News & Analysis as of

Social Engineering Fraud

Neal, Gerber & Eisenberg LLP

AI and Social Engineering Practice Tips

The hospitality industry faces mounting cybersecurity challenges as artificial intelligence (AI) enables increasingly sophisticated social engineering attacks targeting hotels, resorts, and travel service providers. Threat...more

Robinson+Cole Data Privacy + Security Insider

What to Know About SafePay Ransomware Group

The SafePay ransomware group has been active since fall 2024 and has increased its activity this spring and summer. According to NCC Group, SafePay hit the most victims of any threat actor in May 2025—it is linked to 248...more

Potomac Law Group, PLLC

Cybercriminals Hit Your Inbox—Now What? Recovering Funds After Business Email Compromise and Fraud Schemes

The global cyber scam industry is a multi-billion dollar racket run by crime syndicates who often operate through massive compounds known as “scam farms” in far flung locations.  On our shores, many businesses fall prey to...more

Hogan Lovells

North Korea-linked threat actors utilize falsified companies and job interviews to distribute malware

Hogan Lovells on

A threat actor group with ties to the Democratic People’s Republic of Korea (“North Korea”) called Contagious Interview is using front companies to spread malware through fake job interviews. This group has a history of...more

Holland & Knight LLP

Sophisticated Crypto Theft Targeting High-Net-Worth Individuals

Holland & Knight LLP on

A recent court case has unveiled a new level of sophistication in attacks targeting high-net-worth cryptocurrency holders. In a meticulously orchestrated scheme, hackers managed to steal more than $40 million in bitcoin from...more

Zelle  LLP

Further Clarity Regarding Coverage for Funds Transfer Fraud

Zelle LLP on

At this point, your IT department has almost certainly warned you to approach your e-mail inbox with skepticism--for good reason. Cybercriminals regularly and effectively impersonate our legitimate contacts for illegitimate...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #435 – Threat Actors Go Retro: Using Snail Mail for Scams

We have educated our readers about phishing, smishing, QRishing, and vishing scams, and now we’re warning you about what we have dubbed “snailing.” Yes, believe it or not, threat actors have gone retro and are using snail...more

Jackson Lewis P.C.

AI versus MFA

Jackson Lewis P.C. on

Ask any chief information security officer (CISO), cyber underwriter or risk manager, or cybersecurity attorney about what controls are critical for protecting an organization’s information systems, you’ll likely find...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Bradley Arant Boult Cummings LLP

Does Your Cyber Insurance Cover Social Engineering Fraud?

Most policyholders are aware of the danger of losses from fraudulent instructions and invoices accomplished through what is known as “social engineering” or related methods. Often this is carried out by an email claiming to...more

Wiley Rein LLP

Court Holds Social Engineering Fraud Does Not Trigger Computer Fraud Coverage

Wiley Rein LLP on

The United States District Court for the District of Minnesota, applying Minnesota law, has held that an insured’s loss resulting from the insured’s payment of fraudulent invoices received from a bad actor who hacked into the...more

White and Williams LLP

Minnesota Federal Court Rejects Insured’s Attempt to Cast Social Engineering Fraud As Computer Fraud Under Crime Policy

White and Williams LLP on

On August 12, 2022, the U.S. District Court for the District of Minnesota dismissed a policyholder’s complaint seeking a declaration that $600,000 in social engineering fraud loss fell within a crime policy’s computer fraud...more

Wiley Rein LLP

No Coverage for Loss in Consequence of Social Engineering Fraud

Wiley Rein LLP on

Applying North Carolina law, a federal district court has held that an E&O insurance policy does not provide coverage for loss arising from social engineering fraud despite the fact that the insured’s negligence also...more

WilmerHale

Disinformation and Deepfakes Risk Management (DDRM) - Fake Viral Narratives and Synthetic Media Pose Risks to Business

WilmerHale on

Fast-spreading disinformation and the growing ease with which believable deepfake media can be created are threats that are poised to accelerate a range of business dangers, particularly those related to reputational risk,...more

Clark Hill PLC

“Cause(ation)” For Concern: Two Recent Troubling Social Engineering Cases

Clark Hill PLC on

The most significant coverage issue facing the fidelity industry today is the scope of causation. Whether a court applies a “direct means direct” or a tort-based proximate cause standard often is the deciding factor in...more

Jones Day

Insurance Coverage for Social Engineering Crimes—How to Avoid Being Victimized Twice

Jones Day on

The Situation: Businesses are increasingly at risk of social engineering crimes, and often their commercial insurance policies do not provide the full protection that they expected. The Result: Three recent decisions...more

Farella Braun + Martel LLP

Social Engineering Scam Covered By Cyber Insurance

The Sixth Circuit recently entered a ruling in American Tooling Center, Inc. v. Travelers Casualty and Surety Co. of America, 2018 WL 3404708 (6th Cir. July 13, 2018), soundly rejecting a cyber carrier’s extremely narrow...more

Hinshaw & Culbertson LLP

Cyber Alert - Social Engineering Fraud

Risk Management Question: How can lawyers identify and avoid increasingly common social engineering scams?...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - December 2017

In this month's edition of our Privacy & Cybersecurity Update, we discuss the Article 29 Data Protection Working Party's critique of the Privacy Shield and the Sixth Circuit's decision to consider the issue of computer fraud...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide