Incident Response

If you prepare, a data security incident will not cause an existential crisis

If you prepare, a data security incident will not cause an existential crisis 2024-01-09 at 08:02 By Help Net Security Why is it that when a company becomes aware of a potential data security incident, the team working on it (and others who are made aware that “something” is going on) have an immediate and […]

React to this headline:

Loading spinner

If you prepare, a data security incident will not cause an existential crisis Read More »

SEC Shares Important Clarifications as New Cyber Incident Disclosure Rules Come Into Effect

SEC Shares Important Clarifications as New Cyber Incident Disclosure Rules Come Into Effect 18/12/2023 at 15:01 By Eduard Kovacs The SEC has provided some important clarifications on its new cyber incident disclosure requirements, which come into effect on December 18. The post SEC Shares Important Clarifications as New Cyber Incident Disclosure Rules Come Into Effect

React to this headline:

Loading spinner

SEC Shares Important Clarifications as New Cyber Incident Disclosure Rules Come Into Effect Read More »

MongoDB Confirms Hack, Says Customer Data Stolen

MongoDB Confirms Hack, Says Customer Data Stolen 18/12/2023 at 01:03 By Ryan Naraine MongoDB CISO Lena Smart said the company was not aware of any exposure to the data that customers store in the MongoDB Atlas product.  The post MongoDB Confirms Hack, Says Customer Data Stolen appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

MongoDB Confirms Hack, Says Customer Data Stolen Read More »

Kansas Courts’ Computer Systems Are Starting to Come Back Online, 2 Months After Cyberattack

Kansas Courts’ Computer Systems Are Starting to Come Back Online, 2 Months After Cyberattack 15/12/2023 at 20:49 By Associated Press The court system in Kansas was hit by a cyberattack that caused outages and affected the courts in 104 counties. The post Kansas Courts’ Computer Systems Are Starting to Come Back Online, 2 Months After

React to this headline:

Loading spinner

Kansas Courts’ Computer Systems Are Starting to Come Back Online, 2 Months After Cyberattack Read More »

GAO: Federal Agencies Yet to Fully Implement Incident Response Capabilities

GAO: Federal Agencies Yet to Fully Implement Incident Response Capabilities 06/12/2023 at 17:46 By Ionut Arghire A new GAO report reveals that 20 out of 23 US federal agencies have not fully implemented incident response plans. The post GAO: Federal Agencies Yet to Fully Implement Incident Response Capabilities appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

GAO: Federal Agencies Yet to Fully Implement Incident Response Capabilities Read More »

New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials

New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials 04/12/2023 at 16:16 By Ionut Arghire New Relic said hackers gained access to an environment using social engineering and stolen credentials for an employee account. The post New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

New Relic Says Hackers Accessed Internal Environment Using Stolen Credentials Read More »

Okta Broadens Scope of Data Breach: All Customer Support Users Affected

Okta Broadens Scope of Data Breach: All Customer Support Users Affected 29/11/2023 at 19:01 By Ryan Naraine Okta expands scope of October breach, saying hackers stole names and email addresses of all its customer support system users. The post Okta Broadens Scope of Data Breach: All Customer Support Users Affected appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Okta Broadens Scope of Data Breach: All Customer Support Users Affected Read More »

AWS Kill Switch: Open-source incident response tool

AWS Kill Switch: Open-source incident response tool 27/11/2023 at 09:01 By Mirko Zorz AWS Kill Switch is an open-source incident response tool for quickly locking down AWS accounts and IAM roles during a security incident. The solution includes a Lambda function and proof of concept client. You can either adopt this client or build your

React to this headline:

Loading spinner

AWS Kill Switch: Open-source incident response tool Read More »

Sumo Logic Completes Investigation Into Recent Security Breach

Sumo Logic Completes Investigation Into Recent Security Breach 21/11/2023 at 15:16 By Eduard Kovacs Sumo Logic has completed its investigation into the recent security breach and found no evidence of impact to customer data. The post Sumo Logic Completes Investigation Into Recent Security Breach appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Sumo Logic Completes Investigation Into Recent Security Breach Read More »

Biden Campaign Looking for CISO

Biden Campaign Looking for CISO 16/11/2023 at 19:46 By Ryan Naraine The Biden for President campaign is looking for a cybersecurity chief to “define the organization’s risk appetite” and manage its cybersecurity and IT initiatives. The post Biden Campaign Looking for CISO appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Biden Campaign Looking for CISO Read More »

Generative AI is shaping future incident management processes

Generative AI is shaping future incident management processes 15/11/2023 at 08:03 By Help Net Security Persistent challenges in adhering to established incident management processes pose a significant risk to organizations, amplifying potential downtime costs amidst a surge in service incidents, according to Transposit. Despite a majority of respondents (59.4%) who have a defined incident management

React to this headline:

Loading spinner

Generative AI is shaping future incident management processes Read More »

Microsoft Warns of Critical Bugs Being Exploited in the Wild

Microsoft Warns of Critical Bugs Being Exploited in the Wild 14/11/2023 at 23:47 By Ryan Naraine Patch Tuesday: Redmond’s security response team flags two vulnerabilities — CVE-2023-36033 and CVE-2023-36036 — already being exploited in the wild. The post Microsoft Warns of Critical Bugs Being Exploited in the Wild appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Microsoft Warns of Critical Bugs Being Exploited in the Wild Read More »

Radiant Snags $15 Million for AI-Powered SOC Technology

Radiant Snags $15 Million for AI-Powered SOC Technology 14/11/2023 at 17:31 By Ryan Naraine Radiant Security gets $15 million in new financing as investors double down on early stage companies experimenting with AI technology. The post Radiant Snags $15 Million for AI-Powered SOC Technology appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Radiant Snags $15 Million for AI-Powered SOC Technology Read More »

Tidal Cyber Raises $5 Million for Threat-Informed Defense Platform

Tidal Cyber Raises $5 Million for Threat-Informed Defense Platform 09/11/2023 at 19:47 By Ionut Arghire The Washington, DC startup is building a threat-informed defense platform that helps organizations automate detection and response work. The post Tidal Cyber Raises $5 Million for Threat-Informed Defense Platform appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Tidal Cyber Raises $5 Million for Threat-Informed Defense Platform Read More »

Offense Intended: How Adversarial Emulation Went From State Secret To Board Bullet Point

Offense Intended: How Adversarial Emulation Went From State Secret To Board Bullet Point 08/11/2023 at 18:46 By Tom Eston Offensive Security does not focus on discreet attacks, singular actors, or Indicators of compromise, but understands the entirety of both sides of the battlefield. The post Offense Intended: How Adversarial Emulation Went From State Secret To

React to this headline:

Loading spinner

Offense Intended: How Adversarial Emulation Went From State Secret To Board Bullet Point Read More »

6 steps to accelerate cybersecurity incident response

6 steps to accelerate cybersecurity incident response 02/11/2023 at 08:31 By Help Net Security Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must be able to stop threats and restore normal operations as quickly

React to this headline:

Loading spinner

6 steps to accelerate cybersecurity incident response Read More »

MITRE Releases ATT&CK v14 With Improvements to Detections, ICS, Mobile 

MITRE Releases ATT&CK v14 With Improvements to Detections, ICS, Mobile  01/11/2023 at 16:01 By Eduard Kovacs MITRE announces the release of ATT&CK v14, which brings enhancements related to detections, ICS, and mobile. The post MITRE Releases ATT&CK v14 With Improvements to Detections, ICS, Mobile  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

MITRE Releases ATT&CK v14 With Improvements to Detections, ICS, Mobile  Read More »

SEC Charges SolarWinds and Its CISO With Fraud and Cybersecurity Failures

SEC Charges SolarWinds and Its CISO With Fraud and Cybersecurity Failures 31/10/2023 at 05:01 By Mike Lennon The SEC filed charges against SolarWinds and its CISO over misleading investors about its cybersecurity practices and known risks. The post SEC Charges SolarWinds and Its CISO With Fraud and Cybersecurity Failures appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

SEC Charges SolarWinds and Its CISO With Fraud and Cybersecurity Failures Read More »

The dangers of dual ransomware attacks

The dangers of dual ransomware attacks 30/10/2023 at 09:32 By Help Net Security At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await companies that fall victim to ransomware and fail

React to this headline:

Loading spinner

The dangers of dual ransomware attacks Read More »

Scroll to Top