Cyber Threats
Hinshaw Insurance Law TV – Cybersecurity Part One: Data Breach Notification
Defense In-Depth: Cybersecurity For Energy
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Cyber Insurance 101: What It Is And Why You Need It
Phishing and Vishing and Smishing (Oh my!): New Types of Scams Require Increased Vigilance
K&L Gates Triage: Cyber Insurance Issues for the Healthcare Industry
In the continuously evolving landscape of cyber threats, organizations must be proactive in identifying and mitigating potential risks to their digital assets and operations. A critical step in building cyber resilience is...more
“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more
Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more
The cyber landscape these days can be terrifying. Malware, ransomware, spyware, phishing, cloud-based computing and so much more are enough to keep even a compliance veteran up all night. There are other risks to consider,...more
As technology evolves, companies are finding ways to become more nimble and conduct business more efficiently — over remote networks, email on handheld devices, the cloud, and on cellphones. Yet, as technology advances, so...more
Moving towards more predictive postures, leveraging multiple sources of information such as cyber threat, business, and geopolitical intelligence, allow organizations to gain a better handle on crises before they occur. By...more
The Ankura Cyber Threat Investigations & Expert Services (CTIX) team conducted a technical analysis of historical and ongoing adversarial activity associated with the current Ukrainian/Russian conflict. In doing so, the CTIX...more
Report on Patient Privacy 22, no. 3 (March, 2022) - HHS said in early March that it was not aware of any specific threat to U.S. health care organizations stemming from the Russian invasion of Ukraine. “However, in the...more
It may seem that the very term “ransomware” wasted little time going from “newish-sounding threat” to expected, constant presence in the news and IT meetings alike. But, of course, it’s ultimately just a modern word for one...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
The threat-related statistics of malware and ransomware are mind-boggling. We have regularly reported on the dramatic increase of ransomware, but the statistics on successful exploitation and botnet activities are just as...more
Several federal agencies have teamed up to warn healthcare employers of the increased threat they face as a result of malicious cybercriminals aiming to take advantage of the pandemic to wreak havoc on their operations. The...more
Emotet, arguably one of the most active malware threats of the past five years, took a bit of a break during the summer months to receive an update and has returned now as a Windows Update attachment....more
Human resources can no longer just rely on their IT and legal counsel to focus on the concerns and issues surrounding cyberattacks. As more companies re-open and unemployment rates grow, cyber criminals are continuing to...more
As we reported in March, the COVID-19 pandemic is being leveraged by malicious cyber actors to make various cybersecurity attacks. ...more
Opportunistic cybercriminals are taking advantage of the COVID-19 pandemic to dramatically increase cyberattacks. Malware and phishing campaigns are especially prolific, where hackers are sending out emails disguised as...more
With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more
Just recently, Equifax had the largest-ever settlement for a data breach. They are to pay at least $575 million, and potentially as much as $700 million, to settle allegations over its massive 2017 data breach. What we tell...more
Cybersecurity compliance, like the compliance profession, is rapidly growing. The forces pushing cyber compliance are two-fold: the ever-increasing and changing nature of cyber threats and harms, and the logical application...more
Hackers working on behalf of the Iranian government have been targeting the aviation and petrochemical industries in the United States, Saudi Arabia, and South Korean since 2013, according to a report released by FireEye...more
The recent cyberattack highlights the need for firms to engage in proactive prevention and protection. Ransomware (malware that encrypts data pending an extortion payment) is a recurring cyber threat that is growing more...more
We have read multiple reports on WannaCry and if you are reading this and don’t know what WannaCry is, Google it for the background story. The clear message is this is not the last major attack we will see, and future attacks...more
Ransomware attacks just went big time. In a period of mere hours late last week, a global ransomware attack infected more than 200,000 computers and affected more than 100,000 organizations in over 150 countries. To put this...more
Last week’s massive ransomware attack should serve as a wake-up call that companies across all industries and regions must take the threat of global cyber attacks seriously. Although investigators are still uncovering...more
A recent IBM study shows that ransomware increased 6,000 percent in 2016 over 2015. According to the report, ransomware was present in almost 40 percent of all spam email messages....more