Incident Response

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle 2025-04-11 at 21:05 By Ryan Naraine The CVE-2025-22457 has already been exploited by a China-nexus hacking gang notorious for breaking into edge network devices. The post Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle appeared first on SecurityWeek. This […]

React to this headline:

Loading spinner

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle Read More »

Qevlar AI Raises $10 Million for Autonomous Investigation Platform

Qevlar AI Raises $10 Million for Autonomous Investigation Platform 2025-04-09 at 15:24 By Ionut Arghire French cybersecurity startup Qevlar AI has raised $10 million in a funding round led by EQT Ventures and Forgepoint Capital International. The post Qevlar AI Raises $10 Million for Autonomous Investigation Platform appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Qevlar AI Raises $10 Million for Autonomous Investigation Platform Read More »

Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program

Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program 2025-03-31 at 17:40 By Trevin Edgeworth A strong security program will sometimes require substantial organizational and cultural changes around security practices, and inevitably, a higher cost. The post Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security

React to this headline:

Loading spinner

Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program Read More »

5 pitfalls that can delay cyber incident response and recovery

5 pitfalls that can delay cyber incident response and recovery 2025-03-20 at 08:35 By Help Net Security The responsibility of cyber incident response falls squarely on the shoulders of the CISO. And many CISOs invest heavily in technical response procedures, tabletop exercises and theoretical plans only to find out that when an actual breach strikes

React to this headline:

Loading spinner

5 pitfalls that can delay cyber incident response and recovery Read More »

Review: Cybersecurity Tabletop Exercises

Review: Cybersecurity Tabletop Exercises 2025-03-17 at 07:31 By Mirko Zorz Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop exercises to identify security gaps and enhance their incident response strategies. The authors explore a range of realistic scenarios, including phishing campaigns, ransomware attacks, and

React to this headline:

Loading spinner

Review: Cybersecurity Tabletop Exercises Read More »

A Guide to Security Investments: The Anatomy of a Cyberattack

A Guide to Security Investments: The Anatomy of a Cyberattack 2025-03-12 at 17:31 By Torsten George Organizations must recognize that security is not about the number of tools deployed, it is about ensuring those tools effectively disrupt the attack chain at every stage. The post A Guide to Security Investments: The Anatomy of a Cyberattack

React to this headline:

Loading spinner

A Guide to Security Investments: The Anatomy of a Cyberattack Read More »

The 5 stages of incident response grief

The 5 stages of incident response grief 2025-03-05 at 18:03 By Help Net Security Whether we recognize it or not, anytime an incident occurs, it sets off the grieving process. But grief isn’t a bad thing: it’s how we process our emotional reactions and move on. That’s precisely what security teams need to do in

React to this headline:

Loading spinner

The 5 stages of incident response grief Read More »

Mastering the cybersecurity tightrope of protection, detection, and response

Mastering the cybersecurity tightrope of protection, detection, and response 2025-02-21 at 08:05 By Mirko Zorz In this Help Net Security interview, Chester Wisniewski, Director and Global Field CISO at Sophos, discusses the shifting ransomware landscape, the risks posed by quantum decryption threats, and the role of vendor security validation. Wisniewski notes that cyber resilience is

React to this headline:

Loading spinner

Mastering the cybersecurity tightrope of protection, detection, and response Read More »

Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems

Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems 2025-02-14 at 20:18 By Associated Press The chief deputy attorney general of the agency sent an email on Wednesday that said nearly all of is computer systems were offline. The post Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems appeared first

React to this headline:

Loading spinner

Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems Read More »

Security Teams Pay the Price: The Unfair Reality of Cyber Incidents

Security Teams Pay the Price: The Unfair Reality of Cyber Incidents 2025-02-06 at 14:04 By Joshua Goldfarb The blame of security incidents may be shared—but the burden of response always falls on the security team. Here’s how to prepare for the inevitable. The post Security Teams Pay the Price: The Unfair Reality of Cyber Incidents

React to this headline:

Loading spinner

Security Teams Pay the Price: The Unfair Reality of Cyber Incidents Read More »

74% of CISOs are increasing crisis simulation budgets

74% of CISOs are increasing crisis simulation budgets 2025-01-28 at 06:46 By Help Net Security In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, 23andMe, Transport for London, and Cencora, CISOs are reassessing their organisation’s readiness to manage a potential “chaos” of a full-scale cyber crisis, according to Hack The Box. Many CISOs

React to this headline:

Loading spinner

74% of CISOs are increasing crisis simulation budgets Read More »

Who handles what? Common misconceptions about SaaS security responsibilities

Who handles what? Common misconceptions about SaaS security responsibilities 2024-12-09 at 07:33 By Mirko Zorz In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common misconceptions do you encounter about the

React to this headline:

Loading spinner

Who handles what? Common misconceptions about SaaS security responsibilities Read More »

How the Shadowserver Foundation helps network defenders with free intelligence feeds

How the Shadowserver Foundation helps network defenders with free intelligence feeds 2024-12-05 at 07:01 By Mirko Zorz In this Help Net Security interview, Piotr Kijewski, CEO of The Shadowserver Foundation, discusses the organization’s mission to enhance internet security by exposing vulnerabilities, malicious activity, and emerging threats. Kijewski explains the foundation’s automated efforts to track and

React to this headline:

Loading spinner

How the Shadowserver Foundation helps network defenders with free intelligence feeds Read More »

AWS offers incident response service

AWS offers incident response service 2024-12-02 at 14:15 By Zeljka Zorz Amazon Web Services (AWS) has launched a new service to help organizations prepare for and recover from ransomware attacks, account takeovers, data breaches, and other security events: AWS Security Incident Response (SIR). Creating a case (Source: AWS) AWS Security Incident Response explained “Security events

React to this headline:

Loading spinner

AWS offers incident response service Read More »

Modernizing incident response in the AI era

Modernizing incident response in the AI era 2024-11-29 at 06:32 By Help Net Security In this Help Net Security video, Gourav Nagar, Director of Information Security at Bill, discusses modernizing incident response in the era of AI and the cloud: Why this issue is important for organizations looking to stay ahead of rapidly evolving cyber

React to this headline:

Loading spinner

Modernizing incident response in the AI era Read More »

AI’s impact on the future of web application security

AI’s impact on the future of web application security 2024-11-15 at 07:33 By Mirko Zorz In this Help Net Security interview, Tony Perez, CEO at NOC.org, discusses the role of continuous monitoring for real-time threat detection, the unique risks posed by APIs, and strategies for securing web applications. Perez also addresses how AI-driven threats are

React to this headline:

Loading spinner

AI’s impact on the future of web application security Read More »

6 key elements for building a healthcare cybersecurity response plan

6 key elements for building a healthcare cybersecurity response plan 2024-10-30 at 06:33 By Help Net Security Medical practices remain vulnerable to cyberattacks, with over a third unable to cite a cybersecurity incident response plan, according to Software Advice. This gap exposes healthcare providers to risks of patient data breaches, HIPAA violations, financial penalties, and

React to this headline:

Loading spinner

6 key elements for building a healthcare cybersecurity response plan Read More »

Balancing legal frameworks and enterprise security governance

Balancing legal frameworks and enterprise security governance 2024-10-10 at 07:01 By Mirko Zorz In this Help Net Security interview, Tom McAndrew, CEO at Coalfire, discusses the balance organizations must strike between legal compliance and effective enterprise security governance in the context of evolving regulatory frameworks. McAndrew also addresses the need for clear governance structures and

React to this headline:

Loading spinner

Balancing legal frameworks and enterprise security governance Read More »

Use Windows event logs for ransomware investigations, JPCERT/CC advises

Use Windows event logs for ransomware investigations, JPCERT/CC advises 2024-10-01 at 13:46 By Zeljka Zorz The JPCERT Coordination Center – the first Computer Security Incident Response Team established in Japan – has compiled a list of entries in Windows event logs that could help enterprise defenders respond to human-operated ransomware attacks and potentially limit the

React to this headline:

Loading spinner

Use Windows event logs for ransomware investigations, JPCERT/CC advises Read More »

CrowdStrike Overhauls Testing and Rollout Procedures to Avoid System Crashes

CrowdStrike Overhauls Testing and Rollout Procedures to Avoid System Crashes 2024-09-24 at 23:16 By Ryan Naraine CrowdStrike says it has revamped several testing, validation, and update rollout processes to prevent a repeat of the July BSOD incident. The post CrowdStrike Overhauls Testing and Rollout Procedures to Avoid System Crashes appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

CrowdStrike Overhauls Testing and Rollout Procedures to Avoid System Crashes Read More »

Scroll to Top