#incident-response

[ follow ]
#cyber-attack
#cyberattack
fromIT Pro
4 days ago
Information security

Wall Street giants warned of data exposure following supply chain attack

fromIT Pro
4 days ago
Information security

Wall Street giants warned of data exposure following supply chain attack

#cybersecurity
fromIT Pro
2 weeks ago
UK politics

Cyber Security and Resilience Bill: Security experts question practicality, scope of new legislation

Information security
fromThe Hacker News
3 weeks ago

Why Early Threat Detection Is a Must for Long-Term Business Growth

Early threat detection and rapid response reduce incident costs, preserve revenue and reputation, and enable security to become a business growth enabler.
Information security
fromComputerWeekly.com
3 weeks ago

Pulling the plug: A way to halt a cyber attacker in your network? | Computer Weekly

Isolating affected network zones and pausing malicious communications can contain attackers while preserving remaining business operations and limiting data access.
fromIT Pro
2 weeks ago
UK politics

Cyber Security and Resilience Bill: Security experts question practicality, scope of new legislation

fromThe Hacker News
5 days ago

Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

Fortinet has warned that a new security flaw in FortiWeb has been exploited in the wild. The medium-severity vulnerability, tracked as CVE-2025-58034, carries a CVSS score of 6.7 out of a maximum of 10.0. It has been addressed in version 8.0.2. "An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in FortiWeb may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands," the company said.
Information security
fromIT Pro
5 days ago

Simulating attacks: how to use tabletop exercises in incident response

Among the benefits, tabletop exercises simulate a real-life attack so firms can put incident response plans to the test, including decision-making processes, communications and technical measures. When done well, tabletop exercises can expose blind spots and help response teams "build the muscle memory needed to act fast when the real thing hits", says Adam Harrison, managing director in the cyber security practice at FTI Consulting. So what types of tabletop exercises are available and how can you use them in your business?
Information security
Tech industry
fromNew Relic
1 week ago

What the Cloudflare Outage Teaches Us About System Limits and Latent Bugs

A dormant, hard-coded feature limit combined with a routine database change caused a production panic, demonstrating need for advanced observability to detect rare latent bugs.
Information security
fromTheregister
1 week ago

Overconfidence blamed as teams stumble through cyber sims.

Most cybersecurity teams are overconfident yet underprepared, scoring around 22 percent accuracy and taking roughly 29 hours to contain simulated major incidents.
#ransomware
fromSecuritymagazine
2 weeks ago

Where to Stretch Your Cybersecurity Budget

It's really important to go back to just the cybersecurity basics. Are you using multi-factor authentication? Are you training your staff and employees at all levels to not click that link? Are you patching your systems? Do you have good monitoring software and applications that are monitoring your network even when you're sleeping?
Information security
fromIT Pro
3 weeks ago

Inside a cloud outage

"The worst feeling in the world is to be in the middle of an incident and realize that it would be a great thing that you could do to resolve that incident, if only a tool had been built before, right? So it'd be great if you figure that out before you get into that incident, and then you have the tool ready to go. "
DevOps
Information security
fromTechzine Global
3 weeks ago

One in four organizations unprepared for cyber threats

Organizations are poorly prepared for cyberattacks due to human error, inadequate training, limited AI adoption, insufficient penetration testing, and weak incident response planning.
Business
fromSecuritymagazine
1 month ago

The Moment of Truth: Conducting Your BCP Test and Capturing Lessons

Effective BCP tests uncover flaws in a safe environment, build muscle memory, and generate actionable insights to strengthen organizational preparedness.
UK news
fromTheregister
4 weeks ago

UK lotto players land data jackpot thanks to website error

A technical error at People's Postcode Lottery briefly exposed names, addresses, email addresses, and birthdates of a small fraction of subscribers before services were restored.
Information security
fromThe Hacker News
3 weeks ago

The Death of the Security Checkbox: BAS Is the Power Behind Real Defense

Breach and attack simulation proves defenses by continuously testing live environments, prioritizing reaction and real-time validation over predictive, checklist-based security.
fromIT Pro
4 weeks ago

US telco confirms hackers breached systems in stealthy state-backed cyber campaign - and remained undetected for nearly a year

Ribbon supplies software, IP, and optical networking systems to telecoms service providers, businesses, and critical infrastructure organizations including BT, Verizon, CenturyLink, Deutsche Telekom, and Tata, as well as public-sector bodies such as the US Defense Department and the City of Los Angeles. In a with the US Securities and Exchange Commission (SEC), the company has revealed that "unauthorized persons, reportedly associated with a nation-state actor" had gained access to its network in December 2024.
Information security
Information security
fromwww.theguardian.com
1 month ago

I lost 25 pounds in 20 days': what it's like to be on the frontline of a global cyber-attack

A SolarWinds supply-chain cyberattack allowed Russian hackers remote access to thousands of customers, forcing emergency response, alternative communications, and global coordination by the company's CISO.
Information security
fromInfoQ
1 month ago

Slack Security: Inside the New Anomaly Event Response Architecture

Slack's Anomaly Event Response autonomously detects high-confidence threat behaviors and rapidly terminates affected sessions, reducing detection-to-mitigation time from hours to minutes.
Information security
fromDataBreaches.Net
1 month ago

F5 discloses breach tied to nation-state threat actor - DataBreaches.Net

F5 experienced a highly sophisticated cyberattack attributed to a nation-state, involving prolonged unauthorized access; DOJ permitted delayed public disclosure due to national security concerns.
#cloud-security
fromIT Pro
5 months ago
Information security

Cloud breaches are surging, but enterprises aren't quick enough to react

Information security
fromIT Pro
5 months ago

Cloud breaches are surging, but enterprises aren't quick enough to react

Cloud breaches remain undetected for significant durations due to alert fatigue and tool fragmentation.
fromDataBreaches.Net
1 month ago

Obsession with cyber breach notification fuelling costly mistakes - DataBreaches.Net

Regulations such as the General Data Protection Regulation (GDPR) and the Australian Prudential Regulation Authority's (Apra's) CPS 230 standard have led organisations to become "really obsessed" with the 72-hour notification window following a data breach, according to Shannon Murphy, global security and risk strategist at Trend Micro.
EU data protection
#data-breach
fromThe Verge
1 month ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

fromDataBreaches.Net
1 month ago
Information security

I called American Income Life Insurance to alert them to a data breach involving 150,000 customers. Here's why they didn't find out. - DataBreaches.Net

fromThe Verge
1 month ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

fromDataBreaches.Net
1 month ago
Information security

I called American Income Life Insurance to alert them to a data breach involving 150,000 customers. Here's why they didn't find out. - DataBreaches.Net

Information security
fromTechzine Global
1 month ago

SonicWall VPN accounts compromised with stolen login credentials

Over 100 SonicWall SSL VPN accounts were compromised using stolen valid credentials, enabling rapid access, reconnaissance, and attempts to access local Windows accounts.
fromThe Verge
1 month ago

Discord says 70,000 users may have had their government IDs leaked in breach

Following last week's announcement about a security incident involving a third-party customer service provider, we want to address inaccurate claims by those responsible that are circulating online. First, as stated in our blog post, this was not a breach of Discord, but rather a third-party service we use to support our customer service efforts. Second, the numbers being shared are incorrect and part of an attempt to extort a payment from Discord.
Information security
fromSecuritymagazine
1 month ago

Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

The truth is, these teams are working on the same event. They're just seeing it from different angles. If they aren't connected, response becomes fragmented and valuable time gets lost. Connecting the Dots in Real Time This is where a unified approach to critical event management makes a real difference. It's not about layering on more tools. It's about connecting the ones already in place and giving people a shared view and a clear process when something goes wrong.
Information security
Information security
fromSecuritymagazine
1 month ago

The Future of Cybersecurity Training and What It Means for Employers

Effective cybersecurity training must combine hands-on, team-based practical experience with strategic business understanding to build resilient professionals.
Information security
fromComputerWeekly.com
1 month ago

Why it takes 11 hours to resolve one ID-related cyber incident | Computer Weekly

Fragmented, opaque enterprise environments cause identity-related incidents to average 11 hours to resolve, enabling attackers to pivot and escalate privileges rapidly.
fromTheregister
1 month ago

US Air Force investigates 'privacy-related issue'

"The preliminary investigation is ongoing, and we are assessing the scope of any concerns and any necessary required remediation," the spokesperson added. "We are in the process of evaluating technical remediation solutions and will act as appropriate. Compliance with the Privacy Act and identifying a solution for this technical problem is critical to the DAF to ensure warfighter readiness and lethality."
Privacy professionals
fromSecuritymagazine
2 months ago

First Line of Defense: The Role of Modern VMS in Supercharging Investigations

When an incident occurs, every second counts. Whether it's a security breach, theft, or an unauthorized access attempt, physical security teams must act quickly to determine what happened, who was involved, and what actions to take next. Digging through hours of footage, manually piecing together evidence, and cross-referencing logs can be slow and cumbersome. But with a modern video management system ( VMS), security teams can streamline investigations, improve response times, and uncover critical insights faster - "supercharging" their investigations.
Information security
Information security
fromComputerWeekly.com
2 months ago

From breach to resilience: How the Electoral Commission rebuilt its cyber defences | Computer Weekly

The UK's electoral system is critical national infrastructure vulnerable to cyber-attacks, requiring sustained investment and comprehensive rebuilding to ensure electoral resilience.
Information security
fromComputerworld
2 months ago

Why IT/Security alignment is the key to efficient operations

Misalignment between IT and security—driven by differing mandates and siloed data—creates unpatched vulnerabilities, delayed incident response, and increased operational and regulatory risk.
fromTheregister
2 months ago

Can't stop looking at the server dashboard? You aren't alone

A new survey confirms what many IT pros already know: downtime doesn't exist, with dashboards and alerts intruding on their free time. More than half of the 616 IT professionals surveyed (52 percent) said they checked dashboards during nights, weekends, or vacations, with 59 percent saying past outages had left them more obsessive about making sure that everything is working. A third of IT pros said they felt compelled to check in at least once an hour.
Tech industry
Information security
fromChannelPro
2 months ago

Cyber attacks: Can the channel save the day?

IT channel partners provide proactive, layered cybersecurity and incident response services that protect small and medium businesses lacking in-house resources.
Information security
fromDataBreaches.Net
2 months ago

Salesloft+Drift Update on Investigation Results - DataBreaches.Net

Threat actor accessed Salesloft GitHub and Drift AWS, stole OAuth tokens to access customer data; environments contained and credentials rotated.
Information security
fromSecuritymagazine
2 months ago

Jennifer Swann - Great Leaders Don't Just Manage Teams - They Build Them

Jennifer Swann progressed from bank teller to director-level information security, focusing on incident response, team building, and broad security programs including cloud and vulnerability management.
fromDevOps.com
3 months ago

From Incidents to Insights: The Power of Blameless Postmortems - DevOps.com

In complex systems, failure isn't a possibility - it's a certainty. Whether it's transactions vanishing downstream, a binary storage outage grinding builds to a halt, or a vendor misstep cascading into a platform issue, we have all likely seen firsthand how incidents unfold across a wide range of technical landscapes. Often, the immediate, apparent cause points to an obvious suspect like a surge in user activity or a seemingly overloaded component, only for deeper, blameless analysis to reveal a subtle, underlying systemic flaw that was the true trigger.
DevOps
fromDevOps.com
4 months ago

What the LLM Hype Gets Wrong: What it Takes to Build AI Agents That Work for Enterprises - DevOps.com

The leap from chatbot to AI agent is not just about adding automation - it's about architectural transformation, embedding reasoning and action in context.
Artificial intelligence
European startups
fromTechzine Global
5 months ago

CrowdStrike launches Falcon for AWS Security Incident Response

CrowdStrike introduces Falcon for AWS Security Incident Response, enhancing cloud cybersecurity with faster threat detection and incident response capabilities.
EU data protection
fromTechCrunch
5 months ago

Vanta bug exposed customers' data to other customers | TechCrunch

A product code change at Vanta exposed some customers' private data to others, affecting less than 4% of users.
UK news
fromIrish Independent
5 months ago

Man dead and child injured after shots fired in Carlow shopping centre, bomb squad called

A nine-year-old child was injured during a shooting incident at Fairgreen Shopping Centre in Carlow.
Business intelligence
fromNew Relic
6 months ago

How New Relic Catalogs improves developer productivity

Improving documentation and knowledge access can reduce incident response times.
Centralized catalogs can enhance engineering productivity by eliminating knowledge silos.
Onboarding processes can be streamlined with better system clarity and visibility.
Information security
fromSecuritymagazine
6 months ago

Deepfake Scam or Inside Job? Rethinking the BEC Threat

The growing sophistication of BEC attacks, using deepfake technology, presents new challenges for businesses in verifying incidents and handling potential insider threats.
Information security
fromDatabreaches
6 months ago

OK: Cyberattack shuts down Bartlesville School network, state testing postponed

A network security incident disrupted Bartlesville Public Schools' systems, leading to canceled state testing and an investigation into the breach.
Artificial intelligence
fromInfoWorld
7 months ago

5 ways generative AI boosts cloud and IT operations

Generative AI simplifies IT and cloud operations, enhancing efficiency in incident response, security, infrastructure management, and financial operations.
[ Load more ]