News & Analysis as of

Cyber Crimes

Williams Mullen

Email Payment Scams: Assume the Worst

Williams Mullen on

Cybercriminals will continue intercepting electronic fund transfers (EFTs) until EFT participants slow down, read, and ask questions, particularly in response to emails requesting last-minute changes to payment methods (e.g.,...more

Awatif Mohammad Shoqi Advocates & Legal...

Legal Repercussions Of Posting Insults On Social Media

With the rise in social media usage and the comfort with which people are expressing their thoughts and views on social media, many users do not realize the real-life implications of their online activities. Time and again,...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

Troutman Pepper Locke

Pennsylvania Enacts New Digital Forgery Law

Troutman Pepper Locke on

On July 7, 2025, Pennsylvania Governor Josh Shapiro enacted a new Digital Forgery Law by signing SB 649 into law, which will take effect in 60 days. SB 649 creates “new criminal penalties for anyone who uses artificial...more

Awatif Mohammad Shoqi Advocates & Legal...

Legal Consequences Under the UAE's Cybercrimes Law.

A nation's reputation is crucial, and the UAE has implemented strong legislation to address these issues under the Federal Law No. (34) of 2021 (cybercrimes law). These laws specifically target online activities concerning...more

DLA Piper

Italy: Ransomware and Crime – A Proposal to Tackle Cyber Extortion in Italy

DLA Piper on

The potential criminalization of activities associated with ransomware cyber attacks, including ransom payments by victims, has long been an unresolved issue. This concern has now led Italy to introduce a ground breaking...more

McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

HaystackID

Click. Notify. Exfiltrate. Why the Most Damaging Threats Start in Your Inbox

HaystackID on

Editor’s Note: Email remains the most reliable and comprehensive source of evidence in digital investigations, often providing insights that other platforms cannot. As threats become more sophisticated and data volumes grow,...more

Pagefreezer

What Is Swatting? And How Can You Prevent It?

Pagefreezer on

What happens when online harassment crosses the digital divide? For a decade, the practice of swatting has been on the rise, and featured in news stories the world over.  Swatting is a weaponized form of harassment that turns...more

KPMG Board Leadership Center (BLC)

Midyear observations on the 2025 board agenda

Disruption, volatility, and uncertainty aren’t new operating conditions by any means. But the assumptions that have long driven corporate thinking—the role of government, geopolitical norms, and consistency in US policies as...more

Robinson+Cole Data Privacy + Security Insider

College Student Behind Cyber Extortions

The U.S. Attorney’s Office for the District of Massachusetts has charged a student at Assumption University with hacking into two U.S.-based companies’ systems and demanding a ransom....more

Awatif Mohammad Shoqi Advocates & Legal...

Learn more about privacy violations and secret disclosure under the UAE.

In today's world, violations of individual privacy and secret disclosure are a serious problem. It may be eavesdropping, interception, recording, and the spreading of personal information without the consent of the other...more

Fisher Phillips

Court Confirms Kentucky Consumer Protection Act Doesn’t Cover Employees, But Legal Risks Remain: 5 Steps for Employers to Avoid...

Fisher Phillips on

A federal district court recently found that employees aren’t protected by Kentucky’s consumer protection law because they don’t qualify as consumers, handing a solid win to employers. The April 21 decision in Viviali v. One...more

Fisher Phillips

North Korean Scammers are Posing as IT Freelancers: Here’s How You Can Protect Your Business

Fisher Phillips on

Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more

Fisher Phillips

Cyber Threat Escalates: PowerSchool Cybercriminal Returns to Extort Individual Schools Months After Massive Data Breach...

Fisher Phillips on

When PowerSchool announced in January that it fell victim to a massive data breach at the end of 2024, it assured the thousands of schools and over 50 million students who use the education software that the matter had been...more

Woodruff Sawyer

Fiduciary Duty in the Digital Age: Cybersecurity Best Practices for ERISA Plans

Woodruff Sawyer on

Cybercriminals look for two things when seeking a victim—access and opportunity. ERISA retirement plans offer both. Cybercriminals exploit weaknesses in systems, software, or human behavior to find opportunities for easy...more

Ballard Spahr LLP

Navigating FinCEN’s Actions on Huione Group: Strengthening Defenses Against Money Laundering

Ballard Spahr LLP on

On May 1, 2025, the Financial Crimes Enforcement Network (FinCEN) released a Notice of Proposed Rulemaking (NPRM) regarding the Huione Group, a foreign financial institution located in Cambodia. This proposal, enacted under...more

StoneTurn

The Evolution of Cybercrime: How to Stay Safe from AI-Driven Fraud

StoneTurn on

A recent article in The Wall Street Journal highlights a case that is sadly all too familiar – a family member is in distress, and you must wire them money to help save them. Of course, as the article reveals, the family...more

Ice Miller

As the Department of Justice Affirms and Advances Its Cyber-Fraud Initiative, Government Contractors Should Take Steps to Ensure...

Ice Miller on

While some areas of white-collar enforcement have been deprioritized by the Trump Administration, the Department of Justice (DOJ) remains committed to its Civil Cyber-Fraud Initiative as demonstrated by two recent False...more

Carlton Fields

No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion

Carlton Fields on

On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more

Troutman Pepper Locke

Fourth Circuit Holds UCC Article 4A Requires Beneficiary Bank’s Actual Knowledge for Wire Misdescription Liability in Business...

Troutman Pepper Locke on

On March 26, the U.S. Court of Appeals for the Fourth Circuit reversed a district court’s decision holding a credit union liable for a wire transfer in a business email compromise scam case where the credit union lacked...more

Troutman Pepper Locke

Need for Enhanced Cybersecurity in Public Finance — Cyberthieves Steal Bond Proceeds

Troutman Pepper Locke on

Recent events highlight the need for enhanced cybersecurity protocols in government offices across the U.S. In late November 2024, the Township of White Lake in Michigan, intended to issue approximately $29 million in general...more

Frost Brown Todd

Managing Data Security and Privacy Risks in Enterprise AI

Frost Brown Todd on

Artificial intelligence (AI), particularly generative AI, thrives on vast amounts of data, fueling AI capabilities, insights, and predictions. But with this reliance on data comes potential privacy and security risks. And...more

Kohrman Jackson & Krantz LLP

Cleveland Municipal Court Hit by Cyber Attack

Cleveland Municipal Court has been shut down the past two weeks as it grapples with a cyber incident. The nature and scope of this incident is not yet publicly known, but it is reasonable to suggest that the Court may have...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

1,778 Results
 / 
View per page
Page: of 72

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide