{"id":28256,"date":"2025-05-23T06:58:00","date_gmt":"2025-05-23T05:58:00","guid":{"rendered":"https:\/\/nihoncyberdefence.co.jp\/?p=28256"},"modified":"2025-05-23T06:59:18","modified_gmt":"2025-05-23T05:59:18","slug":"ransomhubs-collapse-and-the-ransomware-cartel-model","status":"publish","type":"post","link":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/","title":{"rendered":"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28256\" class=\"elementor elementor-28256\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-286c4bfa elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"286c4bfa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-493d523c\" data-id=\"493d523c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-516f58cb wpr-post-info-align-center elementor-widget elementor-widget-wpr-post-info\" data-id=\"516f58cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"wpr-post-info wpr-post-info-horizontal\"><li class=\"wpr-post-info-taxonomy\"><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/threat-intelligence\/\">Threat Intelligence<\/a><\/li><li class=\"wpr-post-info-date\"><span>May 23, 2025<\/span><\/li><\/ul>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-719e8984 elementor-widget elementor-widget-heading\" data-id=\"719e8984\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ad89315 elementor-widget elementor-widget-heading\" data-id=\"6ad89315\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A Turning Point in the Ransomware-as-a-Service Ecosystem<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f06fd5 elementor-widget elementor-widget-html\" data-id=\"5f06fd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"custom-share-buttons\">\r\n    <a class=\"share-btn twitter\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-x-twitter\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn linkedin\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-linkedin-in\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn whatsapp\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-whatsapp\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn copy-link\" href=\"#\" title=\"Copy link\">\r\n        <i class=\"fas fa-link\"><\/i>\r\n    <\/a>\r\n<\/div>\r\n\r\n<!-- Font Awesome -->\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.5.1\/css\/all.min.css\">\r\n\r\n<script>\r\n    \/\/ Get current URL, title, and featured image\r\n    const postUrl = window.location.href;\r\n    const encodedUrl = encodeURIComponent(postUrl);\r\n    const postTitle = encodeURIComponent(document.title);\r\n    const ogImage = document.querySelector('meta[property=\"og:image\"]');\r\n    const postImage = ogImage ? encodeURIComponent(ogImage.getAttribute('content')) : '';\r\n\r\n    \/\/ Update share buttons\r\n    document.querySelector('.share-btn.twitter').href = `https:\/\/twitter.com\/intent\/tweet?url=${encodedUrl}&text=${postTitle}`;\r\n    document.querySelector('.share-btn.linkedin').href = `https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=${encodedUrl}`;\r\n    document.querySelector('.share-btn.whatsapp').href = `https:\/\/api.whatsapp.com\/send?text=${postTitle}%20${encodedUrl}`;\r\n\r\n    \/\/ Copy link functionality with alert\r\n    document.querySelector('.share-btn.copy-link').addEventListener('click', (e) => {\r\n        e.preventDefault();\r\n        navigator.clipboard.writeText(postUrl).then(() => {\r\n            alert('Link copied!');\r\n        }).catch(err => {\r\n            console.error('Failed to copy: ', err);\r\n            alert('Failed to copy the link!');\r\n        });\r\n    });\r\n<\/script>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69847e65 elementor-widget elementor-widget-image\" data-id=\"69847e65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1260\" height=\"556\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-1.png?fit=1260%2C556&amp;ssl=1\" class=\"attachment-full size-full wp-image-28311\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-1.png?w=1260&amp;ssl=1 1260w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-1.png?resize=300%2C132&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-1.png?resize=1024%2C452&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-1.png?resize=768%2C339&amp;ssl=1 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">As ransomware groups evolve into decentralised cartels, situational awareness and coordinated response are critical for Japan\u2019s digital resilience.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d293302 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3d293302\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2d706cd4\" data-id=\"2d706cd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40d273ce elementor-widget elementor-widget-text-editor\" data-id=\"40d273ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In late March 2025, the ransomware group RansomHub abruptly ceased operations. Its leak site and victim negotiation portals went offline without warning. Within days, a competing group, DragonForce, publicly claimed RansomHub had migrated to its infrastructure and invited affiliates to join what it described as a \u201cransomware cartel.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3c28ee elementor-widget elementor-widget-text-editor\" data-id=\"b3c28ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While the claim remains unverified, the timing and messaging suggest a broader shift in the Ransomware-as-a-Service (RaaS) landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b194881 elementor-widget elementor-widget-text-editor\" data-id=\"b194881\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What emerged was not just another group takeover, but a signal that ransomware operations are evolving toward more decentralised, service-centric models.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba24ba0 elementor-widget elementor-widget-heading\" data-id=\"ba24ba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RansomHub Shutdown: What Happened and Why It Matters<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9903b79 elementor-widget elementor-widget-text-editor\" data-id=\"9903b79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>RansomHub had, by early 2025, become one of the most active RaaS groups globally, with frequent attacks across manufacturing, healthcare, and IT sectors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-876be5d elementor-widget elementor-widget-text-editor\" data-id=\"876be5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"MsoNormal\" style=\"mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: normal;\"><span lang=\"EN-US\" style=\"mso-ascii-font-family: Aptos; mso-fareast-font-family: 'Times New Roman'; mso-hansi-font-family: Aptos; mso-bidi-font-family: 'Times New Roman'; color: black; mso-themecolor: text1; mso-ansi-language: EN-US;\">Known for custom tooling and high-volume activity, it attracted experienced affiliates with generous revenue splits.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff68d4e elementor-widget elementor-widget-text-editor\" data-id=\"ff68d4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On 31 March, its infrastructure went dark. Two days later, DragonForce announced a new affiliate structure offering shared services \u2014 including leak sites, negotiation tools, and support \u2014 while allowing affiliates to operate under their own names.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be9c0ca elementor-widget elementor-widget-text-editor\" data-id=\"be9c0ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This franchise-style \u201ccartel\u201d model reflects a significant change in how ransomware groups structure themselves and scale operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb8cee8 elementor-widget elementor-widget-heading\" data-id=\"bb8cee8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Risks for Companies from Cartel-Style Ransomware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a2e63e elementor-widget elementor-widget-heading\" data-id=\"8a2e63e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ransomware Group Instability Creates Tactical Openings<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a5e4d6 elementor-widget elementor-widget-text-editor\" data-id=\"5a5e4d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>RansomHub\u2019s silence and the confusion that followed show how vulnerable even established RaaS groups are to disruption.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d0380b elementor-widget elementor-widget-text-editor\" data-id=\"3d0380b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For a brief time, defenders may benefit from reduced coordination among affiliates or abandoned victim engagements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42bf16e elementor-widget elementor-widget-heading\" data-id=\"42bf16e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Decentralised RaaS Models Increase Complexity<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6307284 elementor-widget elementor-widget-text-editor\" data-id=\"6307284\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DragonForce\u2019s cartel model allows affiliates to move more freely between brands and campaigns.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6212040 elementor-widget elementor-widget-text-editor\" data-id=\"6212040\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This flexibility increases the challenge for attribution, response planning, and negotiation, especially when infrastructure is shared across multiple actors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24871c9 elementor-widget elementor-widget-heading\" data-id=\"24871c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Japan is Likely Within Scope of DragonForce Expansion<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52d25e9 elementor-widget elementor-widget-text-editor\" data-id=\"52d25e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While RansomHub\u2019s focus was on North America and Europe, DragonForce has begun expanding into Asia and the Middle East.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-432ea70 elementor-widget elementor-widget-text-editor\" data-id=\"432ea70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Japanese organisations, particularly those in <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/safeguarding-japans-critical-infrastructure\/\">manufacturing and logistics,<\/a> should anticipate being drawn further into scope.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6d1641 elementor-widget elementor-widget-heading\" data-id=\"a6d1641\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implications for Japan\u2019s Cyber Resilience and Digital Sovereignty<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc84d7f elementor-widget elementor-widget-text-editor\" data-id=\"bc84d7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This evolution comes as Japan\u2019s national cyber strategy enters a new phase, with the Active Cyber Defence bill and other initiatives placing greater emphasis on private\u2013public coordination.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c09dcc elementor-widget elementor-widget-text-editor\" data-id=\"4c09dcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The rise of agile, service-oriented criminal ecosystems presents new challenges for defenders, regulators, and response teams alike.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c0b54f elementor-widget elementor-widget-text-editor\" data-id=\"3c0b54f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Organisations that rely on complex supply chains or operate in critical sectors must be prepared for adversaries who are faster-moving, better resourced, and less centralised.