social.heise.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Der Mastodon-Server von und für Heise Medien und insb. die Nachrichten von heise online.

Serverstatistik:

39
aktive Profile

#incidentresponse

2 Beiträge2 Beteiligte0 Beiträge heute

Seen a lot of hype about this Trend Micro blog, but im not sure I can get on board with it. The whole thing seems a bit of a stretch.

Whether there are blank characters or line breaks doesn't change how the technique works, its only prevents a user easily spotting it via the lnk file

The push on zero day, vulnerability, 1000s of instances across multiple 'APTs' is a bit much and comes across as marketing hype too.

trendmicro.com/en_us/research/

Trend Micro · ZDI-CAN-25373 Windows Shortcut Exploit Abused as Zero-Day in Widespread APT CampaignsTrend Zero Day Initiative™ (ZDI) uncovered both state-sponsored and cybercriminal groups extensively exploiting ZDI-CAN-25373, a Windows .lnk file vulnerability that enables hidden command execution.

NEW:

Almost one month after Brain Cipher claimed to have attacked them, Pulmonary Physicians of South Florida has yet to publicly confirm or deny any breach.

Part of the proof of claims is a file tree with almost 424k files.

databreaches.net/2025/03/17/al

Weekly security communication practice with your peers!

Join industry colleagues in 60-min weekly Slack simulations where you can:

✅ Test communication approaches you can't try at work
✅ Learn from diverse perspectives across organizations
✅ Build "muscle memory" for high pressure communication
✅ Network with professionals facing similar challenges

Unlike traditional tabletops, these bite-sized drills fit your schedule and focus on practical communication skills across 12 security incident categories.

Available now starting at $50/month.

Learn more: discernibleinc.com/drills

#SecurityCommunication #IncidentResponse
#ProfessionalDevelopment

Discernible IncDiscernible Drills — Discernible Inc

Did you know a ransomware tabletop exercise can uncover gaps and failure points in your incident response plan? A recent study found it can also reduce your data breach costs by an average of $248K! If you have not planned a ransomware tabletop exercise already, it's time to put this on your schedule!

In our new blog, we share common failure points, @MDurrin's favorite ransomware tabletop exercise scenarios, and tips to help you get the most out of your next exercise.

Read the blog: lmgsecurity.com/how-a-ransomwa

LMG SecurityHow a Ransomware Tabletop Exercise Can Dramatically Reduce Your Losses If You’re Attacked | LMG SecurityA Ransomware Tabletop Exercise is one of the best ways to test your organization’s ability to handle an attack, identify process gaps, & ensure a rapid response that reduces your losses. Read our favorite scenarios and tips!

The FIRST Board of Directors has unveiled a comprehensive Strategy Framework to enhance our ability to fulfill our mission as a global leader in cybersecurity and incident response.

This framework introduces a structured three-year Strategic Plan focused on five key objectives:

🌎 Global Recognition and Trust
⭐ Member Value Creation
📚 Development and Education
🤝 Trusted Venue for Standards
⚖️ Effective Governance and Financial Resilience

Learn more here: go.first.org/fQNwV

FIRST — Forum of Incident Response and Security TeamsFIRST Strategic Plan 2025-2028

🔥 Launching today: Discernible Drills - our new weekly security/privacy communication training delivered via Slack!

Based on 20 years of experience in, this new service helps security and privacy professionals practice communication skills through weekly 60-minute drills.

- Covers 12 different incident types
- Text-based with multimedia elements for auditory learners
- No PO required - individual subscriptions
- Currently runs Wednesdays 12-1pm ET with more times coming soon
- Two tiers: $50/mo or $100/mo

Security incidents are more than breaches, and communication is more than media statements. Practice makes perfect.

Learn more at discernibleinc.com/blog/introd

Discernible IncIntroducing Discernible Drills: The Power of Persistent Practice — Discernible IncJoin a new incident response communication drill with industry peers every week!

@hacks4pancakes (@dragosinc) will join us on March 19 for our Foundations of DFIR panel!

While that's a few weeks away, you can check out Lesley's blog post on The Shifting Landscape of OT Incident Response which illustrates the importance of specialized incident response and digital forensics in maintaining the security and integrity of OT systems.

Find it here: dragos.com/blog/the-shifting-l

If you want to catch Lesley along with panelists @danonsecurity, David Bianco, and Sarah Sabotka for unique insights on bolstering your DFIR foundations, save your spot here: domaintools.com/webinar-gettin

🇳🇿 I've had quite a few outrageous responses to my alerts, this is another one of those, sent by teammateapp.com CEO.

After my initial alert and follow up email, I get a reply lying about the severity of the exposure and telling me to stop harassing the company.

This CEO also didn't know what Proton is and thought I work for them and threatened to report me to them in case I didn't stop. :blobshrug:

Read about it here: jltee.substack.com/p/new-zeala

The Hub of Stupi.. *misconfigs · New Zealand Company’s ‘Impossible-to-Hack’ Security Turns Out to Be No Security at AllVon JayeLTee

I had a fabulous two-slide presentation today at work. The topic was the results of the data analysis we did after collecting calls to action from the 2024 incident retro I volunteered to run three weeks ago.

So I distilled our actions into four dimensions of work, created user stories, and prioritized by stack ranking the actions. Already been knocking those out, but slow since I am on-call this week, too.

I had fun breaking through a linear "crawl-walk-run" metaphor that is slung around here a lot, by describing how our work is a hypercube, and those dimensions (Metrics, Tracking, IC / Responder support, the Post-Incident) are dynamic but linked.

Unter dem Motto "meet. learn. protect." findet die auch dieses Jahr die secIT von @heisec in Hannover statt - am 18.03. mit ganztägigen Workshops zu unterschiedlichen Security-Themen und am 19. und 20.03. zusätzlich mit einem umfangreichen Messe- und Konferenzprogramm.
In diesem Rahmen bieten auch zahlreiche HiSolutions-Experten vertiefende Workshops zu den Themen #NIS-2, #KI, #IncidentResponse, #Pentest und #BCM an.
Mehr zum Programm @secIT by heise: secit-heise.de/programm#progra
#itsecurity