Cyber Threats
Hinshaw Insurance Law TV – Cybersecurity Part One: Data Breach Notification
Defense In-Depth: Cybersecurity For Energy
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Cyber Insurance 101: What It Is And Why You Need It
Phishing and Vishing and Smishing (Oh my!): New Types of Scams Require Increased Vigilance
K&L Gates Triage: Cyber Insurance Issues for the Healthcare Industry
On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure....more
As the healthcare sector continues to be a top target for cyber criminals, the Office for Civil Rights (OCR) issued proposed updates to the HIPAA Security Rule (scheduled to be published in the Federal Register January 6). It...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
In the continuously evolving landscape of cyber threats, organizations must be proactive in identifying and mitigating potential risks to their digital assets and operations. A critical step in building cyber resilience is...more
Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more
At the recent In-House Counsel Seminar, three Ward and Smith attorneys presented a realistic role play response to an incidence of wire fraud, addressing red flags associated with fraudulent communications, corporate incident...more
“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more
Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more
So, you just got the news every organization does not want to hear; you have become the victim of a cyber attack. While there are many different ways of approaching a cyber incident, the one thing that is consistent is...more
This post deals with another data breach, yes, hackers were able to compromise the organization’s systems and exfiltrate personal information relating to over 45,000 Pennsylvania and Ohio residents. However, there are several...more
Glenn Hartfiel, Principal, and Geoff Yut, Consultant, at Opportune LLP discuss why recent geopolitical events are heightening the need for the implementation of improved cybersecurity measures in the energy industry, why...more
Within the past decade, technology has evolved extremely rapidly, which can be both beneficial and difficult for business owners to navigate. Just as common technology like laptops and mobile banking has evolved, so have the...more
As is the case with many types of cybersecurity threats, shielding one’s company from ransomware attacks calls for measures that simultaneously build the strongest protections possible while also adopting mitigation...more
If you had never heard of the Colonial Pipeline Company before this week, chances are that you have heard about it now. Sitting in your car waiting in long lines to fill up at your local gas station hoping they don’t run out...more
- In the age of broad corporate teleworking brought on by COVID-19, OCIE of the SEC has observed during recent examinations that investment advisers, broker-dealers and investment companies are subject to an increased threat...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
Disruptionware is defined by the Institute for Critical Infrastructure Technology (ICIT) as a new and “emerging category of malware designed to suspend operations within a victim organization through the compromise of the...more
Just recently, Equifax had the largest-ever settlement for a data breach. They are to pay at least $575 million, and potentially as much as $700 million, to settle allegations over its massive 2017 data breach. What we tell...more
In light of a recent Wipro data breach, Wipro’s customers should move quickly to take operational and contractual precautions to help minimize the breach’s potential effects on their organizations. Wipro, the India-based...more
Recently, the Federal Bureau of Investigation (FBI) issued a warning t U.S. consumers that Russian hackers (dubbed Sofacy and a/k/a Fancy Brear and APT28, and believed to be backed by the Russian government) had compromised...more
Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more
This episode provides an overview of the major cyber security issues affecting the health care industry. Given that health care is one of the most frequently targeted industries by data hackers, this episode outlines the...more
While still reeling from last month’s WannaCry attack, organizations worldwide were hit with another global ransomware attack this week, June 27, 2017. The infection began inside the Ukraine but has quickly spread across four...more
Malware was recently identified that appears to have been designed and deployed by a nation-state to target and shut down electric grids. According to published reports, this malware currently appears to be capable of...more
The recent cyberattack highlights the need for firms to engage in proactive prevention and protection. Ransomware (malware that encrypts data pending an extortion payment) is a recurring cyber threat that is growing more...more