Waqas reports: A joint advisory from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) reveals the ongoing threat of Ghost ransomware, also known as Cring. Active since early 2021, this group, operating out of China, has targeted organizations in over 70 countries, impacting…
Category: Commentaries and Analyses
Privilege Under Pressure: The Shifting Data Breach Investigation Landscape
Jena M. Valdetero and Emily S. Taetzsch of Greenberg Traurig, LLP write that in recent years, federal courts have narrowed the scope of protection for forensic reports produced in response to data breaches. As part of her discussion, she cites the Capital One case in 2020, the Wengui case in 2021, the Rutter’s case a few…
How federal rules on cybersecurity breach transparency for businesses were challenged in court in 2024
Dom DiFurio reports: In October, four companies collectively paid nearly $7 million as part of a settlement with the Securities and Exchange Commission for allegedly failing to properly inform investors of a cyberbreach affecting their companies, a liability American businesses have not previously faced. The companies were compromised in a cyberattack targeting their IT software provider in…
There’s a new ransomware player on the scene: the ‘BlackLock’ group has become one of the most prolific operators in the cyber crime industry – and researchers warn it’s only going to get worse for potential victims
Solomon Klappholz reports: The BlackLock ransomware group has become one of the most prolific operators in the Ransomware as a Service (RaaS) ecosystem, with experts warning it could accelerate its growth over the next year. Also known as El Dorado, BlackLock was ranked as the the seventh most active ransomware group based on the number of posts…
Deal leaks: data protection during M&A
Fraser Tennant reports: …. The reality is that M&A practitioners, in their quest to negotiate the best possible deal, may be less focused on the tools that are used to store and share confidential transactional data – both internally and externally. This can leave such data highly vulnerable to hackers with malicious intent. “Threat actors…
The Myth of Jurisdictional Privacy
by Stephen Gielda Founder, Packetderm LLC Understanding Global Surveillance In discussions of online privacy, you’ll often hear passionate debates about jurisdiction, with particular focus on avoiding the “Five Eyes” intelligence alliance countries (USA, UK, Canada, Australia, and New Zealand). The argument goes that by choosing a service provider outside these nations, you can somehow escape…