News & Analysis as of

Cyber Threats Ransomware

Goodwin

The UK’s Ransomware Strategy: What the UK Government’s Response Signals

Goodwin on

Following the UK Government's launch of a public consultation on its proposed legislative measures to combat the threat of ransomware (see Goodwin’s January 2025 analysis), the UK Government published its response to the...more

Jones Day

EU Commission Proposes Revised Cybersecurity Act to Bolster EU Cyber Resilience

Jones Day on

On January 20, 2026, the EU Commission unveiled a new Cybersecurity Package (the "Package") designed to reinforce the EU's cyber resilience in response to an increasingly complex and sophisticated threat environment....more

Wiley Rein LLP

Congress Reauthorizes CISA 2015 Through September – But Then What?

Wiley Rein LLP on

The landmark Cybersecurity Information Sharing Act of 2015 (CISA 2015) has been reauthorized retroactively from its original September 30, 2025 expiration for a limited one-year period. This development was the result of the...more

Clark Hill PLC

Cannabis Group Series | Securing the Seed: Cybersecurity Challenges in the Cannabis Industry

Clark Hill PLC on

As the cannabis industry continues to grow and evolve, so do the challenges it faces, particularly in the realm of cybersecurity. With increasing digitization, cyber threats pose a significant risk to cannabis businesses,...more

Dinsmore & Shohl LLP

Cyber Threat Actor Group, Nitrogen, Unveils New Countermeasure in Ransom Negotiations

Dinsmore & Shohl LLP on

Through the combined efforts between Dinsmore’s cybersecurity team and Armada Growth Partners (AGP), new intelligence on the Techniques, Tactics, and Procedures (TTP) for the Nitrogen ransomware group has been identified....more

Robinson+Cole Data Privacy + Security Insider

Ransomware Attacks Keep Climbing

The Symantec and Carbon Black Threat Hunter Team recently released its Ransomware 2026 report that contains helpful intelligence into the state of ransomware attacks and insight into how they are evolving, despite law...more

Orrick, Herrington & Sutcliffe LLP

RegFi Episode 84: Grappling With Cyber Risk, Now and in a Post-Quantum World

Orrick’s James Chou joins RegFi co-hosts Jerry Buckley and Sherry Safchuk for a wide-ranging discussion on how cyber risk is evolving for financial services providers. The conversation explores the growing sophistication of...more

Skadden, Arps, Slate, Meagher & Flom LLP

Ransomware: What You Need to Know as Attacks, Regulation and Enforcement Increase

Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more

Perkins Coie

Privacy and Data Security Recap 2025—National Security

Perkins Coie on

2025 saw a range of activity at the intersection of privacy, data security, and national security, including new types of threats, significant U.S. regulatory actions by multiple agencies, legislative lapses and new...more

Haynes Boone

Making a List, Checking it Twice: Avoiding Cyber Attacks During the Holidays

Haynes Boone on

What’s the Concern? During the holiday season—specifically, Christmas Eve, Christmas, New Year’s Eve and New Year’s Day—there tends to be a spike in cyber attacks on companies. Cyber attackers target this time of year...more

Wiley Rein LLP

[Podcast] Episode 2: AI’s Role in the Evolution of Cyber Threats

Wiley Rein LLP on

What happens when the familiar faces of trusted clients, coworkers, and peers turn out to be AI-generated imposters? In this episode of The Cyber Periscope, Pam Signorello sits down with Nate Lovett of Wiley's Cyber Insurance...more

Ankura

Enhancing Business Security: Common Cybersecurity Threats and Effective Protection Strategies

Ankura on

In today’s digital landscape, businesses of every size face a growing number of cybersecurity threats. From sophisticated spear phishing campaigns to disruptive malware, cyberattacks are no longer a question of if, but when....more

Robinson+Cole Data Privacy + Security Insider

Compromised Credentials Responsible for 50% of Ransomware Attacks

The statistics listed in the Quarterly Threat Report: Third Quarter, 2025, issued by Beazley Security are eye popping. They include: August and September showed a sharp increase in ransomware activity, with those months...more

