News & Analysis as of

Extortion Risk Management

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

FBI Warns of Hidden Threats in Remote Hiring: Are North Korean Hackers Your Newest Employees?

The Federal Bureau of Investigation (FBI) recently warned employers of increasing security risks from North Korean workers infiltrating U.S. companies by obtaining remote jobs to steal proprietary information and extort money...more

American Conference Institute (ACI)

[Event] Mexico Summit on Anti-Corruption & Compliance Programs - March 12th - 13th, Polanco, CDMX, Mexico

Connect with the leading Anti-Corruption experts and discuss the latest compliance strategies at ACI’s Mexico Summit on Anti-Corruption & Compliance Programs. As Mexico’s longest running, premier anti-corruption and...more

Patterson Belknap Webb & Tyler LLP

Recent Ransomware Attacks Highlight the Evolving Challenges in Responding to Cyber Extortion

A spate of recent ransomware attacks illustrates the increasingly difficult calculations that businesses face following the theft or encryption of their data....more

BakerHostetler

DSIR Deeper Dive: 2023 Crypto Threat Landscape

BakerHostetler on

Following one of the most turbulent years in crypto history, 2023, in contrast, unfolded as a year of reprieve, including from crypto threats. According to a July 12, 2023, report from blockchain analytics firm Chainalysis,...more

Fenwick & West LLP

To Pay or Not to Pay: Five Critical Approaches to Beating a Ransomware Threat

Fenwick & West LLP on

It’s the call you hope you never get. Your company has been hit with a ransomware attack. Your systems are offline. Your customer data was stolen by an unknown threat actor who is threatening to leak it. You have lots of...more

Pillsbury - Internet & Social Media Law Blog

The Many-Headed Threat of Ransomware

It may seem that the very term “ransomware” wasted little time going from “newish-sounding threat” to expected, constant presence in the news and IT meetings alike. But, of course, it’s ultimately just a modern word for one...more

Alston & Bird

EU Spotlight: Top 6 Issues All General Counsel Need to Know About Ransomware

Alston & Bird on

Ransom demands from cyber-attacks show no signs of slowing down, and the costs—both from ransom payments and repairing the damage—are rising precipitously. Our Privacy, Cyber & Data Strategy Team outlines six ways companies...more

Pillsbury - Policyholder Pulse blog

Insuring a King’s Ransom: The Role of Cyber Insurance in Ransomware Risk Management

Nearly 700 years ago, England captured King John II of France and held him for ransom for four million écus. But France could not afford to pay, and King John II ultimately traded his two sons as substitute hostages to try...more

McDermott Will & Emery

Uber Criminal Complaint Raises the Stakes for Breach Response

On August 20, 2020, a criminal complaint was filed charging Joseph Sullivan, Uber’s former chief security officer, with obstruction of justice and misprision of a felony in connection with an alleged attempted cover-up of a...more

Harris Beach Murtha PLLC

Can Hackers be Ethical, not Evil?

We are increasingly seeing situations in which a client’s information systems are breached by an ethical hacker. Typically, they take a screen shot or two of data to prove their accomplishment, carefully redact any...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #193 – FBI Issues Warning to Parents about Sextortion

Summer vacation is almost here for school-age children, which means that kids will have more free time to roam the Internet. Unfortunately, according to the FBI, this means that the threat of online predators is high and the...more

Robinson+Cole Data Privacy + Security Insider

OCR Warns of Cyber Extortion and Provides Checklist

In its January newsletter, the Office for Civil Rights (OCR) focused on cyber extortion, which it stated has “risen steadily over the past couple of years and continue to be a major source of disruption for many...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2018 #3

Robinson & Cole LLP on

As of February 15, 2018, banks, insurance companies, and other financial services institutions and licensees regulated by the New York Department of Financial Services (DFS) are required to file their first certification of...more

K&L Gates LLP

K&L Gates Triage: Cyber Insurance Issues for the Healthcare Industry

K&L Gates LLP on

This episode provides an overview of the major cyber security issues affecting the health care industry. Given that health care is one of the most frequently targeted industries by data hackers, this episode outlines the...more

Mintz

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Mintz on

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide