#incident-response

[ follow ]
Information security
fromSecuritymagazine
1 day ago

Enhancing Incident Response with Integrated Access Control and Video Verification

Integrated access control and video verification technology enhance incident response capabilities and operational resilience by providing situational clarity and enabling faster security action.
Software development
fromInfoWorld
13 hours ago

The reliability cost of default timeouts

Unbounded waiting in distributed systems causes slowness to manifest as outages before traditional failure detection triggers, draining capacity and degrading user experience.
fromReadWrite
2 days ago

Second lawsuit targets Wynn data breach claims

We have learned that an unauthorized third party acquired certain employee data. Upon discovery, we immediately activated our incident response protocols and launched a thorough investigation with the help of external cybersecurity experts. The unauthorized third party has stated that the stolen data has been deleted. We are monitoring and to date have not seen any evidence that the data has been published or otherwise misused.
Information security
Information security
fromInfoWorld
2 days ago

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

Attackers used repeatable naming conventions across multiple repositories to establish infrastructure for supply chain attacks, requiring organizations to implement immediate containment and long-term developer trust boundary protections.
Information security
fromTechzine Global
4 days ago

Why cyberattacks don't require advanced hacking

Poor cyber hygiene, weak identity security, overdue IT maintenance, and incomplete logging make organizations vulnerable to financially motivated attacks such as ransomware and email fraud.
Information security
fromDataBreaches.Net
6 days ago

This is how you do it: Dentist speaks out after practice hit by cyber attack - DataBreaches.Net

A dental practice's computer system was hacked, sending fraudulent invoice emails; the breach was quickly detected, halted by IT, and appears to have originated overseas.
#ransomware
fromTheregister
3 months ago
Information security

Rogue ransomware negotiators accused of extortion attacks

Two cybersecurity professionals were indicted for allegedly carrying out ALPHV/BlackCat ransomware attacks and extorting multiple US companies for tens of millions.
fromComputerWeekly.com
3 months ago
Information security

LockBit 5.0 expands targeting amid ransomware escalation | Computer Weekly

Ransomware attacks rose 28% in September to 421 incidents, with LockBit variants and multiple RaaS groups expanding targeting across the Americas, Asia, and Europe.
fromZDNET
1 week ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
Information security
fromArs Technica
1 week ago

OpenClaw security fears lead Meta, other AI firms to restrict its use

OpenClaw poses significant security risks; organizations must restrict access, mitigate exposures immediately, and test in controlled environments to identify vulnerabilities.
Information security
fromHarvard Business Review
1 week ago

Cybersecurity Requires Collective Resilience

Rapid recovery depended on leaders quickly assessing scope and risk, validating mitigations, and coordinating communications after the CrowdStrike patch disrupted Windows endpoints worldwide.
Information security
fromThe Hacker News
1 week ago

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

Automated, context-aware cloud forensics is essential because ephemeral infrastructure, rotating identities, and expiring logs destroy evidence before manual investigations can complete.
Artificial intelligence
fromInfoQ
2 weeks ago

From Paging to Postmortem: Google Cloud SREs on Using Gemini CLI for Outage Response

Gemini CLI integrates AI reasoning into terminal workflows to speed incident mitigation, reduce MTTM, and assist SREs throughout outage lifecycles.
fromThe Verge
3 weeks ago

Substack data breach exposed users' emails and phone numbers

On February 3rd, we identified evidence of a problem with our systems that allowed an unauthorized third party to access limited user data without permission, including email addresses, phone numbers, and other internal metadata,
Information security
#cybersecurity
fromSilicon Canals
1 month ago
Information security

Andersen Consulting Strengthens Cybersecurity Capabilities with Addition of RedLegg - Silicon Canals

fromSilicon Canals
1 month ago
Information security

Andersen Consulting Strengthens Cybersecurity Capabilities with Addition of RedLegg - Silicon Canals

Information security
fromThe Hacker News
3 weeks ago

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

Early decisions immediately after detection determine incident investigation outcomes; establishing direction before assumptions harden preserves options and shapes the entire response.
#observability
fromInfoQ
3 weeks ago
Software development

From Alert Fatigue to Agent-Assisted Intelligent Observability

fromInfoQ
3 weeks ago
Software development

From Alert Fatigue to Agent-Assisted Intelligent Observability

#dfir
#ai-observability
fromNew Relic
1 month ago
Artificial intelligence

New Relic AI Impact Report 2026: How AIOps is Solving the "Firefighting" Crisis for Engineers

fromNew Relic
1 month ago
Artificial intelligence

New Relic AI Impact Report 2026: How AIOps is Solving the "Firefighting" Crisis for Engineers

fromNew Relic
1 month ago
Artificial intelligence

New Relic AI Impact Report 2026: How AIOps is Solving the "Firefighting" Crisis for Engineers

fromNew Relic
1 month ago
Artificial intelligence

New Relic AI Impact Report 2026: How AIOps is Solving the "Firefighting" Crisis for Engineers

Information security
fromSecuritymagazine
4 weeks ago

Securing Trust: Why Crisis Communication is Your First Line of Defense

Crisis communication is a critical, functional security control that preserves trust, protects brand, and ensures regulatory compliance during breaches.
Information security
fromTheregister
4 weeks ago

AV vendor disputes security shop's update server claims

eScan and Morphisec dispute responsibility and characterization of a brief unauthorized update-server incident that briefly distributed a rogue file to some customers.
fromLondon Business News | Londonlovesbusiness.com
4 weeks ago

Your intern clicked the wrong link-now what? - London Business News | Londonlovesbusiness.com

When your intern accidentally clicked on phishing link, don't panic. Take consistent but confident action. Even knowledgeable, tech-savvy people can click a fishing link. They may do this due to haste or the cunning design of a phishing message. Such events happen more often than you think. The consequences can vary. It may be an innocent redirect to a fake website, or downloading malicious software
Information security
#aws-devops-agent
fromSecuritymagazine
1 month ago

2026 Enterprise Security Trends: What Leaders Must Prepare For In An Interconnected Risk Landscape

Security in 2026 is defined by convergence, complexity, and scale. Enterprise organizations are navigating a world where cyber incidents are causing physical shutdowns, and physical breaches are creating digital vulnerabilities, all while cloud-dependent systems are becoming the backbone of operations, and AI is being used as a tool by both defenders and attackers. Incidents in 2025, especially the AWS outage, have painfully exposed just how interdependent modern security environments have become.
Information security
fromTheregister
1 month ago

Microsoft Azure OpenAI Service goes down in Sweden

Microsoft first acknowledged the issues at 0900 UTC (although the status page for the service stated it spotted the problem at 0922 UTC). At the time, Microsoft blamed the Azure OpenAI Service's availability issues on "an unhealthy backend dependent service, which led to cascading failures." The Windows behemoth noted problems when using modes such as GPT-5.2, GPT-5 Mini, GPT-4.1, and related APIs.
Artificial intelligence
Information security
fromSecuritymagazine
1 month ago

Strong Privacy Requires Strong Security - and GenAI Raises the Stakes

Privacy and security must be integrated, with technical, procedural, and cultural controls enforcing privacy commitments through strong security fundamentals.
#cyberattack
fromDataBreaches.Net
1 month ago
Information security

Anchorage police department takes servers offline after cyberattack on service provider - DataBreaches.Net

fromIT Pro
3 months ago
Information security

Wall Street giants warned of data exposure following supply chain attack

fromDataBreaches.Net
1 month ago
Information security

Anchorage police department takes servers offline after cyberattack on service provider - DataBreaches.Net

fromIT Pro
3 months ago
Information security

Wall Street giants warned of data exposure following supply chain attack

fromInfoQ
1 month ago

Cloudflare Launches 'Code Orange: Fail Small' Resilience Plan After Multiple Global Outages

Cloudflare recently published a detailed resilience initiative called Code Orange: Fail Small, outlining a comprehensive plan to prevent large-scale service disruptions after two major network outages in the past six weeks. The plan prioritizes controlled rollouts, improved failure-mode handling, and streamlined emergency procedures to make the company's global network more robust and less vulnerable to configuration errors. Cloudflare's network suffered significant outages on November 18 and December 5, 2025, with the first incident disrupting traffic delivery for about two hours and ten minutes
Information security
Information security
fromThe Hacker News
1 month ago

4 Outdated Habits Destroying Your SOC's MTTR in 2026

Modern SOCs must replace manual sample review with automated, cloud-based sandboxes to reduce MTTR, alleviate alert fatigue, and enable faster, deeper incident response.
Information security
fromCointelegraph
1 month ago

Trust Wallet Hack Highlights Security Gaps Facing Crypto-Friendly SMEs

Crypto-using SMEs face supply-chain, verification, and hot-wallet risks; the December 2025 Trust Wallet hack caused about $7 million in losses.
fromTechzine Global
1 month ago

Cybersecurity in 2026 demands managing human behavior and agentic AI

In organizations with mature processes, this demonstrably leads to a 30 to 50 percent reduction in mean time to respond. This is not an optimization, but a necessary adjustment. The question is no longer whether AI agents will be deployed, but how far their autonomy extends. Security teams must explicitly determine which decisions can be automated and where human oversight remains mandatory. If these frameworks are lacking, the risks only increase.
Artificial intelligence
fromSecuritymagazine
1 month ago

Communication Criticized in Handling of Recent Healthcare Hack

Manage My Health, a portal enabling connection between individuals and their healthcare providers, experienced a cyberattack identified on Dec. 30. The New Zealand-based organization published a statement to its website the following day, and as of Jan. 5, has continued to post subsequent updates as information has come available. Following the forensic investigations, the organization believes around 7% of 1.8 million registered patients may have been impacted.
Privacy professionals
Software development
fromInfoQ
1 month ago

Thinking Like a Detective: Solving Cloud Infrastructure Mysteries

Intermittent, user-visible cloud errors can occur despite green health checks and normal logs; solving them requires methodical tracing across network, client, and infrastructure.
#data-breach
fromDataBreaches.Net
1 month ago
Information security

Threat actors insisted that Resecurity's honeypot was real data. We found no evidence that it was. - DataBreaches.Net

fromThe Verge
4 months ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

fromDataBreaches.Net
4 months ago
Information security

I called American Income Life Insurance to alert them to a data breach involving 150,000 customers. Here's why they didn't find out. - DataBreaches.Net

fromDataBreaches.Net
1 month ago
Information security

Threat actors insisted that Resecurity's honeypot was real data. We found no evidence that it was. - DataBreaches.Net

fromThe Verge
4 months ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

fromDataBreaches.Net
4 months ago
Information security

I called American Income Life Insurance to alert them to a data breach involving 150,000 customers. Here's why they didn't find out. - DataBreaches.Net

Information security
fromTechzine Global
1 month ago

MongoBleed threatens databases, but detection tool is available

A zlib decompression flaw (MongoBleed) in MongoDB 4.4–8.2.2 is actively exploited to extract server memory and sensitive data without authentication.
Software development
fromTheregister
1 month ago

When the lights went out Y2K started to feel far too real

Extensive Y2K preparations largely averted major failures, but isolated legacy-hardware glitches, unexpected human-caused outages, and local power issues occurred during the rollover.
Health
fromDataBreaches.Net
2 months ago

Singing River Health System temporarily shut down access to patient medical records - DataBreaches.Net

Singing River Health System detected a possible cyber incident, proactively shut down systems including MyChart, later restored access; no claim of responsibility or breach confirmation.
Privacy technologies
fromTechCrunch
2 months ago

Meet the team that hunts government spyware

Access Now's Digital Security Helpline provides 24/7 incident response and support to journalists, human rights defenders, and dissidents targeted by state-sponsored spyware.
#tabletop-exercises
fromIT Pro
3 months ago
Information security

Simulating attacks: how to use tabletop exercises in incident response

fromIT Pro
3 months ago
Information security

Simulating attacks: how to use tabletop exercises in incident response

Artificial intelligence
fromTheregister
2 months ago

Waymo updates fleet in response to Bay Area outage chaos

Waymo is updating its US robotaxi fleet to improve handling of widespread power-outage-related disabled traffic signals and reduce confirmation-related delays.
fromBusiness Matters
2 months ago

The Role of IT Support in Business Continuity

Robust IT systems support uninterrupted operations through resilience, security, and proactive monitoring. CIOs report that 87% of digital-first businesses rely on automated failover systems to reduce service disruption. Continuous monitoring helps detect failures before they impact users. Recovery plans activate system redundancies and restore functions with minimal input. Automated backup schedules and patch management prevent gaps in continuity. IT managers emphasise the role of configuration management and centralised monitoring tools.
Information security
fromSecuritymagazine
2 months ago

Louder Than Words: How Effective Security Defends Brand Reputation

"A company's reputation is its most valuable asset, and protecting it requires foresight, discipline, and transparency."
Marketing
Information security
fromTechCrunch
2 months ago

Cisco says Chinese hackers are exploiting its customers with a new zero-day | TechCrunch

Critical Cisco AsyncOS vulnerability enables full takeover of exposed devices; no patches exist and wiping/rebuilding software is the only current mitigation.
Information security
fromComputerWeekly.com
2 months ago

Security platform consolidation in 2026: The AI imperative | Computer Weekly

Organizations must consolidate cybersecurity platforms to survive AI-driven, adaptive attacks that operate in real time; fragmented tool stacks cannot respond fast enough.
Information security
fromAbove the Law
2 months ago

Incident Response Has Become A Law Firm Survival Skill - Above the Law

Law firms face targeted cyberattacks; preparedness and practiced incident response, clear leadership, and fast decisions prevent compounded damage and regulatory, ethical, and malpractice risks.
#cyber-attack
Information security
fromThe Hacker News
3 months ago

Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

Widespread exploitation of FortiWeb and Chrome zero-days, plus supply-chain and SaaS compromises, forced major vendors into rapid incident response and urgent patching.
Tech industry
fromNew Relic
3 months ago

What the Cloudflare Outage Teaches Us About System Limits and Latent Bugs

A dormant, hard-coded feature limit combined with a routine database change caused a production panic, demonstrating need for advanced observability to detect rare latent bugs.
Information security
fromTheregister
3 months ago

Overconfidence blamed as teams stumble through cyber sims.

Most cybersecurity teams are overconfident yet underprepared, scoring around 22 percent accuracy and taking roughly 29 hours to contain simulated major incidents.
fromSecuritymagazine
3 months ago

Where to Stretch Your Cybersecurity Budget

It's really important to go back to just the cybersecurity basics. Are you using multi-factor authentication? Are you training your staff and employees at all levels to not click that link? Are you patching your systems? Do you have good monitoring software and applications that are monitoring your network even when you're sleeping?
Information security
fromIT Pro
3 months ago

Inside a cloud outage

"The worst feeling in the world is to be in the middle of an incident and realize that it would be a great thing that you could do to resolve that incident, if only a tool had been built before, right? So it'd be great if you figure that out before you get into that incident, and then you have the tool ready to go. "
DevOps
Information security
fromTechzine Global
3 months ago

One in four organizations unprepared for cyber threats

Organizations are poorly prepared for cyberattacks due to human error, inadequate training, limited AI adoption, insufficient penetration testing, and weak incident response planning.
Business
fromSecuritymagazine
4 months ago

The Moment of Truth: Conducting Your BCP Test and Capturing Lessons

Effective BCP tests uncover flaws in a safe environment, build muscle memory, and generate actionable insights to strengthen organizational preparedness.
UK news
fromTheregister
3 months ago

UK lotto players land data jackpot thanks to website error

A technical error at People's Postcode Lottery briefly exposed names, addresses, email addresses, and birthdates of a small fraction of subscribers before services were restored.
Information security
fromThe Hacker News
3 months ago

The Death of the Security Checkbox: BAS Is the Power Behind Real Defense

Breach and attack simulation proves defenses by continuously testing live environments, prioritizing reaction and real-time validation over predictive, checklist-based security.
fromIT Pro
3 months ago