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-129641b elementor-widget elementor-widget-text-editor\" data-id=\"129641b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A strong understanding of how these structures operate is key to effective defence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41c4827 elementor-widget elementor-widget-heading\" data-id=\"41c4827\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Organisations Can Do Now<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a20df0 elementor-widget elementor-widget-text-editor\" data-id=\"1a20df0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li>Review exposure to third-party risk and critical supply chains<\/li><li>Rehearse incident response scenarios that include ransomware group collapse or affiliate defection<\/li><li>Monitor dark web trends to detect early shifts in attacker infrastructure or targeting patterns<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-092f125 elementor-widget elementor-widget-heading\" data-id=\"092f125\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Cyber Strategy Must Evolve with the Adversary<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfd72fd elementor-widget elementor-widget-text-editor\" data-id=\"bfd72fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"MsoNormal\" style=\"mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: normal;\"><span lang=\"EN-US\" style=\"mso-ascii-font-family: Aptos; mso-fareast-font-family: Aptos; mso-hansi-font-family: Aptos; mso-bidi-font-family: Aptos; color: black; mso-themecolor: text1; mso-ansi-language: EN-US;\">RansomHub\u2019s collapse and DragonForce\u2019s opportunistic rise reflect more than a leadership transition.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11e3fac elementor-widget elementor-widget-text-editor\" data-id=\"11e3fac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>They mark a shift in how cybercriminal operations are structured and scaled. Understanding these changes is essential to anticipating future risk.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c1b673 elementor-widget elementor-widget-text-editor\" data-id=\"7c1b673\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"MsoNormal\" style=\"line-height: normal; margin: 12.0pt 0cm 12.0pt 0cm;\"><span lang=\"EN-US\" style=\"mso-ascii-font-family: Aptos; mso-fareast-font-family: Aptos; mso-hansi-font-family: Aptos; mso-bidi-font-family: Aptos; color: black; mso-themecolor: text1; mso-ansi-language: EN-US;\">At <b>Nihon Cyber Defence<\/b>, we monitor underground activity, affiliate migration, and emerging attack models not only to support technical response, but to inform strategic decision-making.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b01b48 elementor-widget elementor-widget-text-editor\" data-id=\"6b01b48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Strengthening Japan\u2019s <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/japans-active-cyber-defense-bill-passes-lower-house\/\">digital sovereignty<\/a> requires this dual perspective both operational and forward-looking. <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/contact-us\/\">Contact Us.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3c0fd9db\" data-id=\"3c0fd9db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e882b87 elementor-widget elementor-widget-html\" data-id=\"e882b87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Load Roboto font from Google Fonts -->\r\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Roboto:wght@400;500;700&display=swap\" rel=\"stylesheet\" \/>\r\n\r\n<div class=\"modern-profile-card\">\r\n  <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/toshio-nawa\/\" target=\"_blank\">\r\n    <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/04\/ToshioNawaBW.jpg?ssl=1\" alt=\"toshio-nawa\" class=\"profile-image\" \/>\r\n  <\/a>\r\n\r\n  <div class=\"profile-content\">\r\n    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/toshio-nawa\/\" target=\"_blank\" class=\"profile-name-link\">\r\n      Toshio Nawa\r\n    <\/a>\r\n    <p class=\"profile-title\">\r\n      <em>Chief Technology Officer (CTO)<\/em>\r\n    <\/p>\r\n    <p class=\"profile-description\">\r\n      After military and JPCERT\/CC experience, Nawa joined Nihon Cyber Defence in 2018, specializing in CSIRT and threat intelligence advisory. \r\n    <\/p>\r\n  <\/div>\r\n<\/div>\r\n\r\n<style>\r\n  .modern-profile-card {\r\n    max-width: 580px;\r\n    margin: 0 auto;\r\n    padding: 16px 20px;\r\n    background-color: #ffffff;\r\n    border: 1px solid #e5e7eb;\r\n    border-radius: 2px;\r\n    box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1); \/* \ud83d\udc48 Shadow from #more-services *\/\r\n    font-family: 'Roboto', sans-serif;\r\n    display: flex;\r\n    flex-direction: column;\r\n    align-items: center;\r\n  }\r\n\r\n  .profile-image {\r\n    width: 100%;\r\n    max-width: 260px;\r\n    border-radius: 10px;\r\n    object-fit: cover;\r\n    margin-bottom: 16px;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-image:hover {\r\n    opacity: 0.9;\r\n  }\r\n\r\n  .profile-content {\r\n    text-align: center;\r\n    width: 100%;\r\n  }\r\n\r\n  .profile-name-link {\r\n    display: block;\r\n    font-size: 1.1rem;\r\n    font-weight: 700;\r\n    text-transform: uppercase;\r\n    letter-spacing: 0.4px;\r\n    margin-bottom: 6px;\r\n    text-decoration: none;\r\n    color: #ce0047;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-name-link:hover {\r\n    opacity: 0.85;\r\n  }\r\n\r\n  .profile-title {\r\n    font-size: 0.8rem;\r\n    color: #666;\r\n    margin-bottom: 12px;\r\n    line-height: 1.4;\r\n    font-style: italic;\r\n  }\r\n\r\n  .profile-description {\r\n    font-size: 0.88rem;\r\n    color: #333;\r\n    line-height: 1.6;\r\n  }\r\n\r\n  @media (max-width: 480px) {\r\n    .modern-profile-card {\r\n      padding: 14px 16px;\r\n    }\r\n\r\n    .profile-name-link {\r\n      font-size: 1rem;\r\n    }\r\n\r\n    .profile-title {\r\n      font-size: 0.78rem;\r\n    }\r\n\r\n    .profile-description {\r\n      font-size: 0.85rem;\r\n    }\r\n  }\r\n<\/style>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b2a5 elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"4d4b2a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\/* Start custom CSS for html, class: .elementor-element-e56c3b6 *\/\/* Styling for More Services Section *\/\r\n#more-services {\r\n  padding: 20px;\r\n  background-color: #ffffff;\r\n  border-radius: 2px;\r\n  box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1);\r\n}\r\n\r\n#more-services .widget-title {\r\n  font-size: 1.5rem;\r\n  font-weight: bold;\r\n  color: #ce0047;\r\n  margin-bottom: 10px;\r\n  border-bottom: 2px solid #ce0047;\r\n  display: inline-block;\r\n  padding-bottom: 5px;\r\n}\r\n\r\n#more-services nav ul {\r\n  list-style: none;\r\n  padding: 0;\r\n}\r\n\r\n#more-services nav ul li {\r\n  margin: 10px 0;\r\n}\r\n\r\n#more-services nav ul li a {\r\n  text-decoration: none;\r\n  font-size: 1rem;\r\n  color: black;\r\n  transition: color 0.3s ease;\r\n}\r\n\r\n#more-services nav ul li a:hover {\r\n  color: #ce0047;\r\n}\/* End custom CSS *\/<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26192\" class=\"elementor elementor-26192\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e182c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2e182c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f1fdc3d\" data-id=\"f1fdc3d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e56c3b6 elementor-widget elementor-widget-html\" data-id=\"e56c3b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-widget-container\">\r\n    <aside id=\"more-services\" class=\"widget widget_more_services\">\r\n        <h2 class=\"widget-title\">Explore NCD Services<\/h2>\r\n        <nav aria-label=\"More Services\">\r\n            <ul>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/services\/#protective-services\">Protective Services<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Security Operations<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">NCD SIEM<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management Services<\/a><\/li>\r\n            <\/ul>\r\n        <\/nav>\r\n    <\/aside>\r\n<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=ncd_service_sidebar_mar25\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b5aa18 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3b5aa18\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-969444c\" data-id=\"969444c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4277e91 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4277e91\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08b7728 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"08b7728\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8303ae8\" data-id=\"8303ae8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd4d10e elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"fd4d10e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-24612 .elementor-element.elementor-element-65c14fa:not(.elementor-motion-effects-element-type-background), .elementor-24612 .elementor-element.elementor-element-65c14fa > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-astglobalcolor5 );}.elementor-24612 .elementor-element.elementor-element-65c14fa{transition:background 0.3s, border 0.3s, border-radius 0.3s, box-shadow 0.3s;padding:40px 0px 0px 0px;}.elementor-24612 .elementor-element.elementor-element-65c14fa > .elementor-background-overlay{transition:background 0.3s, border-radius 0.3s, opacity 0.3s;}.elementor-24612 .elementor-element.elementor-element-20a4c35 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;-webkit-text-stroke-color:#000;stroke:#000;color:var( --e-global-color-3f44114 );}.elementor-24612 .elementor-element.elementor-element-9871ba7{font-family:\"Roboto\", Sans-serif;font-size:18px;}.elementor-24612 .elementor-element.elementor-element-9871ba7 p{margin-block-end:0px;}.elementor-24612 .elementor-element.elementor-element-f2ac74a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-f2ac74a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;color:#CE0047;}.elementor-24612 .elementor-element.elementor-element-7e1fd79{text-align:center;}.elementor-24612 .elementor-element.elementor-element-7e1fd79 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;}.elementor-24612 .elementor-element.elementor-element-bf733a7{--spacer-size:10px;}.elementor-24612 .elementor-element.elementor-element-cad7d3a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-cad7d3a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;color:#CE0047;}.elementor-24612 .elementor-element.elementor-element-93dbb7a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-93dbb7a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;}.elementor-24612 .elementor-element.elementor-element-dbe8c8d > .elementor-widget-container{margin:10px 0px 0px 0px;}<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"24612\" class=\"elementor elementor-24612\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-65c14fa elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"65c14fa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-951cee2\" data-id=\"951cee2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20a4c35 elementor-widget elementor-widget-heading\" data-id=\"20a4c35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Maturity Assessment<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9871ba7 elementor-widget elementor-widget-text-editor\" data-id=\"9871ba7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nihon Cyber Defence (NCD) offers comprehensive\u00a0<a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Maturity Assessments<\/a>\u00a0designed to evaluate an organisations current cyber security capabilities, identify areas for improvement, and develop a strategic roadmap to enhance overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2ac74a elementor-widget elementor-widget-heading\" data-id=\"f2ac74a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Security Framework (NIST)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e1fd79 elementor-widget elementor-widget-heading\" data-id=\"7e1fd79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">National Institute of Standards and Technology<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3aa09b3 elementor-widget elementor-widget-image\" data-id=\"3aa09b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"404\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?fit=768%2C404&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-24616\" alt=\"NIST Framework Graphic\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=300%2C158&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=1024%2C538&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=768%2C404&amp;ssl=1 768w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=1536%2C807&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf733a7 elementor-widget elementor-widget-spacer\" data-id=\"bf733a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cad7d3a elementor-widget elementor-widget-heading\" data-id=\"cad7d3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Assessment Framework (CAF)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93dbb7a elementor-widget elementor-widget-heading\" data-id=\"93dbb7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">National Cyber Security Centre<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe8c8d elementor-widget elementor-widget-image\" data-id=\"dbe8c8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"680\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?fit=768%2C680&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-24618\" alt=\"CAF Framework Graphic\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?w=1342&amp;ssl=1 1342w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=300%2C266&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=1024%2C906&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=768%2C680&amp;ssl=1 768w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b09fb82 elementor-widget elementor-widget-text-editor\" data-id=\"b09fb82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Explore more of the NCD suite: <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/protective-services-2\/\">Protective Services<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Network Monitoring &amp; Security Operations<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">SIEM<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=cma_en\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f7c1e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5f7c1e6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0edaa14\" data-id=\"0edaa14\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53e0440 elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"53e0440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style1 .tpg-widget-heading::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style4::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .entry-title:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-el-image-wrap img{width:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder:hover .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .post-meta-tags a:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a{border-style:solid;border-width:1px 1px 1px 1px;border-color:#D4D4D4;}body .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a:hover{color:#CE0047;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination-wrap{justify-content:center;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover) > a{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover){color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li > a:not(:hover), .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > span{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:hover > a{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn:hover{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:focus,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:focus{color:#FFFFFF !important;background-color:#CE0047 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li.active > a{color:#FFFFFF;background-color:#CE0047;}<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26442\" class=\"elementor elementor-26442\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-366640da elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"366640da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc744a9\" data-id=\"dc744a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67c9a499 meta-visibility-show section-title-style-style1 title_position_default title_hover_border_default title-default img_hover_animation_default meta_position_default tpg-category-position-default readmore-btn-default-style grid-hover-overlay-type-always tpg-el-box-border-enable tpg-border-bottom-disable elementor-widget elementor-widget-tpg-grid-layout\" data-id=\"67c9a499\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tpg-grid-layout.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"rt-container-fluid rt-tpg-container tpg-el-main-wrapper clearfix grid-layout1-main \"\n\t\t\t id=\"rt-tpg-container-895717728\"\n\t\t\t data-layout=\"grid-layout1\"\n\t\t\t data-grid-style=\"tpg-full-height\"\n\t\t\t data-sc-id=\"elementor\"\n\t\t\t data-el-settings=''\n\t\t\t data-el-query=''\n\t\t\t data-el-path=''\n\t\t>\n\t\t\t\t\t\t<div class='tpg-header-wrapper '>\n\t\t\t\t\n        <div class=\"tpg-widget-heading-wrapper rt-clear heading-style1 \">\n            <span class=\"tpg-widget-heading-line line-left\"><\/span>\n\t\t\t<h2 class='tpg-widget-heading'>\n\t\t\t\n\t\t\t\t                    <span>\n\t\t\t\t\t\tMore from NCD\u200b\t\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t<\/h2>            <span class=\"tpg-widget-heading-line line-right\"><\/span>\n\n\t\t\t\n        <\/div>\n\n\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t<div data-title=\"Loading ...\" class=\"rt-row rt-content-loader grid-layout1 grid-behaviour tpg-full-height grid_layout_wrapper\">\n\t\t\t\t<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29266 post type-post status-publish format-standard has-post-thumbnail hentry category-103\"        data-id=\"29266\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/02\/ncdevent2026_v1.2-1-1.png?fit=768%2C327&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"327\"\n                             alt=\"NCD EVENT 2026\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Understanding Phishing and How to Stop it !!!<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/02\/05\/\">\n\t\t\t\t\tFebruary 5, 2026\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\" href=\"https:\/\/nihoncyberdefence.co.jp\/category\/%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\/\">\u30d7\u30ec\u30b9\u30ea\u30ea\u30fc\u30b9<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) is proud to host a special cybersecurity seminar on Tuesday, February 24, 2026. This exclusive event brings together leading experts from NCD, Netcraft, and the Japan Cyber...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29155 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29155\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/01\/DSC_0361-scaled.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence opens Kyiv office\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence opens Kyiv office<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/01\/20\/\">\n\t\t\t\t\tJanuary 20, 2026\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence Co., Ltd. (NCD) held an official opening reception for the Kyiv office in Kyiv, Ukraine on December 30, 2025, with the presence of His Excellency Ambassador Extraordinary and...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29073 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29073\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/NCSCOE.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/12\/28\/\">\n\t\t\t\t\tDecember 28, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence and Shizuoka City Announce Strategic Cooperation to Establish Nihon Cyber Shizuoka Centre of Excellence (NCSCOE)...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28997 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-ncsc tag-nihon tag-presentation\"        data-id=\"28997\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/11\/edited-photo.jpg?fit=768%2C319&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"319\"\n                             alt=\"Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/11\/18\/\">\n\t\t\t\t\tNovember 18, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tCartan McLaughlin, CEO of Nihon Cyber Defence (NCD)\u2014the first Japanese cybersecurity company to receive certification from the UK\u2019s National Cyber Security Centre (NCSC)\u2014will be speaking at this event...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28930 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-nihon tag-presentation\"        data-id=\"28930\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/08\/econosec-edited-1.png?fit=768%2C438&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"438\"\n                             alt=\"Exhibition and Presentation at ECONOSEC JAPAN 2025\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Exhibition and Presentation at ECONOSEC JAPAN 2025<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/09\/29\/\">\n\t\t\t\t\tSeptember 29, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defense (NCD) will be exhibiting at ECONOSEC Japan 2025, held at Sunshine City, Ikebukuro from September 30 to October 1, 2025, in partnership with Fivecast...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28687 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-cyber-diplomacy tag-cybersecurity-company-tokyo tag-cybersecurity-growth-japan tag-executive-appointment-cybersecurity tag-japan-cyber-defence-platform tag-japan-cybersecurity-leadership tag-japan-ukraine-cyber-security tag-ncd tag-ncd-japan tag-nihon-cyber-defence-en tag-public-private-cyber-cooperation tag-senior-advisor tag-sergiy-korsunsky tag-sovereign-cybersecurity-japan tag-ukrainian-ambassador-japan\"        data-id=\"28687\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/Korsunsky-NCD-EN-2.png?fit=768%2C339&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"339\"\n                             alt=\"Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/07\/09\/\">\n\t\t\t\t\tJuly 9, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) appoints former Ukrainian Ambassador to Japan, Dr. Sergiy Korsunsky, as Senior Advisor. Dr. Korsunsky will enhance NCD\u2019s international strategy and cyber defence leadership...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28732 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security-leadership tag-acd-compliance-strategy tag-acd-law-japan tag-blog tag-board-cyber-governance tag-business-continuity-japan tag-critical-infrastructure-cybersecurity-japan tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-executive-cyber-risk tag-japan-active-cyber-defence tag-meti-cybersecurity-guidance tag-ncd tag-ncd-governance-support tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan tag-toshio-nawa-cyber-insights\"        data-id=\"28732\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/what-acd-means-1.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Japanese train conductor on platform, preparing for departure highlighting metro rail as part of Japan\u2019s critical infrastructure.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">What Japan\u2019s ACD Law Means for Business Leaders<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/16\/\">\n\t\t\t\t\tJune 16, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-security-leadership\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-security-leadership\/\">Cyber Security Leadership<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tJapan\u2019s ACD Law places cyber risk accountability on boards and executives. Learn what leaders in CNI, finance, and manufacturing must now prioritise...