{"id":119146,"date":"2025-05-15T12:25:00","date_gmt":"2025-05-15T20:25:00","guid":{"rendered":"https:\/\/xira.com\/p\/2025\/05\/15\/coinbase-sued-in-nationwide-class-actions-over-data-breach\/"},"modified":"2025-05-15T12:25:00","modified_gmt":"2025-05-15T20:25:00","slug":"coinbase-sued-in-nationwide-class-actions-over-data-breach","status":"publish","type":"post","link":"https:\/\/xira.com\/p\/2025\/05\/15\/coinbase-sued-in-nationwide-class-actions-over-data-breach\/","title":{"rendered":"Coinbase Sued in Nationwide Class Actions Over Data Breach"},"content":{"rendered":"<p>\u201cWhether through impersonation, bribery or social engineering, the endgame is the same: gaining access to corporate IT systems or sensitive data,  said Justin Daniels, an equity partner at Baker Donelson.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" align=\"left\" border=\"0\" height=\"1\" width=\"1\" alt=\"\" hspace=\"0\" src=\"https:\/\/feeds.feedblitz.com\/~\/i\/918365414\/0\/law\/legal-news\" title=\"\"><\/p>\n<div><a href=\"https:\/\/feeds.feedblitz.com\/_\/2\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/fbshare20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/28\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/fblike20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/29\/918365414\/law\/legal-news,\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/pinterest20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/12\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/stumble20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/24\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/x.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/20\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/rss20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0\u00a0<\/div>\n<p>\u201cWhether through impersonation, bribery or social engineering, the endgame is the same: gaining access to corporate IT systems or sensitive data,  said Justin Daniels, an equity partner at Baker Donelson.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" align=\"left\" border=\"0\" height=\"1\" width=\"1\" alt=\"\" hspace=\"0\" src=\"https:\/\/feeds.feedblitz.com\/~\/i\/918365414\/0\/law\/legal-news\" title=\"\"><\/p>\n<div><a href=\"https:\/\/feeds.feedblitz.com\/_\/2\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/fbshare20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/28\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/fblike20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/29\/918365414\/law\/legal-news,\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/pinterest20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/12\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/stumble20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/24\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/x.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a href=\"https:\/\/feeds.feedblitz.com\/_\/20\/918365414\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/rss20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0\u00a0<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u201cWhether through impersonation, bribery or social engineering, the endgame is the same: gaining access to corporate IT systems or sensitive data, said Justin Daniels, an equity partner at Baker Donelson. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u201cWhether through impersonation, bribery or social engineering, the endgame is the same: gaining access to corporate IT systems or sensitive data, said Justin Daniels, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":119128,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[23],"tags":[],"class_list":["post-119146","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-law-com"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/xira.com\/p\/wp-content\/uploads\/2025\/05\/legal-news-9GFFCN.jpeg?fit=768%2C633&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/119146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/comments?post=119146"}],"version-history":[{"count":0,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/119146\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/media\/119128"}],"wp:attachment":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/media?parent=119146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/categories?post=119146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/tags?post=119146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}