US telco confirms hackers breached systems in stealthy state-backed cyber campaign - and remained undetected for nearly a year

Ribbon supplies software, IP, and optical networking systems to telecoms service providers, businesses, and critical infrastructure organizations including BT, Verizon, CenturyLink, Deutsche Telekom, and Tata, as well as public-sector bodies such as the US Defense Department and the City of Los Angeles. In a with the US Securities and Exchange Commission (SEC), the company has revealed that "unauthorized persons, reportedly associated with a nation-state actor" had gained access to its network in December 2024.
Information security
Information security
fromwww.theguardian.com
4 months ago

I lost 25 pounds in 20 days': what it's like to be on the frontline of a global cyber-attack

A SolarWinds supply-chain cyberattack allowed Russian hackers remote access to thousands of customers, forcing emergency response, alternative communications, and global coordination by the company's CISO.
Information security
fromInfoQ
4 months ago

Slack Security: Inside the New Anomaly Event Response Architecture

Slack's Anomaly Event Response autonomously detects high-confidence threat behaviors and rapidly terminates affected sessions, reducing detection-to-mitigation time from hours to minutes.
Information security
fromDataBreaches.Net
4 months ago

F5 discloses breach tied to nation-state threat actor - DataBreaches.Net

F5 experienced a highly sophisticated cyberattack attributed to a nation-state, involving prolonged unauthorized access; DOJ permitted delayed public disclosure due to national security concerns.
Information security
fromIT Pro
4 months ago

Cloud security: How to detect breaches and stop them quickly

Slow detection and remediation leave cloud breaches exposed: only 9% detected within an hour and most enterprises take over 24 hours to recover.
fromDataBreaches.Net
4 months ago

Obsession with cyber breach notification fuelling costly mistakes - DataBreaches.Net

Regulations such as the General Data Protection Regulation (GDPR) and the Australian Prudential Regulation Authority's (Apra's) CPS 230 standard have led organisations to become "really obsessed" with the 72-hour notification window following a data breach, according to Shannon Murphy, global security and risk strategist at Trend Micro.
EU data protection
Information security
fromTechzine Global
4 months ago

SonicWall VPN accounts compromised with stolen login credentials

Over 100 SonicWall SSL VPN accounts were compromised using stolen valid credentials, enabling rapid access, reconnaissance, and attempts to access local Windows accounts.
fromThe Verge
4 months ago

Discord says 70,000 users may have had their government IDs leaked in breach

Following last week's announcement about a security incident involving a third-party customer service provider, we want to address inaccurate claims by those responsible that are circulating online. First, as stated in our blog post, this was not a breach of Discord, but rather a third-party service we use to support our customer service efforts. Second, the numbers being shared are incorrect and part of an attempt to extort a payment from Discord.
Information security
fromSecuritymagazine
4 months ago

Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

The truth is, these teams are working on the same event. They're just seeing it from different angles. If they aren't connected, response becomes fragmented and valuable time gets lost. Connecting the Dots in Real Time This is where a unified approach to critical event management makes a real difference. It's not about layering on more tools. It's about connecting the ones already in place and giving people a shared view and a clear process when something goes wrong.
Information security
Information security
fromSecuritymagazine
4 months ago

The Future of Cybersecurity Training and What It Means for Employers

Effective cybersecurity training must combine hands-on, team-based practical experience with strategic business understanding to build resilient professionals.
Information security
fromComputerWeekly.com
4 months ago

Why it takes 11 hours to resolve one ID-related cyber incident | Computer Weekly

Fragmented, opaque enterprise environments cause identity-related incidents to average 11 hours to resolve, enabling attackers to pivot and escalate privileges rapidly.
fromTheregister
4 months ago

US Air Force investigates 'privacy-related issue'

"The preliminary investigation is ongoing, and we are assessing the scope of any concerns and any necessary required remediation," the spokesperson added. "We are in the process of evaluating technical remediation solutions and will act as appropriate. Compliance with the Privacy Act and identifying a solution for this technical problem is critical to the DAF to ensure warfighter readiness and lethality."
Privacy professionals
[ Load more ]