Cyber Threats
Hinshaw Insurance Law TV – Cybersecurity Part One: Data Breach Notification
Defense In-Depth: Cybersecurity For Energy
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Cyber Insurance 101: What It Is And Why You Need It
Phishing and Vishing and Smishing (Oh my!): New Types of Scams Require Increased Vigilance
K&L Gates Triage: Cyber Insurance Issues for the Healthcare Industry
Crypto Payments Firms Announce New Integrations and Initiatives - According to reports, fintech bank Revolut recently announced a partnership with Ledger, a major crypto hardware wallet provider, to make it easier for...more
The systems healthcare providers use to provide safe and reliable patient care, and their confidential patient information, provide attractive targets for hackers using ransomware to extort payment....more
As many have learned over the last several years, ransomware is a type of malware that denies affected users access to critical data by encrypting it. Attackers profit handsomely by requiring victims to pay substantial sums,...more
The hackers behind the Sodinokibi/REvil ransomware have reportedly switched their demands for payment from Bitcoin or Ethereum to Monero cryptocurrency to try to prevent law enforcement from tracking payments....more
In a gripping tale sure to excite die-hard Potter fans everywhere, the English High Court has granted a so-called ‘Harry Potter injunction‘ (i.e. a protective injunction against persons unknown) restraining the dissipation of...more
Stablecoin Activity Heats Up, Bitcoin’s Speculation Problem and Other Payments News - Despite the increase in major companies opening up payment options in bitcoin, research from Chainalysis shows that only 1.3% of bitcoin...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the European Data Protection Board's published opinions on data protection impact assessments, an Ohio court's ruling that bitcoin is covered insured...more
The Federal Energy Regulatory Commission (FERC) announced on July 19, 2018, that it is directing the North American Electric Reliability Corporation (NERC) “to develop and submit modifications to the NERC Reliability...more
With every new technology, there are security risks. Blockchain is no exception. The recently published McAfee Blockchain Threat Report by McAfee’s Advanced Threat Research team analysts explains the current threats against...more
U.S. Estimates that Cyber Hacks Cost Up to $109 Billion in 20 - The Council for Economic Advisors (CEA) issued a report this month, entitled “The Cost of Malicious Cyber Activity to the U.S. Economy,” which concludes that...more
Lazarus, the well-known hacking group responsible for the WannaCry ransomware attack from last year, as well as the attack on the Bangladesh Central Bank and Sony, is now targeting global financial firms and Bitcoin adopters...more
This episode provides an overview of the major cyber security issues affecting the health care industry. Given that health care is one of the most frequently targeted industries by data hackers, this episode outlines the...more
A major global ransomware attack going by the name of WannaCry was recently short circuited by the registration of a single domain name costing just over $10. The unregistered domain name consisting of random characters was...more
This is not a drill. Companies and law enforcement agencies around the world have been left scrambling after the world’s most prolific ransomware attack hit over 500,000 computers in 150 countries over a span of only 4...more
Recently, a widespread global ransomware attack has struck hospitals, communication, and other types of companies and government offices around the world, seizing control of affected computers until the victims pay a ransom. ...more
A series of cyberattacks featuring ransomware rocked the world this weekend, and the aftershocks “could linger” for a while....more
In recent years, businesses have witnessed the proliferation of cyber attacks, hacking, and other digital threats. One common threat is ransomware. In a ransomware attack, a company may lose access to critical systems and...more
Ransomware, a specialized form of malware used for extortion attempts, has been around the internet for more than a decade but now, because of a rash of recent attacks, has moved to the forefront as the most problematic cyber...more
We have been alerting all of our readers to the nightmares of ransomware, and that the healthcare industry is a prime target. Just when you thought it couldn’t get any worse, a new strain of ransomware, known as Jigsaw,...more
Big name companies, government agencies and individuals are all falling victim to “ransomware” attacks in record and still-rising numbers. Recently, Hollywood Presbyterian Hospital’s communications capabilities were disabled...more
Security threats to healthcare providers continue to be fluid and fast-paced, as the most recent publicized cyberattack demonstrates. On February 5, 2016, hackers took control of the computer systems at Hollywood Presbyterian...more
A few weeks ago Los Angeles-based hospital Hollywood Presbyterian Medical Center fell victim to cyber criminals who infiltrated and disabled the hospital’s computer network through the use of ransomware. The malware...more
The recent malware attack on Hollywood Presbyterian Medical Center is an example of the latest trend in security concerns, called “ransomware.” Hollywood Presbyterian’s networks were infiltrated by malware that encrypted key...more
Hollywood Presbyterian Medical Center revealed on Wednesday that is was the victim of a cyber incident resulting in the hospital paying a cyber-ransom of $17,000 in Bitcoins. On February 5th hackers used malware that locks...more
Ransomware is a type of malware that locks access to a computer and its drives. Many forms of ransomware take complete control of the computer system, encrypt all of the files, and deny access to the system and any files...more