Robinson+Cole Data Privacy + Security Insider

Akira Ransomware Continues to Hit Hard

A November 13, 2025, a Cybersecurity Advisory warned that new activity by the Akira ransomware variant “presents an imminent threat to critical infrastructure.” The Advisory was jointly issued by four U.S. agencies, the...more

Wiley Rein LLP

Fraud and Scam Prevention Series: Navigating Increasingly Sophisticated Cybersecurity Threat and Fraud Tactics

Wiley Rein LLP on

Cybersecurity risks are evolving, in part because bad actors – including scammers and fraudsters – are leveraging widely available artificial intelligence (AI) tools for nefarious purposes. In the escalating fraud landscape,...more

DarrowEverett LLP

With Expiration of CISA 2015, Cyber Threat Sharing Faces New Risks

DarrowEverett LLP on

When the Colonial Pipeline ransomware attack paralyzed fuel distribution across the East Coast in 2021, both government and private entities raced to exchange cyber threat data to prevent further disruption....more

Wiley Rein LLP

[Podcast] Episode 1: Phishing Claims Test “Direct” Causation Chain

Wiley Rein LLP on

Welcome to the premiere episode of The Cyber Periscope, where Pam Signorello sits down with Bill Knauss, special counsel in Wiley's Insurance Practice, to discuss the 2025 NetDiligence Cyber Claims Study, the evolving...more

Gray Reed

AI-Powered Cyberattacks Are Here: How They Are Supercharging Ransomware Attacks and How You Can Mitigate Them

Gray Reed on

In today’s landscape of evolving cyber threats, assuming your business is safe is no longer an option – it’s time to take proactive steps to defend against cyberattacks. In the arms race between cyberattacks and organizations...more

Freeman Mathis & Gary

AI-powered cyber threats: What everyone needs to know

Freeman Mathis & Gary on

A new report from Anthropic, a leading Artificial Intelligence (AI) company, highlights a troubling development in the cybersecurity landscape: threat actors are now using AI to automate nearly every step of a cyber extortion...more

Foley & Lardner LLP

Securing Digital Supply Chains: Confronting Cyber Threats in Logistics Networks

Foley & Lardner LLP on

On the Rise: Cyberattacks through the supply chain have increased by over 400% in recent years. Leaders need to take action. Enhance Third-Party Cybersecurity: Regularly audit suppliers’ cybersecurity practices and limit...more

Alston & Bird

UK’s National Cyber Security Centre Releases 2025 Annual Review

Alston & Bird on

The United Kingdom’s National Cyber Security Centre (NCSC) has released its Annual Review for 2025. As in 2024, the report covers the UK’s cyber security position as well as the country’s readiness to deal with those threats....more

Fisher Phillips

New Cybercriminal Group Targeting Transportation and Logistics Industry – How to Protect Your Organization

Fisher Phillips on

A new cybercrime threat actor calling itself “Coinbase Cartel” has begun targeting transportation, logistics, and adjacent sectors – and you should act quickly to shore up your defenses. Their model is simple: they steal data...more

Mayer Brown

2025 Cyber Incident Trends: What Your Business Needs to Know

Mayer Brown on

Malicious actors continue to exploit our connected digital ecosystem, disrupting organizations across all sectors. Some of the most significant evolutions in the cyber threat landscape stem from artificial intelligence...more

HaystackID

Europe Under Siege: How Cybercriminals and State Actors Are Rewriting Digital Threat Rules

HaystackID on

In 2025, European organizations found themselves navigating an increasingly complex digital landscape, where traditional cybersecurity assumptions were eroded by waves of sophisticated attacks and converging threat groups....more

Lowenstein Sandler LLP

On-Premises Oracle EBS Systems at Risk Due to CL0P Exploit

Lowenstein Sandler LLP on

A recent campaign by the CL0P ransomware group has targeted on-premises, customer-managed Oracle E-Business Suite (EBS) systems, resulting in the potential for widespread data exfiltration and extortion attempts. The...more

360 Results
 / 
View per page
Page: of 15

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide