News & Analysis as of

Extortion Ransomware Data Breach

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Patterson Belknap Webb & Tyler LLP

Recent Ransomware Attacks Highlight the Evolving Challenges in Responding to Cyber Extortion

A spate of recent ransomware attacks illustrates the increasingly difficult calculations that businesses face following the theft or encryption of their data....more

Kohrman Jackson & Krantz LLP

A New Twist in the Ransomware Debate: Is it Negligent to Fail to Pay Ransom?

Lehigh Valley Health Network (LVHN) is a healthcare network based in Allentown, Pennsylvania, and serves eastern and northeastern Pennsylvania. On Feb. 6th of this year, LVHN was hit with a combination ransomware and...more

Burr & Forman

U.S. and Europe Target Top Ransomware Cartel

Burr & Forman on

An international law-enforcement effort has led to the arrest of multiple individuals affiliated with the most prolific ransomware cartel operating today. In November, Justice Department officials announced indictments and an...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2020 #3

Robinson & Cole LLP on

Natural Gas Compressor Facility Shut Down After Ransomware Attack - The Department of Homeland Security (DHS) announced this week that a ransomware attack shut down a natural gas compressor facility for two days. While in...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Fueling the Fire: How Extortion Has Changed the Face of Data Breaches

Ransomware attackers typically encrypt victims’ data and demand ransom in exchange for the decryption keys. Ransomware is not a new cybercriminal activity. In fact, ransomware attacks are over 30 years old. However, around...more

Robinson+Cole Data Privacy + Security Insider

OCR Warns of Cyber Extortion and Provides Checklist

In its January newsletter, the Office for Civil Rights (OCR) focused on cyber extortion, which it stated has “risen steadily over the past couple of years and continue to be a major source of disruption for many...more

K&L Gates LLP

K&L Gates Triage: Cyber Insurance Issues for the Healthcare Industry

K&L Gates LLP on

This episode provides an overview of the major cyber security issues affecting the health care industry. Given that health care is one of the most frequently targeted industries by data hackers, this episode outlines the...more

Robinson+Cole Data Privacy + Security Insider

Symantec releases “Ransomware and Businesses” report

Symantec Corp released its annual “Ransomware and Businesses” report this week outlining the increasing sophistication of ransomware attacks. Individuals continue to be the primary target of ransomware attacks as they usually...more

BCLP

Your Organization is Impacted by Ransomware - Now What?

BCLP on

Some forms of cyber extortion are automated and not targeted at any specific victim. For example, “ransomware” refers to a type of malware that prevents users from accessing their systems unless, and until, a ransom is paid....more

BCLP

How to Respond to a Cyber Extortion Demand

BCLP on

Cyber extortion refers to a situation in which a third party threatens that if an organization does not pay money, or take a certain action, the third party will take an adverse action against the organization. Among other...more

Butler Snow LLP

Ransomware: Electronic Extortion for a Digital Era

Butler Snow LLP on

Last month, the FBI asked the American Bar Association to share a cyberalert with its members warning of an increased risk of ransomware. Ransomware poses significant legal and operational risks to businesses. Personnel at...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide