View per page
Page: of 52

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide