#incident-response

[ follow ]
#cybersecurity
Information security
fromComputerWeekly.com
1 month ago

Protecting the defenders: Addressing cyber's burnout crisis | Computer Weekly

Cyber security professionals face a growing burnout crisis driven by high pressure, resource gaps, persistent threats, and unrealistic expectations, requiring systemic change.
UK politics
fromIT Pro
1 month ago

Cyber Security and Resilience Bill: Security experts question practicality, scope of new legislation

The Cyber Security and Resilience Bill enforces minimum security standards and incident reporting for digital and essential services to bolster UK national cybersecurity.
fromIT Pro
1 month ago
UK politics

Cyber Security and Resilience Bill: Security experts question practicality, scope of new legislation

Information security
fromTechzine Global
6 days ago

MongoBleed threatens databases, but detection tool is available

A zlib decompression flaw (MongoBleed) in MongoDB 4.4–8.2.2 is actively exploited to extract server memory and sensitive data without authentication.
Software development
fromTheregister
6 days ago

When the lights went out Y2K started to feel far too real

Extensive Y2K preparations largely averted major failures, but isolated legacy-hardware glitches, unexpected human-caused outages, and local power issues occurred during the rollover.
Health
fromDataBreaches.Net
1 week ago

Singing River Health System temporarily shut down access to patient medical records - DataBreaches.Net

Singing River Health System detected a possible cyber incident, proactively shut down systems including MyChart, later restored access; no claim of responsibility or breach confirmation.
Privacy technologies
fromTechCrunch
1 week ago

Meet the team that hunts government spyware

Access Now's Digital Security Helpline provides 24/7 incident response and support to journalists, human rights defenders, and dissidents targeted by state-sponsored spyware.
#tabletop-exercises
fromIT Pro
1 month ago
Information security

Simulating attacks: how to use tabletop exercises in incident response

fromIT Pro
1 month ago
Information security

Simulating attacks: how to use tabletop exercises in incident response

Artificial intelligence
fromTheregister
1 week ago

Waymo updates fleet in response to Bay Area outage chaos

Waymo is updating its US robotaxi fleet to improve handling of widespread power-outage-related disabled traffic signals and reduce confirmation-related delays.
fromBusiness Matters
2 weeks ago

The Role of IT Support in Business Continuity

Robust IT systems support uninterrupted operations through resilience, security, and proactive monitoring. CIOs report that 87% of digital-first businesses rely on automated failover systems to reduce service disruption. Continuous monitoring helps detect failures before they impact users. Recovery plans activate system redundancies and restore functions with minimal input. Automated backup schedules and patch management prevent gaps in continuity. IT managers emphasise the role of configuration management and centralised monitoring tools.
Information security
fromSecuritymagazine
2 weeks ago

Louder Than Words: How Effective Security Defends Brand Reputation

"A company's reputation is its most valuable asset, and protecting it requires foresight, discipline, and transparency."
Marketing
Information security
fromTechCrunch
2 weeks ago

Cisco says Chinese hackers are exploiting its customers with a new zero-day | TechCrunch

Critical Cisco AsyncOS vulnerability enables full takeover of exposed devices; no patches exist and wiping/rebuilding software is the only current mitigation.
Information security
fromComputerWeekly.com
2 weeks ago

Security platform consolidation in 2026: The AI imperative | Computer Weekly

Organizations must consolidate cybersecurity platforms to survive AI-driven, adaptive attacks that operate in real time; fragmented tool stacks cannot respond fast enough.
Information security
fromAbove the Law
3 weeks ago

Incident Response Has Become A Law Firm Survival Skill - Above the Law

Law firms face targeted cyberattacks; preparedness and practiced incident response, clear leadership, and fast decisions prevent compounded damage and regulatory, ethical, and malpractice risks.
#observability
fromNew Relic
1 month ago
Software development

New Relic and AWS team up to accelerate AI-driven business at re:Invent 2025

fromNew Relic
1 month ago
Software development

New Relic and AWS team up to accelerate AI-driven business at re:Invent 2025

#cyber-attack
fromAmazon Web Services
1 month ago

Accelerate autonomous incident resolutions using the Datadog MCP server and AWS DevOps agent (in preview) | Amazon Web Services

On-call engineers spend hours manually investigating incidents across multiple observability tools, logs, and monitoring systems. This process delays incident resolution and impacts business operations, especially when teams need to correlate data across different monitoring platforms. AWS DevOps Agent (in preview) is a frontier agent that resolves and proactively prevents incidents, continuously improving reliability and performance of applications in AWS, multicloud, and hybrid environments.
DevOps
#cyberattack
fromIT Pro
1 month ago
Information security

Wall Street giants warned of data exposure following supply chain attack

fromIT Pro
1 month ago
Information security

Wall Street giants warned of data exposure following supply chain attack

Information security
fromThe Hacker News
1 month ago

Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

Widespread exploitation of FortiWeb and Chrome zero-days, plus supply-chain and SaaS compromises, forced major vendors into rapid incident response and urgent patching.
Tech industry
fromNew Relic
1 month ago

What the Cloudflare Outage Teaches Us About System Limits and Latent Bugs

A dormant, hard-coded feature limit combined with a routine database change caused a production panic, demonstrating need for advanced observability to detect rare latent bugs.
Information security
fromTheregister
1 month ago

Overconfidence blamed as teams stumble through cyber sims.

Most cybersecurity teams are overconfident yet underprepared, scoring around 22 percent accuracy and taking roughly 29 hours to contain simulated major incidents.
#ransomware
Information security
fromSecuritymagazine
4 months ago

Cyberattack on Jaguar Land Rover Disrupts Business Operations

Jaguar Land Rover suffered a cyberattack that forced proactive system shutdowns, severely disrupting retail and production while customer data shows no evidence of compromise.
Information security
fromIT Pro
4 months ago

Data I/O shuts down systems in wake of ransomware attack

Data I/O experienced a ransomware attack on 6 August that disrupted multiple IT systems and may materially affect financial results due to remediation costs.
fromSecuritymagazine
1 month ago

Where to Stretch Your Cybersecurity Budget

It's really important to go back to just the cybersecurity basics. Are you using multi-factor authentication? Are you training your staff and employees at all levels to not click that link? Are you patching your systems? Do you have good monitoring software and applications that are monitoring your network even when you're sleeping?
Information security
fromIT Pro
1 month ago

Inside a cloud outage

"The worst feeling in the world is to be in the middle of an incident and realize that it would be a great thing that you could do to resolve that incident, if only a tool had been built before, right? So it'd be great if you figure that out before you get into that incident, and then you have the tool ready to go. "
DevOps
Information security
fromTechzine Global
2 months ago

One in four organizations unprepared for cyber threats

Organizations are poorly prepared for cyberattacks due to human error, inadequate training, limited AI adoption, insufficient penetration testing, and weak incident response planning.
Business
fromSecuritymagazine
2 months ago

The Moment of Truth: Conducting Your BCP Test and Capturing Lessons

Effective BCP tests uncover flaws in a safe environment, build muscle memory, and generate actionable insights to strengthen organizational preparedness.
UK news
fromTheregister
2 months ago

UK lotto players land data jackpot thanks to website error

A technical error at People's Postcode Lottery briefly exposed names, addresses, email addresses, and birthdates of a small fraction of subscribers before services were restored.
Information security
fromThe Hacker News
2 months ago

The Death of the Security Checkbox: BAS Is the Power Behind Real Defense

Breach and attack simulation proves defenses by continuously testing live environments, prioritizing reaction and real-time validation over predictive, checklist-based security.
fromIT Pro
2 months ago

US telco confirms hackers breached systems in stealthy state-backed cyber campaign - and remained undetected for nearly a year

Ribbon supplies software, IP, and optical networking systems to telecoms service providers, businesses, and critical infrastructure organizations including BT, Verizon, CenturyLink, Deutsche Telekom, and Tata, as well as public-sector bodies such as the US Defense Department and the City of Los Angeles. In a with the US Securities and Exchange Commission (SEC), the company has revealed that "unauthorized persons, reportedly associated with a nation-state actor" had gained access to its network in December 2024.
Information security
Information security
fromwww.theguardian.com
2 months ago

I lost 25 pounds in 20 days': what it's like to be on the frontline of a global cyber-attack

A SolarWinds supply-chain cyberattack allowed Russian hackers remote access to thousands of customers, forcing emergency response, alternative communications, and global coordination by the company's CISO.
Information security
fromInfoQ
2 months ago

Slack Security: Inside the New Anomaly Event Response Architecture

Slack's Anomaly Event Response autonomously detects high-confidence threat behaviors and rapidly terminates affected sessions, reducing detection-to-mitigation time from hours to minutes.
Information security
fromDataBreaches.Net
2 months ago

F5 discloses breach tied to nation-state threat actor - DataBreaches.Net

F5 experienced a highly sophisticated cyberattack attributed to a nation-state, involving prolonged unauthorized access; DOJ permitted delayed public disclosure due to national security concerns.
#cloud-security
fromIT Pro
6 months ago
Information security

Cloud breaches are surging, but enterprises aren't quick enough to react

Information security
fromIT Pro
6 months ago

Cloud breaches are surging, but enterprises aren't quick enough to react

Cloud breaches remain undetected for significant durations due to alert fatigue and tool fragmentation.
fromDataBreaches.Net
2 months ago

Obsession with cyber breach notification fuelling costly mistakes - DataBreaches.Net

Regulations such as the General Data Protection Regulation (GDPR) and the Australian Prudential Regulation Authority's (Apra's) CPS 230 standard have led organisations to become "really obsessed" with the 72-hour notification window following a data breach, according to Shannon Murphy, global security and risk strategist at Trend Micro.
EU data protection
#data-breach
fromThe Verge
2 months ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

fromDataBreaches.Net
2 months ago
Information security

I called American Income Life Insurance to alert them to a data breach involving 150,000 customers. Here's why they didn't find out. - DataBreaches.Net

fromThe Verge
2 months ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

fromDataBreaches.Net
2 months ago
Information security

I called American Income Life Insurance to alert them to a data breach involving 150,000 customers. Here's why they didn't find out. - DataBreaches.Net

Information security
fromTechzine Global
2 months ago

SonicWall VPN accounts compromised with stolen login credentials

Over 100 SonicWall SSL VPN accounts were compromised using stolen valid credentials, enabling rapid access, reconnaissance, and attempts to access local Windows accounts.
fromThe Verge
2 months ago

Discord says 70,000 users may have had their government IDs leaked in breach

Following last week's announcement about a security incident involving a third-party customer service provider, we want to address inaccurate claims by those responsible that are circulating online. First, as stated in our blog post, this was not a breach of Discord, but rather a third-party service we use to support our customer service efforts. Second, the numbers being shared are incorrect and part of an attempt to extort a payment from Discord.
Information security
fromSecuritymagazine
2 months ago

Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

The truth is, these teams are working on the same event. They're just seeing it from different angles. If they aren't connected, response becomes fragmented and valuable time gets lost. Connecting the Dots in Real Time This is where a unified approach to critical event management makes a real difference. It's not about layering on more tools. It's about connecting the ones already in place and giving people a shared view and a clear process when something goes wrong.
Information security
Information security
fromSecuritymagazine
2 months ago

The Future of Cybersecurity Training and What It Means for Employers

Effective cybersecurity training must combine hands-on, team-based practical experience with strategic business understanding to build resilient professionals.
Information security
fromComputerWeekly.com
2 months ago

Why it takes 11 hours to resolve one ID-related cyber incident | Computer Weekly

Fragmented, opaque enterprise environments cause identity-related incidents to average 11 hours to resolve, enabling attackers to pivot and escalate privileges rapidly.
fromTheregister
3 months ago

US Air Force investigates 'privacy-related issue'

"The preliminary investigation is ongoing, and we are assessing the scope of any concerns and any necessary required remediation," the spokesperson added. "We are in the process of evaluating technical remediation solutions and will act as appropriate. Compliance with the Privacy Act and identifying a solution for this technical problem is critical to the DAF to ensure warfighter readiness and lethality."
Privacy professionals
fromSecuritymagazine
3 months ago

First Line of Defense: The Role of Modern VMS in Supercharging Investigations

When an incident occurs, every second counts. Whether it's a security breach, theft, or an unauthorized access attempt, physical security teams must act quickly to determine what happened, who was involved, and what actions to take next. Digging through hours of footage, manually piecing together evidence, and cross-referencing logs can be slow and cumbersome. But with a modern video management system ( VMS), security teams can streamline investigations, improve response times, and uncover critical insights faster - "supercharging" their investigations.
Information security
Information security
fromComputerWeekly.com
3 months ago

From breach to resilience: How the Electoral Commission rebuilt its cyber defences | Computer Weekly

The UK's electoral system is critical national infrastructure vulnerable to cyber-attacks, requiring sustained investment and comprehensive rebuilding to ensure electoral resilience.
Information security
fromComputerworld
3 months ago

Why IT/Security alignment is the key to efficient operations

Misalignment between IT and security—driven by differing mandates and siloed data—creates unpatched vulnerabilities, delayed incident response, and increased operational and regulatory risk.
fromTheregister
3 months ago

Can't stop looking at the server dashboard? You aren't alone

A new survey confirms what many IT pros already know: downtime doesn't exist, with dashboards and alerts intruding on their free time. More than half of the 616 IT professionals surveyed (52 percent) said they checked dashboards during nights, weekends, or vacations, with 59 percent saying past outages had left them more obsessive about making sure that everything is working. A third of IT pros said they felt compelled to check in at least once an hour.
Tech industry
Information security
fromChannelPro
3 months ago

Cyber attacks: Can the channel save the day?

IT channel partners provide proactive, layered cybersecurity and incident response services that protect small and medium businesses lacking in-house resources.
Information security
fromDataBreaches.Net
3 months ago

Salesloft+Drift Update on Investigation Results - DataBreaches.Net

Threat actor accessed Salesloft GitHub and Drift AWS, stole OAuth tokens to access customer data; environments contained and credentials rotated.
Information security
fromSecuritymagazine
4 months ago

Jennifer Swann - Great Leaders Don't Just Manage Teams - They Build Them

Jennifer Swann progressed from bank teller to director-level information security, focusing on incident response, team building, and broad security programs including cloud and vulnerability management.
fromDevOps.com
4 months ago

From Incidents to Insights: The Power of Blameless Postmortems - DevOps.com

In complex systems, failure isn't a possibility - it's a certainty. Whether it's transactions vanishing downstream, a binary storage outage grinding builds to a halt, or a vendor misstep cascading into a platform issue, we have all likely seen firsthand how incidents unfold across a wide range of technical landscapes. Often, the immediate, apparent cause points to an obvious suspect like a surge in user activity or a seemingly overloaded component, only for deeper, blameless analysis to reveal a subtle, underlying systemic flaw that was the true trigger.
DevOps
fromDevOps.com
5 months ago

What the LLM Hype Gets Wrong: What it Takes to Build AI Agents That Work for Enterprises - DevOps.com

The leap from chatbot to AI agent is not just about adding automation - it's about architectural transformation, embedding reasoning and action in context.
Artificial intelligence
European startups
fromTechzine Global
6 months ago

CrowdStrike launches Falcon for AWS Security Incident Response

CrowdStrike introduces Falcon for AWS Security Incident Response, enhancing cloud cybersecurity with faster threat detection and incident response capabilities.
EU data protection
fromTechCrunch
7 months ago

Vanta bug exposed customers' data to other customers | TechCrunch

A product code change at Vanta exposed some customers' private data to others, affecting less than 4% of users.
UK news
fromIrish Independent
7 months ago

Man dead and child injured after shots fired in Carlow shopping centre, bomb squad called

A nine-year-old child was injured during a shooting incident at Fairgreen Shopping Centre in Carlow.
[ Load more ]