#incident-response

[ follow ]
Business
fromSecuritymagazine
1 week ago

The Moment of Truth: Conducting Your BCP Test and Capturing Lessons

Effective BCP tests uncover flaws in a safe environment, build muscle memory, and generate actionable insights to strengthen organizational preparedness.
#ransomware
#cybersecurity
Information security
fromTheregister
3 weeks ago

Military radio maker BK Technologies cops to cyber break-in

BK Technologies experienced a cyber intrusion that briefly disrupted non-critical systems and led to theft of non-public information; systems were restored and law enforcement notified.
Information security
fromwww.bbc.com
1 month ago

Why burnout is a growing problem in cybersecurity

Cybersecurity professionals face widespread burnout from relentless incident-preparation and response demands, causing sleep disruption, workplace avoidance, and declining job satisfaction.
UK news
fromTheregister
4 days ago

UK lotto players land data jackpot thanks to website error

A technical error at People's Postcode Lottery briefly exposed names, addresses, email addresses, and birthdates of a small fraction of subscribers before services were restored.
Information security
fromThe Hacker News
1 day ago

The Death of the Security Checkbox: BAS Is the Power Behind Real Defense

Breach and attack simulation proves defenses by continuously testing live environments, prioritizing reaction and real-time validation over predictive, checklist-based security.
fromIT Pro
2 days ago

US telco confirms hackers breached systems in stealthy state-backed cyber campaign - and remained undetected for nearly a year

Ribbon supplies software, IP, and optical networking systems to telecoms service providers, businesses, and critical infrastructure organizations including BT, Verizon, CenturyLink, Deutsche Telekom, and Tata, as well as public-sector bodies such as the US Defense Department and the City of Los Angeles. In a with the US Securities and Exchange Commission (SEC), the company has revealed that "unauthorized persons, reportedly associated with a nation-state actor" had gained access to its network in December 2024.
Information security
Information security
fromwww.theguardian.com
2 weeks ago

I lost 25 pounds in 20 days': what it's like to be on the frontline of a global cyber-attack

A SolarWinds supply-chain cyberattack allowed Russian hackers remote access to thousands of customers, forcing emergency response, alternative communications, and global coordination by the company's CISO.
Information security
fromInfoQ
2 weeks ago

Slack Security: Inside the New Anomaly Event Response Architecture

Slack's Anomaly Event Response autonomously detects high-confidence threat behaviors and rapidly terminates affected sessions, reducing detection-to-mitigation time from hours to minutes.
Information security
fromDataBreaches.Net
2 weeks ago

F5 discloses breach tied to nation-state threat actor - DataBreaches.Net

F5 experienced a highly sophisticated cyberattack attributed to a nation-state, involving prolonged unauthorized access; DOJ permitted delayed public disclosure due to national security concerns.
#cloud-security
fromIT Pro
4 months ago
Information security

Cloud breaches are surging, but enterprises aren't quick enough to react

Information security
fromIT Pro
4 months ago

Cloud breaches are surging, but enterprises aren't quick enough to react

Cloud breaches remain undetected for significant durations due to alert fatigue and tool fragmentation.
fromDataBreaches.Net
2 weeks ago

Obsession with cyber breach notification fuelling costly mistakes - DataBreaches.Net

Regulations such as the General Data Protection Regulation (GDPR) and the Australian Prudential Regulation Authority's (Apra's) CPS 230 standard have led organisations to become "really obsessed" with the 72-hour notification window following a data breach, according to Shannon Murphy, global security and risk strategist at Trend Micro.
EU data protection
#data-breach
fromThe Verge
2 weeks ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

fromDataBreaches.Net
3 weeks ago
Information security

I called American Income Life Insurance to alert them to a data breach involving 150,000 customers. Here's why they didn't find out. - DataBreaches.Net

fromThe Verge
2 weeks ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

fromDataBreaches.Net
3 weeks ago
Information security

I called American Income Life Insurance to alert them to a data breach involving 150,000 customers. Here's why they didn't find out. - DataBreaches.Net

Information security
fromTechzine Global
2 weeks ago

SonicWall VPN accounts compromised with stolen login credentials

Over 100 SonicWall SSL VPN accounts were compromised using stolen valid credentials, enabling rapid access, reconnaissance, and attempts to access local Windows accounts.
fromThe Verge
3 weeks ago

Discord says 70,000 users may have had their government IDs leaked in breach

Following last week's announcement about a security incident involving a third-party customer service provider, we want to address inaccurate claims by those responsible that are circulating online. First, as stated in our blog post, this was not a breach of Discord, but rather a third-party service we use to support our customer service efforts. Second, the numbers being shared are incorrect and part of an attempt to extort a payment from Discord.
Information security
fromSecuritymagazine
3 weeks ago

Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

The truth is, these teams are working on the same event. They're just seeing it from different angles. If they aren't connected, response becomes fragmented and valuable time gets lost. Connecting the Dots in Real Time This is where a unified approach to critical event management makes a real difference. It's not about layering on more tools. It's about connecting the ones already in place and giving people a shared view and a clear process when something goes wrong.
Information security
Information security
fromSecuritymagazine
3 weeks ago

The Future of Cybersecurity Training and What It Means for Employers

Effective cybersecurity training must combine hands-on, team-based practical experience with strategic business understanding to build resilient professionals.
Information security
fromComputerWeekly.com
3 weeks ago

Why it takes 11 hours to resolve one ID-related cyber incident | Computer Weekly

Fragmented, opaque enterprise environments cause identity-related incidents to average 11 hours to resolve, enabling attackers to pivot and escalate privileges rapidly.
fromTheregister
1 month ago

US Air Force investigates 'privacy-related issue'

"The preliminary investigation is ongoing, and we are assessing the scope of any concerns and any necessary required remediation," the spokesperson added. "We are in the process of evaluating technical remediation solutions and will act as appropriate. Compliance with the Privacy Act and identifying a solution for this technical problem is critical to the DAF to ensure warfighter readiness and lethality."
Privacy professionals
fromSecuritymagazine
1 month ago

First Line of Defense: The Role of Modern VMS in Supercharging Investigations

When an incident occurs, every second counts. Whether it's a security breach, theft, or an unauthorized access attempt, physical security teams must act quickly to determine what happened, who was involved, and what actions to take next. Digging through hours of footage, manually piecing together evidence, and cross-referencing logs can be slow and cumbersome. But with a modern video management system ( VMS), security teams can streamline investigations, improve response times, and uncover critical insights faster - "supercharging" their investigations.
Information security
Information security
fromComputerWeekly.com
1 month ago

From breach to resilience: How the Electoral Commission rebuilt its cyber defences | Computer Weekly

The UK's electoral system is critical national infrastructure vulnerable to cyber-attacks, requiring sustained investment and comprehensive rebuilding to ensure electoral resilience.
Information security
fromComputerworld
1 month ago

Why IT/Security alignment is the key to efficient operations

Misalignment between IT and security—driven by differing mandates and siloed data—creates unpatched vulnerabilities, delayed incident response, and increased operational and regulatory risk.
fromTheregister
1 month ago

Can't stop looking at the server dashboard? You aren't alone

A new survey confirms what many IT pros already know: downtime doesn't exist, with dashboards and alerts intruding on their free time. More than half of the 616 IT professionals surveyed (52 percent) said they checked dashboards during nights, weekends, or vacations, with 59 percent saying past outages had left them more obsessive about making sure that everything is working. A third of IT pros said they felt compelled to check in at least once an hour.
Tech industry
#cyberattack
Information security
fromChannelPro
1 month ago

Cyber attacks: Can the channel save the day?

IT channel partners provide proactive, layered cybersecurity and incident response services that protect small and medium businesses lacking in-house resources.
Information security
fromDataBreaches.Net
1 month ago

Salesloft+Drift Update on Investigation Results - DataBreaches.Net

Threat actor accessed Salesloft GitHub and Drift AWS, stole OAuth tokens to access customer data; environments contained and credentials rotated.
Information security
fromSecuritymagazine
2 months ago

Jennifer Swann - Great Leaders Don't Just Manage Teams - They Build Them

Jennifer Swann progressed from bank teller to director-level information security, focusing on incident response, team building, and broad security programs including cloud and vulnerability management.
fromDevOps.com
2 months ago

From Incidents to Insights: The Power of Blameless Postmortems - DevOps.com

In complex systems, failure isn't a possibility - it's a certainty. Whether it's transactions vanishing downstream, a binary storage outage grinding builds to a halt, or a vendor misstep cascading into a platform issue, we have all likely seen firsthand how incidents unfold across a wide range of technical landscapes. Often, the immediate, apparent cause points to an obvious suspect like a surge in user activity or a seemingly overloaded component, only for deeper, blameless analysis to reveal a subtle, underlying systemic flaw that was the true trigger.
DevOps
fromDevOps.com
3 months ago

What the LLM Hype Gets Wrong: What it Takes to Build AI Agents That Work for Enterprises - DevOps.com

The leap from chatbot to AI agent is not just about adding automation - it's about architectural transformation, embedding reasoning and action in context.
Artificial intelligence
European startups
fromTechzine Global
4 months ago

CrowdStrike launches Falcon for AWS Security Incident Response

CrowdStrike introduces Falcon for AWS Security Incident Response, enhancing cloud cybersecurity with faster threat detection and incident response capabilities.
EU data protection
fromTechCrunch
5 months ago

Vanta bug exposed customers' data to other customers | TechCrunch

A product code change at Vanta exposed some customers' private data to others, affecting less than 4% of users.
UK news
fromIrish Independent
5 months ago

Man dead and child injured after shots fired in Carlow shopping centre, bomb squad called

A nine-year-old child was injured during a shooting incident at Fairgreen Shopping Centre in Carlow.
Business intelligence
fromNew Relic
5 months ago

How New Relic Catalogs improves developer productivity

Improving documentation and knowledge access can reduce incident response times.
Centralized catalogs can enhance engineering productivity by eliminating knowledge silos.
Onboarding processes can be streamlined with better system clarity and visibility.
Information security
fromSecuritymagazine
5 months ago

Deepfake Scam or Inside Job? Rethinking the BEC Threat

The growing sophistication of BEC attacks, using deepfake technology, presents new challenges for businesses in verifying incidents and handling potential insider threats.
Information security
fromDatabreaches
6 months ago

OK: Cyberattack shuts down Bartlesville School network, state testing postponed

A network security incident disrupted Bartlesville Public Schools' systems, leading to canceled state testing and an investigation into the breach.
Artificial intelligence
fromInfoWorld
6 months ago

5 ways generative AI boosts cloud and IT operations

Generative AI simplifies IT and cloud operations, enhancing efficiency in incident response, security, infrastructure management, and financial operations.
[ Load more ]