News & Analysis as of

Corporate Counsel Ransomware

Shook, Hardy & Bacon L.L.P.

Ransomware Attacks Target SonicWall Firewall Vulnerability

Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over the past week, a large number of attacks by the ransomware group Akira have...more

Hogan Lovells

Australia mandates first-of-its-kind reporting of ransomware payments

Hogan Lovells on

Australia has implemented a first-of-its kind requirement for eligible businesses to report ransomware payments. From 30 May 2025, eligible businesses that make a payment in response to a cyber security incident, or become...more

Robinson+Cole Data Privacy + Security Insider

A Year in Privacy and Security: Privacy Violations, Large-Scale Data Breaches, and Big Fines and Settlements

2024 was a year chock-full of data breaches and privacy violations. Many new data privacy and cybersecurity regulations were introduced (and became effective), and regulators sent a strong message to businesses that privacy...more

Mintz

Patch, Investigate, and Defend: Critical and High Vulnerabilities in Cleo Managed File Transfer Solutions Reportedly Under Attack

Mintz on

There is news coming from the U.S. cyber community for organizations that use Cleo’s software products: if your organization or your vendors use Cleo’s Cleo Harmony, VLTrader, or LexiCom products, you may be at heightened...more

Morris, Manning & Martin, LLP

Navigating AI Risks. Part III: Leveraging Insurance to Mitigate AI Risks

Part III: Leveraging Insurance to Mitigate AI Risks - As boards navigate the complex landscape of AI integration, the risks associated with this powerful technology are multifaceted and evolving. From potential data breaches...more

BCLP

Navigating a Security Incident - Best Practices for Engaging Service Providers - September 2024

BCLP on

With the recent wave of ransomware and other security incidents, it is now more important than ever for impacted organizations to have a thorough understanding of each element of a proper data breach response. That includes...more

Akin Gump Strauss Hauer & Feld LLP

Cybersecurity After SolarWinds: Practical Guidance for CISOs Under the New Rules

Judge Engelmayer’s 107-page dismissal of most of the U.S. Securities and Exchange Commission (SEC)’s claims against SolarWinds provides valuable guidance, and some comfort, for public companies and Chief Information Security...more

Alston & Bird

Top 10 Issues General Counsel Need to Know About Ransomware in 2024

Alston & Bird on

Threat actors are evolving. Our Privacy, Cyber & Data Strategy Team explains how ransomware gangs have changed their tactics and how companies can respond to the threat while navigating new scrutiny from investors and...more

Davis Wright Tremaine LLP

Litigation Preparedness Following a Data Breach: Three Tips to Consider During the Incident Response Period

Data breaches come in many different forms, sizes, and levels of complexity, but they tend to share certain key facts: A third-party bad actor—whether through a phishing attack, a ransomware attack, exploitation of a zero-day...more

Morrison & Foerster LLP

Top 5 SEC Enforcement Developments for March 2023

In order to provide an overview for busy in-house counsel and compliance professionals, we summarize below some of the most important SEC enforcement developments from the past month, with links to primary resources...more

Wiley Rein LLP

White House Pivots on Cyber: Voluntary Compliance Carrots Are Being Replaced By Big Regulatory Sticks

Wiley Rein LLP on

The White House released the long-anticipated National Cybersecurity Strategy on March 2, 2023 setting out five (5) pillars articulating key themes and Administration priorities. Coming more than two years into the Biden...more

Alston & Bird

Lessons from DOJ’s First Prosecution of a Company Executive Covering Up a Data Breach

Alston & Bird on

Our Privacy, Cyber & Data Strategy and White Collar, Government & Internal Investigations teams offer key takeaways that companies should consider in the wake of the Justice Department’s first prosecution of a corporate...more

Troutman Pepper Locke

Piecing It All Together: OFAC Combines Seven Years of Regulations, Amendments, and Interpretations All in One

Troutman Pepper Locke on

Your business was hit with a ransomware attack over the weekend, and the critical systems are locked up (i.e., encrypted). To unlock those valuable systems and continue operating the business, the threat actor demands...more

Genova Burns LLC

Potential Harm Enough For Class Action to Proceed in Data Breach Litigation

Genova Burns LLC on

The Third Circuit Court of Appeals has given new life to a putative class action suit led by a former employee of a company that suffered a ransomware attack, leading to her sensitive information being released onto the Dark...more

BCLP

Ransomware - why paying up earns no credit with the UK's Data Protection Authority and others

BCLP on

In a joint letter this summer, the UK’s data protection regulator (the ICO) and the UK’s National Cyber Security Centre (the NCSC) sought to convey some key messages to the legal profession relevant to advising clients...more

Faegre Drinker Biddle & Reath LLP

HHS Ransomware Report Details Revival of Dangerous LOTL Cyberattack

On May 5, 2022, the U.S. Department of Health and Human Services (HHS) issued a report entitled “Ransomware Trends in the HPH Sector” (HHS Report) that reviewed key cybersecurity threats and trends affecting the U.S....more

Patterson Belknap Webb & Tyler LLP

Ransomware Attacks Case Studies Provide Rare Learning Opportunities

Ransomware attacks have become headline news in the mainstream media, and a hot topic not only on this blog but in government circles. And with good reason as the United States suffered a staggering 421.5 million ransomware...more

Ballard Spahr LLP

Cyber Incident Reporting for Critical Infrastructure Act Becomes Law

Ballard Spahr LLP on

On March 15, 2022, President Joe Biden signed into law the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), which increased funding for the federal Cybersecurity and Critical Infrastructure Agency (CISA) and...more

Woods Rogers

Proposed SEC Cybersecurity Rules Require Public Companies to Act Now

Woods Rogers on

This month, the Securities and Exchange Commission (SEC) proposed new cybersecurity disclosure rules for publicly traded companies. The comment period is ongoing, but the take-away for public companies is immediate: a public...more

Morgan Lewis

Update: Ukraine Conflict Has Implications for Cyberinsurance Policies, Including War Exclusions

Morgan Lewis on

The conflict in Ukraine has raised significant cybersecurity concerns for businesses in the United States and across the world, resulting in an increased focus on using cyberinsurance to mitigate any resulting losses. The...more

Jackson Lewis P.C.

Responding to the Kronos Cyber Attack – What Should Employers Be Thinking About?

Jackson Lewis P.C. on

According to reports, Kronos, the cloud-based, HR management service provider, suffered a data incident involving ransomware affecting its information systems. Kronos communicated that it discovered the incident late on...more

Zelle  LLP

Cyber Rulings Aren't Helping COVID Biz Interruption Cases

Zelle LLP on

Along with seeking to analogize COVID-19 physical loss or damage to that in the fumes or contaminants context, policyholders are now also attempting to rely on cases discussing the bounds of physical loss or damage in the...more

Perkins Coie

OFAC Releases New Detailed Guidance for the Digital Currency Industry

Perkins Coie on

On October 15, 2021, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) released guidance on sanctions compliance for the digital currency industry, the agency’s most detailed guidance to date on...more

Lowenstein Sandler LLP

Riding the Wave of Cyber Insurance Claim Payments: A Trend Cresting or Crashing?

Lowenstein Sandler LLP on

Ransomware attacks are on the rise. Cyber criminals continue to exploit lax security measures, which have become more acute in the work-from-home environment, and hack into companies’ systems, encrypt their data, and then...more

Troutman Pepper Locke

Sued for a Data Breach Out of State? Don't Forget a Personal Jurisdiction Defense

Troutman Pepper Locke on

Entities sued for a data breach – even one that is consolidated into a multidistrict litigation proceeding in the defendant’s home state – should not forget the personal jurisdiction defense, which can provide a powerful tool...more

53 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide