News & Analysis as of

Microsoft Cybersecurity

Baker Donelson

Critical Microsoft SharePoint Vulnerability: What You Need to Know

Baker Donelson on

Microsoft has just disclosed a serious vulnerability in SharePoint (CVE-2025-53770) that allows unauthenticated attackers to remotely execute code in a SharePoint server hosted on-prem – no user interaction required....more

Lighthouse

Data Loss Prevention in the Age of AI: A New Landscape Demands New Approaches

Lighthouse on

Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more

Troutman Pepper Locke

Cleared for Takeoff? Copilot Legal and Technical Preflight Checklist

Troutman Pepper Locke on

Millions of companies use the Microsoft 365 suite of tools every day to create, communicate, and collaborate, but far fewer have adequately grappled with the legal risks introduced by Copilot, the powerful generative AI...more

Accelerynt, Inc.

Automating Identity Threat Response: Automating IP Blocking, Session Revocation, and Blocklist Management

Accelerynt, Inc. on

Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden. While these activities are easily detected in most environments, the workflows to fully...more

Epiq

Navigating Copilot Adoption: Key Legal Considerations for Data Governance

Epiq on

Legalweek 2025 Session Recap - The widespread interest in AI for users’ personal and professional lives has driven significant demand for tools like Copilot for Microsoft 365. However, the implementation of any AI tool...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #436 – Microsoft Warns of Crypto Wallet Scanning Malware StilachiRAT

A Microsoft blog post reported that incident response researchers uncovered a remote access trojan in November 2024 (dubbed StilachiRAT) that “demonstrates sophisticated techniques to evade detection, persist in the target...more

Lighthouse

Strategic Insights for Safeguarding Information with Microsoft Purview

Lighthouse on

Successful Microsoft Purview deployments require more than just technical implementation—they demand strategic planning, cross-functional collaboration, and ongoing optimization. Read about the key steps required to...more

Ankura

Cybercriminals Are Moving into the Cloud and Making Your Active Directory Their New Home

Ankura on

Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more

Ankura

The Evolution of Password Management

Ankura on

In today's digital landscape, robust password management is critical to information security. With the increasing complexity of cyber threats, ensuring secure access to sensitive information has become more critical than...more

Benesch

AI Reporter - November 2024

Benesch on

Several industry organizations have recently published AI guidelines, including the Digital Medicine Society (DMS), in partnership with Google and the Mayo Clinic. The DMS playbook includes both a strategy guide and an ROI...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Report Highlights Attacks Against Healthcare Organizations

On October 22, 2024, Microsoft issued a threat trend research report entitled “US Healthcare at risk: Strengthening resilience against ransomware attacks.” In it, Microsoft declares that ransomware attacks against the...more

Robinson+Cole Data Privacy + Security Insider

Scattered Spider Using RansomHub and Qilin Ransomware Against Victims

We previously reported on the concerning mash-up of worldwide cybercriminals, known as Scattered Spider, working together to attack victims. New reports from Microsoft and others indicate that in the second quarter of...more

Akin Gump Strauss Hauer & Feld LLP

Fund Managers Must Assess Whether Microsoft/CrowdStrike Outage Has Triggered Additional Regulatory Filings

A global technology outage linked to the cybersecurity firm CrowdStrike crashed Microsoft apps and triggered major disruptions across the asset management sector, along with other global industries. Private fund managers...more

Robinson+Cole Data Privacy + Security Insider

Black Basta Exploits Microsoft Zero-Day After Patch

It is being reported that Black Basta (aptly named) exploited a Microsoft zero-day prior to Microsoft’s release of a patch for the vulnerability back in March....more

HaystackID

Microsoft Delays Recall Rollout Amid Privacy Concerns

HaystackID on

Thursday, Microsoft announced its new line of Copilot Plus PCs would launch next week without the anticipated Recall feature. Originally part of Microsoft’s Copilot Plus suite, Recall was designed to take and store...more

Robinson+Cole Data Privacy + Security Insider

UK Privacy Watchdog Probes Microsoft’s Controversial “Recall” Feature

The UK’s data privacy regulator, the Information Commissioner’s Office (ICO), is investigating Microsoft over potential privacy concerns with its recently announced AI-powered “Recall” feature for Windows PCs. Microsoft...more

HaystackID

Microsoft Flies in Regulatory Skies Towards AI Horizons: Restructures Teams and Forges Ahead with Copilot

HaystackID on

Microsoft is adjusting its flight plan in response to the winds of change within the technology and regulatory landscapes, affecting various aspects of its operations, from its Teams chat app to its artificial intelligence...more

Robinson+Cole Data Privacy + Security Insider

Patch, Patch, Patch: Updates for Fortinet, Microsoft, and Adobe Products

Patching vulnerabilities is a difficult task. Keeping up with and patching them without disrupting users’ experience is tricky. Nonetheless, it is a necessary evil and crucial to cybersecurity hygiene and incident prevention....more

Hogan Lovells

Security Snippets: Microsoft SharePoint vulnerability to watch out for

Hogan Lovells on

A vulnerability in Microsoft SharePoint has been flagged as being actively exploited by CISA. A vulnerability in Microsoft SharePoint is being actively exploited according to CISA’s known exploited vulnerabilities (KEV)...more

Robinson+Cole Data Privacy + Security Insider

Kudos to Microsoft’s Takedown of Storm-1152

There was a big win for the good guys against the bad guys this week. On December 13, 2023, after obtaining an order from the federal court in the Southern District of New York to seize U.S. based infrastructure and take...more

Wilson Sonsini Goodrich & Rosati

All Eyes on AI: Regulatory, Litigation, and Transactional Developments – Q3 2023

The firm is pleased to distribute the Q3 2023 edition of All Eyes on AI: Regulatory, Litigation, and Transactional Developments, which closely follows the evolving regulatory landscape for artificial intelligence (AI) in the...more

White & Case LLP

AI Legal News Summer Roundup: Edition 3

White & Case LLP on

Welcome to the third edition of our AI Legal News Summer Roundup! After five class actions were filed between June 28 and July 11 (as reported on in our first edition of this series), on July 21, another class action lawsuit...more

Morrison & Foerster LLP

AI Leaders Commit to White House Supported Guidelines

In coordination with the White House, several leaders in the artificial intelligence (AI) space have publicly committed to a voluntary set of guidelines relating to responsible development and deployment of AI. Amazon,...more

Accelerynt, Inc.

Best Patch Management Strategy for Remote Workers

Accelerynt, Inc. on

Like it or not, the remote workforce is here to stay. Statistics show that employees say they are more productive working from home, and even before the global pandemic, there had been a 44% growth in the remote workforce...more

Fenwick & West LLP

Launch of Public RFI Signals FTC Scrutiny of Cloud Computing Industry

Fenwick & West LLP on

On March 22, 2023, the Federal Trade Commission (FTC) announced a request for information (RFI) seeking public comments on business practices in the cloud computing industry. The RFI focuses on three intertwined aspects of...more

108 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide