Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Indictment in Massive Iranian Cyberbreach Shows Companies Still Vulnerable

If general counsel fear their companies are vulnerable to cyberattacks from far afield, they have good reason. An indictment unsealed Friday details how hackers hired by the Iranian government broke into computer systems of at least 36 U.S. companies, including technology firms, banks, media companies and a law firm. Learn...

Today’s cybersecurity strategies are “not sufficiently robust or scalable,” Nuclear Threat Initiative says

The cyber threat to nuclear facilities is serious, but the challenge going forward is evident,” Dr. Page Stoutland, NTI vice president of scientific and technicals affairs, said in the post. “Threats and vulnerabilities will continue to mount. Today’s strategy is not sufficiently robust or scalable, and a high level of cybersecurity may never be compatible with current nuclear plant...

Helping it click into place – Our monthly Asia cybersecurity update

During 2017, cyberattacks continued to evolve and develop sophistication, exploiting both previously unidentified vulnerabilities and known vulnerabilities in new ways. Ransomware attacks such as Petya and WannaCry put critical functions across the world and across industries on hold, while the Mirai botnet attack, unleashed in late 2016, highlighted the increasing vulnerabilities of...

Cyber Attacks on U.S. Power Grids Can Be Deterred With Password Changes

A key to preventing cyber attacks from crippling U.S. power grids could be changing passwords on internet routers, wifi-connected thermostats and smart lawn-sprinklers. “A significant share” of internet attacks result from unchanged factory default passwords on web-connected devices that allow hackers to break in and and install malware, according to a Jan. 18 report by the Advanced...

You’ve Been Breached During the Holidays: Now What?

It was the start of the Thanksgiving holiday when the GC of a large retail company got an urgent call from her CEO. “We’re under attack. I just got off the phone with IT and we have been hacked. Ransomware and a DDOS. Call whoever you need to call, notify whoever you need to notify, and get this fixed.” This occurrence, which extends to all industries, leads to the critical question:...

« Older Entries