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28665 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience tag-crisis-communications-cyber-attack tag-critical-infrastructure-cybersecurity-japan tag-cyber-incident-response tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-financial-services-cyber-resilience-japan tag-incident-management-service-japan tag-leadership-cyber-crisis-communications tag-ncd tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan\"        data-id=\"28665\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/crisis_communication.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Microphones at press conference, symbolising leadership communications during a cyber incident.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Crisis Communications in Cyber Incidents<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/12\/\">\n\t\t\t\t\tJune 12, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-resilience\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tHow leadership teams in Japan\u2019s CNI, Finance, and Manufacturing sectors can strengthen crisis communications in cyber incident response...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28638 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience tag-acd-law-japan tag-blog tag-critical-infrastructure-cybersecurity-japan tag-cti-integration tag-cti-japan tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-financial-sector-cybersecurity-japan tag-japan-cyber-threat-intelligence tag-ncd tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan\"        data-id=\"28638\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/CTI-1.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Business leader analysing cyber threat intelligence data visualisation on large digital display in cyber security operations centre, Japan.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">Integrating a Strategic CTI Function in Japan<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/10\/\">\n\t\t\t\t\tJune 10, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-resilience\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tHow Japanese enterprises can integrate Cyber Threat Intelligence (CTI) to strengthen cyber resilience, meet compliance, and protect critical sectors...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t\t<div class='rt-pagination-wrap' data-total-pages='4' data-posts-per-page='' data-type='pagination'><div class=\"rt-pagination\"><ul class=\"pagination-list\"><li class=\"active\"><span>1<\/span><\/li><li><a data-paged='2' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28256\/page\/2\/'>2<\/a><\/li><li><a data-paged='3' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28256\/page\/3\/'>3<\/a><\/li><li><a data-paged='4' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28256\/page\/4\/'>4<\/a><\/li><\/ul><\/div><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=more_from_ncd_english\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Learn how RansomHub\u2019s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors.<\/p>\n","protected":false},"author":1,"featured_media":28259,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[82],"tags":[530,527,440,531,525,474,285,469,66,528,524,523,526,471,529],"class_list":["post-28256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threat-intelligence","tag-cyber-attack-critical-infrastructure","tag-cyber-attack-supply-chain-japan","tag-cyber-resilience-japan","tag-cyber-threat-to-japanese-companies","tag-dragonforce-ransomware-japan","tag-japan-digital-sovereignty","tag-ncd","tag-ncd-japan","tag-nihon-cyber-defence-en","tag-raas-ecosystem-asia","tag-ransomhub-ransomware-shutdown","tag-ransomware-cartel-model-japan","tag-ransomware-trends-2025","tag-sovereign-cybersecurity-japan","tag-toshio-nawa-cto-ncd"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model - Nihon Cyber Defence<\/title>\n<meta name=\"description\" content=\"Learn how RansomHub\u2019s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model - Nihon Cyber Defence\" \/>\n<meta property=\"og:description\" content=\"Learn how RansomHub\u2019s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/\" \/>\n<meta property=\"og:site_name\" content=\"Nihon Cyber Defence\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-23T05:58:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T05:59:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1008\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\"},\"headline\":\"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model\",\"datePublished\":\"2025-05-23T05:58:00+00:00\",\"dateModified\":\"2025-05-23T05:59:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/\"},\"wordCount\":1060,\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/nawas-blog-2.png?fit=1008%2C445&ssl=1\",\"keywords\":[\"cyber attack critical infrastructure\",\"cyber attack supply chain Japan\",\"Cyber resilience Japan\",\"cyber threat to Japanese companies\",\"DragonForce ransomware Japan\",\"Japan digital sovereignty\",\"NCD\",\"NCD Japan\",\"Nihon Cyber Defence\",\"RaaS ecosystem Asia\",\"RansomHub ransomware shutdown\",\"ransomware cartel model Japan\",\"ransomware trends 2025\",\"sovereign cybersecurity Japan\",\"Toshio Nawa CTO NCD\"],\"articleSection\":[\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/\",\"name\":\"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model - Nihon Cyber Defence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/nawas-blog-2.png?fit=1008%2C445&ssl=1\",\"datePublished\":\"2025-05-23T05:58:00+00:00\",\"dateModified\":\"2025-05-23T05:59:18+00:00\",\"description\":\"Learn how RansomHub\u2019s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/nawas-blog-2.png?fit=1008%2C445&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/nawas-blog-2.png?fit=1008%2C445&ssl=1\",\"width\":1008,\"height\":445,\"caption\":\"As ransomware groups evolve into decentralised cartels, situational awareness and coordinated response are critical for Japan\u2019s digital resilience.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/ransomhubs-collapse-and-the-ransomware-cartel-model\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"name\":\"Nihon Cyber Defence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\",\"name\":\"Nihon Cyber Defence\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"width\":424,\"height\":164,\"caption\":\"Nihon Cyber Defence\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\"],\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model - Nihon Cyber Defence","description":"Learn how RansomHub\u2019s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/","og_locale":"en_US","og_type":"article","og_title":"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model - Nihon Cyber Defence","og_description":"Learn how RansomHub\u2019s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors.","og_url":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/","og_site_name":"Nihon Cyber Defence","article_published_time":"2025-05-23T05:58:00+00:00","article_modified_time":"2025-05-23T05:59:18+00:00","og_image":[{"width":1008,"height":445,"url":"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":false,"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/#article","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/"},"author":{"name":"admin","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43"},"headline":"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model","datePublished":"2025-05-23T05:58:00+00:00","dateModified":"2025-05-23T05:59:18+00:00","mainEntityOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/"},"wordCount":1060,"publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1","keywords":["cyber attack critical infrastructure","cyber attack supply chain Japan","Cyber resilience Japan","cyber threat to Japanese companies","DragonForce ransomware Japan","Japan digital sovereignty","NCD","NCD Japan","Nihon Cyber Defence","RaaS ecosystem Asia","RansomHub ransomware shutdown","ransomware cartel model Japan","ransomware trends 2025","sovereign cybersecurity Japan","Toshio Nawa CTO NCD"],"articleSection":["Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/","url":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/","name":"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model - Nihon Cyber Defence","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/#primaryimage"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1","datePublished":"2025-05-23T05:58:00+00:00","dateModified":"2025-05-23T05:59:18+00:00","description":"Learn how RansomHub\u2019s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors.","breadcrumb":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/#primaryimage","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1","width":1008,"height":445,"caption":"As ransomware groups evolve into decentralised cartels, situational awareness and coordinated response are critical for Japan\u2019s digital resilience."},{"@type":"BreadcrumbList","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/ransomhubs-collapse-and-the-ransomware-cartel-model\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/nihoncyberdefence.co.jp\/en\/"},{"@type":"ListItem","position":2,"name":"What Cyber Leaders Need to Know About RansomHub\u2019s Collapse and the Ransomware Cartel Model"}]},{"@type":"WebSite","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","name":"Nihon Cyber Defence","description":"","publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nihoncyberdefence.co.jp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization","name":"Nihon Cyber Defence","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","width":424,"height":164,"caption":"Nihon Cyber Defence"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nihoncyberdefence.co.jp"],"url":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1",1008,445,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=300%2C132&ssl=1",300,132,true],"medium_large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=768%2C339&ssl=1",768,339,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1",1008,445,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1",1008,445,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1",1008,445,true]},"uagb_author_info":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Learn how RansomHub\u2019s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors.","jetpack_sharing_enabled":true,"rttpg_featured_image_url":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1",1008,445,false],"landscape":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png",1008,445,false],"portraits":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png",1008,445,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=300%2C132&ssl=1",300,132,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1",1008,445,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1",1008,445,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/nawas-blog-2.png?fit=1008%2C445&ssl=1",1008,445,true]},"rttpg_author":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/threat-intelligence\/\" rel=\"category tag\">Threat Intelligence<\/a>","rttpg_excerpt":"Learn how RansomHub\u2019s collapse signals a shift to ransomware cartel models. NCD CTO Toshio Nawa explains what Japanese cyber leaders must know to defend critical sectors.","_links":{"self":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/comments?post=28256"}],"version-history":[{"count":5,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28256\/revisions"}],"predecessor-version":[{"id":28315,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28256\/revisions\/28315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media\/28259"}],"wp:attachment":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media?parent=28256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/categories?post=28256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/tags?post=28256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}