Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Computer networks of Garmin were coming back online Monday after an outage widely believed to have been due to a ransomware attack. [Read More]
Computer networks of smartwatch and electronics firm Garmin were offline July 24 in an incident which raised concerns of a ransomware attack affecting both its aviation and fitness app services. [Read More]
Twitter says an elected Dutch official was among 36 account holders whose direct message inboxes were accessed in a recent high-profile hack. [Read More]
A genealogy website used to catch one of California’s most wanted serial killers remained shut down Thursday after a security breach exposed the DNA profiles of more than a million people to law enforcement agencies. [Read More]
Twitter on Wednesday revealed that attackers accessed the direct message (DM) inboxes of some of the accounts that were compromised in last week’s security incident. [Read More]
Beijing accused the United States of "slander" after two Chinese nationals were indicted for seeking to steal coronavirus vaccine research and hacking hundreds of companies. [Read More]
DeepSource has reset tokens, secrets, private keys, and employee credentials after being informed that its GitHub application was compromised. [Read More]
US charges two Chinese hackers for stealing hundreds of millions of dollars of trade secrets from companies across the world and more recently targeting firms developing a vaccine for the coronavirus. [Read More]
Cloud software provider Blackbaud has admitted that it paid cybercriminals to regain control of data following a ransomware attack in May 2020. [Read More]
Social media platform Twitter has confirmed that attackers downloaded user data from some of the accounts compromised in last week’s security incident. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
National Cybersecurity Awareness Month (NCSAM) is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness.
Josh Lefkowitz's picture
Here’s a crash-course on the intelligence cycle and how you can apply and derive value from its core principles—no matter your role or security discipline:
Marc Solomon's picture
Five things you should know about incident pruning and how to apply it to improve investigations, threat hunting and incident response.
Josh Lefkowitz's picture
A use case-centric approach to threat intelligence can yield substantial benefits and is absolutely worth pursuing. It just needs to be pursued properly.
Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.
Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
Security teams have more internal system data than they know what to do with from sources including the SIEM system, log management repository, case management systems and security infrastructure. Security analysts struggle to make sense of too much data.