News & Analysis as of

Data Security Fraud

Robinson+Cole Data Privacy + Security Insider

June Sees Significant Jump in BECs

According to Cybersecurity Dive, “Americans lost $16.6 billion to cyber fraud and internet crimes last year (2024), up 33% from the previous year. Phishing, spoofing and extortion topped the list of complaints, but investment...more

Clark Hill PLC

Key lessons on the False Claims Act for government contractors after Raytheon’s $8.4 million settlement

Clark Hill PLC on

Government contractors should be on high alert following the recent announcement that Raytheon Company, its parent RTX Corporation, and Nightwing Group, LLC, have agreed to pay $8.4 million to resolve allegations of violating...more

Potomac Law Group, PLLC

Cybercriminals Hit Your Inbox—Now What? Recovering Funds After Business Email Compromise and Fraud Schemes

The global cyber scam industry is a multi-billion dollar racket run by crime syndicates who often operate through massive compounds known as “scam farms” in far flung locations.  On our shores, many businesses fall prey to...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #449 – Scammers Hijacking Websites to Insert Fake Support Number

Malwarebytes recently reported that it has found scammers hijacking websites of name brands, including banks, software companies, and social media platforms to trick victims into calling a fraudulent telephone number instead...more

Awatif Mohammad Shoqi Advocates & Legal...

Legal Consequences Under the UAE's Cybercrimes Law.

A nation's reputation is crucial, and the UAE has implemented strong legislation to address these issues under the Federal Law No. (34) of 2021 (cybercrimes law). These laws specifically target online activities concerning...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

Fisher Phillips

North Korean Scammers are Posing as IT Freelancers: Here’s How You Can Protect Your Business

Fisher Phillips on

Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more

Farella Braun + Martel LLP

Employers Must Be Vigilant to Protect Against Security Risks from Fraudulent Hires

The FBI is warning employers about increasing security risks from fraudulent job applications, resulting in hackers infiltrating companies and gaining access to sensitive data. To protect against these risks, employers should...more

Eversheds Sutherland (US) LLP

Preparing for Regulation S-P and takeaways from the SEC’s session at the Incident Response Forum Masterclass 2025

On April 22, 2025, Laura D’Allaird, Chief of the SEC’s Cyber and Emerging Technologies Unit (CETU), participated in the Incident Response Forum Masterclass 2025 (Incident Response Masterclass). In the session, titled “SEC...more

Goodwin

The Impact of Trump’s Executive Order on Eliminating Information Silos

Goodwin on

Hello, everyone. My name is Allan Medina. I am a partner in Goodwin’s Washington, DC, office, with a practice focus on government investigations. I’m here with Liza Craig, who is also a partner in the DC office. We are...more

Hanzo

How to Handle Internal Investigations: Different Tactics for Different Triggers

Hanzo on

Internal investigations often start small. A complaint, a suspicious transaction, or a red flag in a routine audit. Most companies try to manage these issues internally, without specialized tools or external legal support....more

Troutman Pepper Locke

The FTC Shines Its Spotlight on the Top Text Scams of 2024

Troutman Pepper Locke on

As technology advances, so do the tactics of scammers. The Federal Trade Commission (FTC) recently released a data spotlight on the top text scams of 2024, revealing a significant increase in financial losses despite a...more

Ice Miller

As the Department of Justice Affirms and Advances Its Cyber-Fraud Initiative, Government Contractors Should Take Steps to Ensure...

Ice Miller on

While some areas of white-collar enforcement have been deprioritized by the Trump Administration, the Department of Justice (DOJ) remains committed to its Civil Cyber-Fraud Initiative as demonstrated by two recent False...more

Clark Hill PLC

Right To Know - April 2025, Vol. 28

Clark Hill PLC on

Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. ...more

K&L Gates LLP

United States: SEC’s Approach to Artificial Intelligence Begins to Take Shape

K&L Gates LLP on

On 27 March 2025, the US Securities and Exchange Commission (SEC) hosted a roundtable on Artificial Intelligence (AI) in the financial industry that was designed to solicit feedback on the risks, benefits and governance of...more

Robinson+Cole Data Privacy + Security Insider

Insider Threats: Potential Signs and Security Tips

In recent news, New York’s Stram Center for Integrative Medicine reported a security incident involving an employee misusing a patient’s payment card information. According to a breach report filed with the U.S. Department of...more

Orrick, Herrington & Sutcliffe LLP

Managing Fraud Risk in Consumer Wires

As anticipated, 2025 is already shaping up to be a busy year in consumer financial services, with a federal district court expanding the application of a strict consumer protection law to wire transfers. The potential for a...more

Constangy, Brooks, Smith & Prophete, LLP

Cryptocurrency hacks and thefts: Insecure exchanges?

Cryptocurrency exchanges continue to be a target of hackers – and theft is the prize. On February 21, the cryptocurrency exchange Bybit reported that an Ethereum transaction was transferred to an unidentified address,...more

Faegre Drinker Biddle & Reath LLP

What’s New with FINRA’s Recent 2025 Regulatory Oversight Report

2025 is here, and so is FINRA’s 2025 Annual Regulatory Oversight Report (Report). On January 28, 2025, FINRA published the Report, which provides firms with insight into FINRA’s findings from recent observations and...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Society of Corporate Compliance and Ethics...

[Virtual Event] Nonprofit Sector Compliance Conference - May 21st, 8:00 am - 5:00 pm CT

Navigate the unique challenges of compliance for nonprofits - From fraud and conflict of interest to tax exemption, fundraising, and data security, nonprofit organizations are faced with significant compliance issues,...more

Bradley Arant Boult Cummings LLP

Looking Back at the False Claims Act in 2024 as the Government Keeps its Sights on Cybersecurity in 2025

In 2024, the government and whistleblowers were party to 558 settlements and judgments collecting over $2.9 billion. The government continued its effort to combat cybersecurity threats through its Civil Cyber-Fraud...more

Orrick, Herrington & Sutcliffe LLP

FINRA publishes its 2025 Regulatory Oversight Report

On January 28, FINRA published its 2025 FINRA Regulatory Oversight Report, which highlights areas identifying compliance gaps and observing emerging risks. The report introduced new topics such as the third-party risk...more

Orrick, Herrington & Sutcliffe LLP

Cyber Threats in Public Finance: Protecting Transactions from Wire Fraud

A recent cyberattack on a Michigan township has exposed weaknesses in the bond-closing process. In this incident, hackers stole over $25 million in bond proceeds by using spoofed email addresses to provide fraudulent wire...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #429 – Threat Actors Continue to Use QR Codes for Fraudulent Purposes

We have repeatedly warned our readers about malicious QR codes and their use by threat actors. Threat actors are now using these codes to disguise packages as gifts....more

85 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide