News & Analysis as of

Software Ransomware

Robinson+Cole Data Privacy + Security Insider

Joint Cybersecurity Advisory Released on Ghost (Cring) Ransomware

The Cybersecurity & Infrastructure Security Agency, the Federal Bureau of Investigation, and the Multi-State Information Sharing and Analysis Center released an advisory on February 19, 2025, providing information on Ghost...more

K&L Gates LLP

New Executive Order Bolsters the Nation's Cyber Defenses

K&L Gates LLP on

In a significant move to bolster the United States’ cybersecurity framework, President Biden issued an executive order (EO) on 16 January 2025 titled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity” days...more

Clark Hill PLC

Right To Know - December 2024, Vol. 24

Clark Hill PLC on

Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Mintz

Patch, Investigate, and Defend: Critical and High Vulnerabilities in Cleo Managed File Transfer Solutions Reportedly Under Attack

Mintz on

There is news coming from the U.S. cyber community for organizations that use Cleo’s software products: if your organization or your vendors use Cleo’s Cleo Harmony, VLTrader, or LexiCom products, you may be at heightened...more

Clark Hill PLC

Right To Know - October 2024, Vol. 22

Clark Hill PLC on

Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Health Care Compliance Association (HCCA)

Privacy Briefs: September 2024

The HHS Centers for Medicare & Medicaid Services (CMS) and Wisconsin Physicians Service Insurance Corporation (WPS) are notifying 946,801 people whose protected health information or other personally identifiable information...more

Orrick, Herrington & Sutcliffe LLP

FINRA publishes alert on critical software vulnerability

Recently, FINRA issued a cybersecurity alert bulletin to all member firms regarding a critical vulnerability within a software company’s transfer software, specifically affecting its Secure File Transfer Protocol module. The...more

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Guidepost Solutions LLC

Change Healthcare Ransomware Attack: 10 Lessons Learned

Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more

Guidepost Solutions LLC

Cyber Bullets for Small Law Firms

In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more

Ankura

Ankura CTIX FLASH Update - December 2023

Ankura on

Malicious Android Apps Used to Target Iranian Banks - An ongoing Android malware campaign targeting users of Iranian financial institutions has expanded to include new abilities to target an even greater number of people...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

Bradley Arant Boult Cummings LLP

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

Ankura

Ransomware: The Top 5 Myths and Misconceptions

Ankura on

Ransomware has become a major threat to businesses across the world as cyber-attacks are becoming increasingly sophisticated, resulting in devastating financial damage for companies that fall victim. Not only are important...more

Ankura

Notable Cyberattack Methods and Common Targets of 2022

Ankura on

Cyberattacks are a constant threat to businesses, organizations, governments, and individuals worldwide. In order to stay secure against cybercriminal activity, it is essential to understand the various cyberattack methods...more

McGuireWoods LLP

Ohio Supreme Court Holds that Insurance Policy Does Not Cover Ransomware Attack on Software

McGuireWoods LLP on

In a unanimous decision, the Ohio Supreme Court found that appellee EMOI Services, LLC’s (“EMOI”) businessowners insurance policy does not cover losses resulting from a ransomware attack on EMOI’s computer software systems....more

Zelle  LLP

How Ohio Software Ruling Implicates Crypto Insurance Claims

Zelle LLP on

In the last week of December 2022, the Ohio Supreme Court published a much-anticipated decision in the EMOI Services LLC v. Owners Insurance Co. case. The decision was bold, and the court made no attempt to limit its holding...more

Hinshaw & Culbertson - Privacy, Cyber & AI...

Ohio Supreme Court Rules No Coverage For Ransomware Attack Under BOP Policy Because Computer Software Sustained No Direct Physical...

The Ohio Supreme Court waited until the last week of the year to issue what may be the most important silent coverage decision of 2022. Direct physical injury is a fundamental requirement of first-party property policies. The...more

Kohrman Jackson & Krantz LLP

Ohio Supreme Court Rules Insurance Policy Does Not Cover Ransomware Attack on Software

Ransomware insurance coverage has become increasingly popular in recent years as the threat of ransomware attacks has continued to grow. However, despite the widespread adoption of this type of insurance, there are still...more

Proskauer - Law and the Workplace

What to Do When Your Timekeeping System Crashes

A number of companies suffered collateral damage last winter as a result of a cyber attack on a major provider of time and attendance software.  With your timekeeping systems compromised, how do you determine what to pay your...more

Ankura

Ankura CTIX FLASH Update - October 2022

Ankura on

New NullMixer Malware Campaign Spreading Through Cracked Software Websites - An emerging campaign was recently discovered by Kaspersky researchers spreading the "NullMixer" malware. NullMixer exfiltrates victims'...more

Ankura

Ankura CTIX FLASH Update - August 2022 - 2

Ankura on

Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more

Pillsbury - Policyholder Pulse blog

War Exclusion Does Not Bar Recovery for Losses from a Nation-State Cyber Attack on Pharma Giant and the Effects on Insurance...

Over the past few years, ransomware attacks have increased in frequency and demand size. And, increasingly, those attacks have targeted businesses and critical infrastructure organizations from across the globe. This trend is...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

Log4J - Who does it impact?

Takeaway: Organizations of all types and sizes should actively manage exposure to loss due to the Log4j vulnerability. Doing so will not be easy. The Log4j program is present in so many applications that the magnitude of the...more

Husch Blackwell LLP

The Private Sector Should Heed White House Warning On Cyber Resilience Because Compliance Is Coming

Husch Blackwell LLP on

The increased concern about ransomware incidents from both quantitative and severity standpoints, spurred the White House to urge corporate business leaders to improve their defenses and resilience posture against ransomware...more

36 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide