News & Analysis as of

Fraud Data Breach

Fraud is the making of false representations or engaging in deceptive behavior in order to unlawfully secure financial or personal gain. 
Neal, Gerber & Eisenberg LLP

AI and Social Engineering Practice Tips

The hospitality industry faces mounting cybersecurity challenges as artificial intelligence (AI) enables increasingly sophisticated social engineering attacks targeting hotels, resorts, and travel service providers. Threat...more

Robinson+Cole Data Privacy + Security Insider

What to Know About SafePay Ransomware Group

The SafePay ransomware group has been active since fall 2024 and has increased its activity this spring and summer. According to NCC Group, SafePay hit the most victims of any threat actor in May 2025—it is linked to 248...more

Zelle  LLP

N.M. Cyber Ruling Will Spur Litigation As Coverage Remedy

Zelle LLP on

A June 16 appellate decision involving the construction of a cyberinsurance policy demonstrates a concerning lack of judicial understanding about the nature and scope of cyber liability coverage and implicitly incentivizes...more

Wiley Rein LLP

For the Record: Cyber Coverage “For” a Security Breach is Ambiguous under New Mexico Law

Wiley Rein LLP on

The New Mexico Court of Appeals has held that cyber policy language affording coverage “for” a security breach was ambiguous and must be construed broadly to provide coverage for a breach of contract claim “because of,”...more

Awatif Mohammad Shoqi Advocates & Legal...

Legal Consequences Under the UAE's Cybercrimes Law.

A nation's reputation is crucial, and the UAE has implemented strong legislation to address these issues under the Federal Law No. (34) of 2021 (cybercrimes law). These laws specifically target online activities concerning...more

Farella Braun + Martel LLP

Employers Must Be Vigilant to Protect Against Security Risks from Fraudulent Hires

The FBI is warning employers about increasing security risks from fraudulent job applications, resulting in hackers infiltrating companies and gaining access to sensitive data. To protect against these risks, employers should...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #441 – Identity Theft Statistics Increasing in 2025

Unfortunately, identity theft continues to increase, and according to Identitytheft.org, the statistics are going to get worse in 2025. Some of the statistics cited by Identitytheft.org include: 1.4 million complaints of...more

Holland & Knight LLP

Sophisticated Crypto Theft Targeting High-Net-Worth Individuals

Holland & Knight LLP on

A recent court case has unveiled a new level of sophistication in attacks targeting high-net-worth cryptocurrency holders. In a meticulously orchestrated scheme, hackers managed to steal more than $40 million in bitcoin from...more

Clark Hill PLC

Right To Know - April 2025, Vol. 28

Clark Hill PLC on

Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. ...more

Zelle  LLP

Further Clarity Regarding Coverage for Funds Transfer Fraud

Zelle LLP on

At this point, your IT department has almost certainly warned you to approach your e-mail inbox with skepticism--for good reason. Cybercriminals regularly and effectively impersonate our legitimate contacts for illegitimate...more

Robinson+Cole Data Privacy + Security Insider

Insider Threats: Potential Signs and Security Tips

In recent news, New York’s Stram Center for Integrative Medicine reported a security incident involving an employee misusing a patient’s payment card information. According to a breach report filed with the U.S. Department of...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #435 – Threat Actors Go Retro: Using Snail Mail for Scams

We have educated our readers about phishing, smishing, QRishing, and vishing scams, and now we’re warning you about what we have dubbed “snailing.” Yes, believe it or not, threat actors have gone retro and are using snail...more

Troutman Pepper Locke

Need for Enhanced Cybersecurity in Public Finance — Cyberthieves Steal Bond Proceeds

Troutman Pepper Locke on

Recent events highlight the need for enhanced cybersecurity protocols in government offices across the U.S. In late November 2024, the Township of White Lake in Michigan, intended to issue approximately $29 million in general...more

Alston & Bird

Consumer Finance State Roundup - March 2025

Alston & Bird on

The latest edition of the Consumer Finance State Roundup highlights recently enacted measures of potential interest from two states: California: Effective January 1, California Assembly Bill 3108 addresses mortgage fraud. ...more

HaystackID

Rising Cyber Threats in Europe’s Financial Sector: An ENISA Overview

HaystackID on

Between January 2023 and June 2024, cyber threats targeting Europe’s financial sector escalated, posing risks to banks, financial service providers, and regulatory bodies. According to the ENISA Threat Landscape: Finance...more

Constangy, Brooks, Smith & Prophete, LLP

Cryptocurrency hacks and thefts: Insecure exchanges?

Cryptocurrency exchanges continue to be a target of hackers – and theft is the prize. On February 21, the cryptocurrency exchange Bybit reported that an Ethereum transaction was transferred to an unidentified address,...more

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Carlton Fields

FINRA Issues 2025 Annual Regulatory Oversight Report

Carlton Fields on

On January 28, 2025, FINRA issued its 2025 Annual Regulatory Oversight Report, providing a detailed look into FINRA’s current regulatory oversight of member firms and their registered personnel....more

Orrick, Herrington & Sutcliffe LLP

Cyber Threats in Public Finance: Protecting Transactions from Wire Fraud

A recent cyberattack on a Michigan township has exposed weaknesses in the bond-closing process. In this incident, hackers stole over $25 million in bond proceeds by using spoofed email addresses to provide fraudulent wire...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #429 – Threat Actors Continue to Use QR Codes for Fraudulent Purposes

We have repeatedly warned our readers about malicious QR codes and their use by threat actors. Threat actors are now using these codes to disguise packages as gifts....more

Jackson Lewis P.C.

AI versus MFA

Jackson Lewis P.C. on

Ask any chief information security officer (CISO), cyber underwriter or risk manager, or cybersecurity attorney about what controls are critical for protecting an organization’s information systems, you’ll likely find...more

Foley & Lardner LLP

‘Twas the Night of Compliance

Foley & Lardner LLP on

So, a lot of readers — well, a couple of people . . . okay, one person, and it might have been my mom — have asked for a third Christmas compliance parody article. And since we are nothing but compliant (sorry, we couldn’t...more

Seward & Kissel LLP

Vodka on the Rocks, Bon Voyage, and Hard to Contain

Seward & Kissel LLP on

Vodka maker Stoli Group USA files for chapter 11 bankruptcy | CBS News - Stoli Group’s US-based distributor unit filed for bankruptcy protection this week in the Northern District of Texas....more

J.S. Held

How to Defend Against Identity Theft This Tax Season

J.S. Held on

In recent years, identity theft cases have surged, especially during tax season. According to the Internal Revenue Service (IRS), in 2022, the federal agency identified and prevented USD 5.7 billion in tax-related fraud, and...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

107 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide