News & Analysis as of

Phishing Scams Today's Popular Updates Risk Management

Neal, Gerber & Eisenberg LLP

AI and Social Engineering Practice Tips

The hospitality industry faces mounting cybersecurity challenges as artificial intelligence (AI) enables increasingly sophisticated social engineering attacks targeting hotels, resorts, and travel service providers. Threat...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Ankura

The Rise of AI-Powered Cyber Attacks: How Indian Businesses Can Prepare

Ankura on

As the digital landscape evolves, so do the threats that accompany it. The rise of artificial intelligence (AI) has fundamentally transformed the nature of cybercrime, enabling attackers to execute more sophisticated and...more

Jackson Lewis P.C.

Tips for Vacation Rental, Property Mgmt. Businesses Facing Vendor Cybersecurity Risk

Jackson Lewis P.C. on

No organization can eliminate data breach risks altogether, regardless of industry, size, or even if the organization has taken significant steps to safeguard their systems and train employees to avoid phishing attacks....more

Jackson Lewis P.C.

Exploring AI Risks Reported in SEC Filings Can Be Helpful For Many Organizations, Including SMBs

Jackson Lewis P.C. on

One of our recent posts discussed the uptick in AI risks reported in SEC filings, as analyzed by Arize AI. There, we highlighted the importance of strong governance for mitigating some of these risks, but we didn’t address...more

Dorsey & Whitney LLP

Cybercrime Trends: A Midyear Review

Dorsey & Whitney LLP on

Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Jackson Lewis P.C.

AI, Phishing Attacks, Healthcare, and a $480,000 OCR Settlement under HIPAA

Jackson Lewis P.C. on

Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more

BakerHostetler

Top NFT-Related Cybersecurity, Phishing, Hacking and Other Risks in 2022

BakerHostetler on

The continued growth of the market for nonfungible tokens (NFTs) in 2022 has helped shape the zeitgeist of what has been referenced colloquially by some as the “fourth industrial revolution,” defined largely by network effect...more

Mitratech Holdings, Inc

Emerging Cyber Risks in the US & UK

Mitratech Holdings, Inc on

Cyber risk management has significantly escalated in importance, during the last couple of years, as a result of companies overcoming the operational challenges of the pandemic, transitioning to hybrid working, preparing for...more

Porter Hedges LLP

Cybersecurity Best Practices: Disclosure Requirements for Risk Management, Strategy, and Governance

Porter Hedges LLP on

In previous posts on the Porter Hedges Anti-Corruption & Compliance Blog, our team has discussed the U.S. Securities and Exchange Commission’s (“SEC”) proposal to amend its rules and require disclosures related to...more

Society of Corporate Compliance and Ethics...

Cyber risks: How are you measuring and mitigating them?

CEP Magazine (June 2022) - Picture this: The workday starts out like most other days and inevitably involves electronic devices for many of us. Our expectation, realistic or not, is that technology will work at our command...more

Buckingham, Doolittle & Burroughs, LLC

Busting Cyber Myths: I’m Not a Target (and other lies you tell yourself)

In the first of a three-part series, Buckingham Data Privacy and Cybersecurity Attorney David Myers talks with Andy Jones, CEO, Fortress Security Risk Management and Eric Smith, recently retired Special Agent In Charge of the...more

Rivkin Radler LLP

HHS Report Warns of EMR and EHR Security Risks

Rivkin Radler LLP on

The U.S. Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) recently issued a report entitled “Electronic Medical Records in Healthcare” that discussed security risks applicable to...more

Wyrick Robbins Yates & Ponton LLP

Fraudulent Wire Transfers: Who Bears the Loss and How to Prevent Becoming A Victim

Cybercriminals exploited remote work during the COVID-19 pandemic.  In 2020, the FBI’s Internet Crime Complaint Center (IC3) saw a record 70% increase in the number of reported internet scams and losses exceeding $4.2...more

Robinson+Cole Data Privacy + Security Insider

SolarWinds Hackers Focus on Downstream Vendors as Next Victims

In a blog post entitled “New activity from Russian actor Nobelium,” Microsoft’s V.P. of Customer Security & Trust Tom Burt discussed a recent alert issued by the Microsoft Threat Intelligence Center (MSTIC) regarding the...more

Goodwin

FDIC Seeks Comment on Supervisory Approach to Examinations During Pandemic

Goodwin on

In This Issue. The Federal Deposit Insurance Corporation (FDIC) is seeking information and comment regarding the FDIC’s supervisory approach to examinations during the pandemic; the FDIC’s tech lab, FIDTECH, announced a “tech...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Warns of Tricky O365 Phishing Attack

If you are an organization that uses Microsoft Office 365 as your email platform, be on the lookout for a new tricky phishing attack recently used by cyber criminals. ...more

Foley & Lardner LLP

Managing Data Privacy in the COVID-19 Environment – Navigating the Challenges of a Pandemic in 2021

Foley & Lardner LLP on

Last year, the COVID-19 pandemic brought about a global market disruption across multiple industries, and manufacturers expect the pandemic to continue to affect the automotive industry through 2021. The pandemic has not...more

Hinshaw & Culbertson LLP

Practical Tips to Help You Avoid Taking the Bait of COVID-19 Loan Phishing Scams

Risk Management Question - What precautions can lawyers, staff, and law firms as a whole take to mitigate the risk of falling victim to the latest COVID-19 scam involving phishing for personal information by dangling...more

Rumberger | Kirk

Pandemic-based Cyber Attacks, Phishing Schemes & Data Breaches: Oh My!

Rumberger | Kirk on

Never let a crisis go to waste. This appears to be the maxim of cyber criminals seeking to capitalize on cyber vulnerabilities posed by the COVID-19 pandemic. In fact, the United States Cybersecurity and Infrastructure...more

Robinson+Cole Data Privacy + Security Insider

Dealing with Two Schoolyard Bullies: Schools Are Forced to Contend with Cyber-attacks While Also Trying to Manage Covid-19 Crisis

Criminals are apparently not taking any time off during this pandemic, and in fact by all accounts have increased their attacks, particularly targeting entities whose attention is diverted to dealing with the fallout of the...more

Rothwell, Figg, Ernst & Manbeck, P.C.

Spy Games: How Insider/Outsider Threats Have Become the Newest Cybersecurity Legal Risk

Cybersecurity does not just pose technical challenges; companies must always keep their eye on the human component of cyber risk.  For example, even the most damaging and sophisticated hacks – such as the recent Twitter hacks...more

NAVEX

3 Coronavirus Compliance Tips From the SEC

NAVEX on

The coronavirus crisis is far from over, and compliance professionals still need every scrap of guidance that regulators can provide about how to run compliance programs in these difficult times. So when the Securities and...more

66 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide