Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The SANS Institute has disclosed a security incident which resulted in 28,000 records of personally identifiable information (PII) being forwarded to an unknown email address. [Read More]
Multiple Reddit moderator accounts have been compromised and abused to post pro-Trump messages on a variety of subreddits. [Read More]
The U.S. Treasury Department has fined Capital One $80 million for careless network security practices that enabled a hack that accessed the personal information of 106 million of the bank’s credit card holders. [Read More]
Twitter has informed customers that a vulnerability in its Android app could have been exploited by malicious applications to access direct messages and other private data. [Read More]
Lafayette, Colorado, officials announced Tuesday the city’s computer systems were hacked and they were forced to pay a ransom to regain access. [Read More]
The patches released by Linux distributions for the GRUB2 vulnerability dubbed BootHole (CVE-2020-10713) are causing many systems to become unbootable. [Read More]
Twitter on Thursday revealed that several employees were targeted with phone spear-phishing in a social engineering attack leading to the recent security incident. [Read More]
Red Hat has told customers not to install the package updates released in response to the BootHole vulnerability after users reported that their systems hung after applying the updates. [Read More]
The FBI has released an alert to warn businesses of ongoing cyberattacks involving the NetWalker ransomware. [Read More]
Companies affected by the BootHole vulnerability in the GRUB2 bootloader have started issuing advisories. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Stan Engelbrecht's picture
What does the cyber kill chain have to do with Sherlock Holmes, and this quote in particular?
Ashley Arbuckle's picture
While we can’t turn our attention away from gathering data, we must devise new ways to deal with the onslaught of data. Humans simply can’t keep up, and the problem is getting worse.
Marc Solomon's picture
Security teams have more internal system data than they know what to do with from sources including the SIEM system, log management repository, case management systems and security infrastructure. Security analysts struggle to make sense of too much data.
Josh Lefkowitz's picture
Request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat intelligence market.
Stan Engelbrecht's picture
Security teams need to incorporate intent-based response, behavior-based detection, and a kill chain perspective to get a step ahead of their adversaries.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Ashley Arbuckle's picture
Shifting to a proactive approach to incident response (IR) is critical but identifying partners who can provide the capabilities you need is a challenging task.
Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.