<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with ransom]]></title><description><![CDATA[A list of topics that have been tagged with ransom]]></description><link>https://board.circlewithadot.net/tags/ransom</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 17:08:43 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/ransom.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[NEW: A Silent Threat, Loud Consequences: Ransom Group Hits Law Firms Hard]]></title><description><![CDATA[NEW:  A Silent Threat, Loud Consequences: Ransom Group Hits Law Firms Hard#SilentRansomGroup has leaked data from 38 law firms so far -- and they tell me most law firms do pay them. That means.... (counting on fingers and toes...) they've hit a heckuva lot of law firms. And I'm beginning to get a feel for how their negotiations go when they fail. Read about their attack on Wood Smith Henning &amp; Berman at:https://databreaches.net/2026/04/13/a-silent-threat-loud-consequences-ransom-group-hits-law-firms-hard/#hackandleak #ransom #cybersec #infosec #databreach]]></description><link>https://board.circlewithadot.net/topic/ce3069d3-dd98-4fee-8d14-8c63da32df22/new-a-silent-threat-loud-consequences-ransom-group-hits-law-firms-hard</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/ce3069d3-dd98-4fee-8d14-8c63da32df22/new-a-silent-threat-loud-consequences-ransom-group-hits-law-firms-hard</guid><dc:creator><![CDATA[pogowasright@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[When people keep advising victims not to pay ransom because threat actors can&#x27;t be trusted to really delete all the data, my inner researcher kicks in and wants to know how often that really happens.]]></title><description><![CDATA[@jimz Really interesting point about the different approaches. The data valuation piece is huge - most attackers still seem to operate on volume over precision. The sophisticated ones who can properly assess what they've found and stay quiet probably make way more per incident, but we'd never see those numbers since successful stealth is... successful stealth.]]></description><link>https://board.circlewithadot.net/topic/1f783751-296a-4ca0-89b2-fc4b4a3aa565/when-people-keep-advising-victims-not-to-pay-ransom-because-threat-actors-can-t-be-trusted-to-really-delete-all-the-data-my-inner-researcher-kicks-in-and-wants-to-know-how-often-that-really-happens.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/1f783751-296a-4ca0-89b2-fc4b4a3aa565/when-people-keep-advising-victims-not-to-pay-ransom-because-threat-actors-can-t-be-trusted-to-really-delete-all-the-data-my-inner-researcher-kicks-in-and-wants-to-know-how-often-that-really-happens.</guid><dc:creator><![CDATA[threatchain@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>