News & Analysis as of

Incident Response Plans Cyber Attacks Information Technology

Lowenstein Sandler LLP

UPDATE: Organizations Using the Salesloft Drift AI Chat Agent Must Check It for Compromise

On August 28th, Mandiant issued an update to its previous Salesloft Drift advisory. Therein, Mandiant discussed that Salesloft issued a security notification on Aug. 26 regarding its Drift application. At that time, it...more

Lowenstein Sandler LLP

Salesforce Users: Organizations Using the Salesloft Drift AI Chat Agent with Salesforce Must Check Their Presence for Compromise

Lowenstein Sandler LLP on

Salesloft issued a security notification on August 26 regarding its Drift application. It appears to be a broad opportunistic attack on Salesloft/Drift instances integrated with Salesforce tenants. Salesloft issued updates...more

Guidepost Solutions LLC

The Intersection of Cyber and Physical Security

Why Cyber and Physical Security Teams Can’t Afford to Work in Silos - In a world where everything from municipal water systems to hospital operating rooms depends on digital infrastructure, the convergence of cyber and...more

Robinson+Cole Data Privacy + Security Insider

CISA Releases Malware Analysis Report for Microsoft SharePoint Vulnerabilities

Threat actors continue to exploit ToolShell to gain unauthorized access to on-premises SharePoint servers. On August 6, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a malware analysis report...more

Shook, Hardy & Bacon L.L.P.

Ransomware Attacks Target SonicWall Firewall Vulnerability

Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over the past week, a large number of attacks by the ransomware group Akira have...more

Mayer Brown

Hong Kong Passes First Cybersecurity Legislation for Regulating Critical Infrastructures

Mayer Brown on

INTRODUCTION - The Protection of Critical Infrastructures (Computer Systems) Bill (the "Bill"), as the first law in Hong Kong to deal with cybersecurity was passed on 19 March 2025, and will come into force on 1 January 2026....more

K2 Integrity

Navigating the Cybersecurity Minefield: Why Midsize Companies Need On-Demand Expertise in the Age of AI and Ransomware

K2 Integrity on

In today’s always-online world, cyber resilience is a business imperative. For midsize and fast-growing small companies, the stakes have never been higher. The convergence of artificial intelligence (AI), increasingly...more

Robinson+Cole Data Privacy + Security Insider

SAP NetWeaver Visual Composer Requires Urgent Patch

SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more

Troutman Pepper Locke

OCC Notifies Congress of Major Email System Security Breach

Troutman Pepper Locke on

On April 8, the Office of the Comptroller of the Currency (OCC) officially notified Congress of a significant information security incident involving its email system. This notification, mandated by the Federal Information...more

StoneTurn

2025 Incident Response Landscape: Practical Tips for Cybersecurity Readiness

StoneTurn on

Organizations seeking to improve their cybersecurity posture in 2025 must assess what happens after an incident has occurred, and how an incident response team will be able to mobilize to respond. This article provides...more

A&O Shearman

Cybersecurity: The changing threat and risk landscape

A&O Shearman on

Cyber issues are seldom out of the news, from ransomware attacks and espionage to non-malicious outages that cause widespread concern. Organizations need to protect themselves against both current and future risks and...more

Alston & Bird

United States Cybersecurity and Infrastructure Security Agency Issues Joint International Guidance for Event Logging and Threat...

Alston & Bird on

On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more

Warner Norcross + Judd

Managing Cybersecurity Risk for Family Offices and Businesses

Warner Norcross + Judd on

Whether caused by family member thoughtlessness, employee error or the acts of a skilled data thief, everyone is likely to be the victim of an information breach at some point. A cyberattack on a family office or family...more

Hinckley Allen

Navigating Profound Change: CISA Announces Proposed Rule for Mandated Cyber Incident Reporting

Hinckley Allen on

In 2025, new federal reporting requirements will require hundreds of thousands of organizations to report cyber incidents within hours of discovery to the United States Government, marking a significant impact on how...more

Foley & Lardner LLP

Key Takeaways from Foley & Lardner and NACD Northern California Crisis Management Tabletop

Foley & Lardner LLP on

During this time of “permacrisis,” directors, no matter how experienced, must be ready and able to safeguard their organizations. As part of Foley & Lardner’s sponsorship of the NACD Northern California chapter, and...more

Epiq

Moving Information Governance to the Driver’s Seat to Accelerate Cyber Breach Response

Epiq on

Information Governance often takes a back seat to other organizational initiatives. But why is this the case? The list of reasons is long and varied. Not knowing where to start or how to build strategic approaches to...more

J.S. Held

Water Cybersecurity? EPA Mandates Regulations to Prevent Cyberattacks on Public Water Systems

J.S. Held on

EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more

Nelson Mullins Riley & Scarborough LLP

When It Comes to Cybersecurity: Be Prepared!

As has been the trend for some time now, organizations across all industries and sectors are increasingly at risk of being targeted by bad actors online. Now, the adage espoused by IT security professionals is to prepare for...more

Womble Bond Dickinson

Respond to Your Future Data Breach Today

Womble Bond Dickinson on

There is a saying that is often attributed to a Chinese proverb (though its origins are actually unknown) that the best time to plant a tree is 20 years ago, and the second-best time is today....more

Polsinelli

Cybersecurity Awareness Means, at a Minimum, Doing the Basics (Again and Again)

Polsinelli on

On September 30, 2022, the White House kicked off Cybersecurity Awareness Month by reminding citizens of the impacts cyberattacks can have on critical infrastructure such as “electric grids and fuel pipelines … and many other...more

Bracewell LLP

TSA Revises Cybersecurity Directive for Critical Pipeline and LNG Facilities

Bracewell LLP on

Following significant collaboration with the industry, the Transportation Security Administration (TSA) issued a revised directive, effective July 27, 2022, which updates one of the prior directives issued in the wake of a...more

Epiq

Counsel and the Breach Response Lifecycle: Best Practices at Every Stage

Epiq on

The shift to automated business processes and digital data management has definitely been a key enabler for organizations across industries. This fosters more efficient transactions, saves on costs, reduces time spent on...more

Akerman LLP - HR Defense

Prepare NOW to Manage Your Workforce Through a Cyberattack

It is every employer’s worst nightmare: an unsuspecting employee receives an email in the early morning from an individual claiming to be his supervisor. The email asks him to follow up on an urgent work assignment that needs...more

Miller Nash LLP

[Webinar] Panic! at the Firewall: Cyber Incident Response and the Role of Insurance - May 17th, 9:00 am - 10:30 am PDT

Miller Nash LLP on

Cyber incidents are increasing in frequency and severity across all businesses and industries. As the saying goes, it’s not a matter of IF but WHEN an incident will occur. In this webinar we will explore ways that you can...more

Robinson+Cole Data Privacy + Security Insider

Don’t Wait for the Perfect Time for a Tabletop Exercise

Threat actors don’t wait for a convenient time to attack your company. They attack when it suits them, and when they can find any small opening. Being prepared for different types of attacks helps companies prepare for the...more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide