Archive for the ‘Security Incident’ Category

ENISA provides data related to major telecom security incidents in 2021

ENISA published a report that includes anonymised and aggregated information about major telecom security incidents in 2021. ENISA published a report that provides anonymized and aggregated information about major telecom security incidents in 2021. Every European telecom operator that suffers a security incident, notifies its national authorities which share a summary of these reports to […]

Leave a Comment

The Red Team Guide

Download a copy of The Red Team Guide Rtfm: Red Team Field Manual The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic […]

Leave a Comment

Cybersecurity Incident & vulnerability response playbooks

Cybersecurity Incident & Vulnerability Response Playbooks – Audiobook

Leave a Comment

CISA releases incident response plans for federal agencies

The Cybersecurity and Infrastructure Security Agency (CISA) has released new cybersecurity response plans for federal civilian executive branch (FCEB) agencies (” Federal Government Cybersecurity Incident and Vulnerability Response Playbooks“). The documents aim at developing a standard set of operational procedures (i.e., playbook) to be used in planning and conducting cybersecurity vulnerability and incident response activity for […]

Leave a Comment

ENISA – The need for Incident Response Capabilities in the health sector

The European Union Agency for Cybersecurity (ENISA) published an analysis of the current state of development of sectoral CSIRT capabilities in the health sector since the implementation of the NIS Directive. An attack against a hospital can lead to physical damages and put the lives of patients at risk. The Agency remarks the need to […]

Leave a Comment

3 Ways To Avoid Internet Hacking Incidents With Sports Related Ventures

Nowadays just as one cannot take enough safety measures when leaving their house of work to avoid running into problems and tribulations along the way, the exact same measures are to be taken into consideration when strolling around the wonderful world of the internet. It can be argued that the internet stands right up there […]

Leave a Comment

Hackers use legit tool to take over Docker, Kubernetes platforms

In a recent attack, cybercrime group TeamTNT relied on a legitimate tool to avoid deploying malicious code on compromised cloud infrastructure and still have a good grip on it. Source: Hackers use legit tool to take over Docker, Kubernetes platforms Misusing tool of the trade Analyzing the attack, researchers at Intezer discovered that TeamTNT installed […]

Leave a Comment

U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert

The Cybersecurity and Infrastructure Security Agency (CISA) published an alert for Windows users to patch the critical severity Remote Desktop Services (RDS) RCE security flaw dubbed BlueKeep. Source: U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert   How to check if a target is vulnerable to the new RDP vulnerability (BlueKeep). Enter your email address: Delivered […]

Leave a Comment

ISO 27001 Information Security Incident Management

Section 13 of Annex A handle information security incident management. One of the important thing to know about this section is the difference between an event and an incident. Information Securty Event: is an occurance of a system, service or netwrok state indicating a possible breach of information security policy or failure of safeguards. Informtaion […]

Leave a Comment

What Is a Security Incident and How to handle one

A security incident is a computer, network, or paper based activity which results (or may result) in misuse, damage, denial of service, compromise of integrity, or loss of confidentiality of a network, computer, application, or data; and threats, misrepresentations of identity, or harassment of or by individuals using these resources. Examples of incidents may include […]

Leave a Comment