Skip to content
  • 0 Votes
    7 Posts
    0 Views
    amvinfe@infosec.exchangeA
    @masek @PogoWasRight @euroinfosec I agree with @PogoWasRight on certain points that, in my view, are quite straightforward.Let’s start from the premise that, in the vast majority of cases, the affected entities do not adequately protect their data - any kind of data. And here lies the strict liability of those who, on the contrary, should have ensured its security.If a cybercriminal claims to be in possession of exfiltrated data, they generally also provide proof files and a file tree. Consequently, if the attacker’s claims are true, the affected entity is already aware of both the volume of the exfiltrated data and its nature.Third point: a data breach always causes harm. Personally, I wouldn’t dwell too much on the damage suffered by the affected entity; I’m much more interested in the consequences that damage causes - or could cause - to “indirect victims” (students, school staff, patients…), that is, all those people who have entrusted their data and their trust to third parties such as schools, universities, hospitals, and other organizations. Of course, we can also assess the severity of the damage on a scale of 1 to 10, but the damage remains nonetheless, and when personal data is exposed, the perception of severity is always subjective.The fact remains, however, that if a person entrusts sensitive data to a third party, that party has not only a legal obligation to protect it without any negligence but also a moral duty to prevent someone’s private life from being publicly exposed.Finally, I find the behavior of numerous entities affected by cyberattacks involving data exfiltration and encryption to be very disappointing: they often inform the “indirect victims” only after many months and, in some cases, even years later.
  • 0 Votes
    1 Posts
    0 Views
    hackerworkspace@infosec.exchangeH
    Canvas Maker Instructure Reaches Agreement With Cybercriminalshttps://www.infosecurity-magazine.com/news/canvas-cybercriminals-agreement/Read on HackerWorkspace: https://hackerworkspace.com/article/canvas-maker-instructure-reaches-agreement-with-cybercriminals#ransomware #databreach #incidentresponse
  • 0 Votes
    1 Posts
    0 Views
    hackerworkspace@infosec.exchangeH
    [DxBP] Part 1 - Technical Detection Engineering Best Practiceshttps://kqlquery.com/posts/dxbp-part1/Read on HackerWorkspace: https://hackerworkspace.com/article/dxbp-part-1-technical-detection-engineering-best-practices#cybersecurity #incidentresponse #threatintelligence
  • 0 Votes
    1 Posts
    0 Views
    hackerworkspace@infosec.exchangeH
    Hackers accessed BWH Hotels reservation system for monthshttps://securityaffairs.com/192038/data-breach/hackers-accessed-bwh-hotels-reservation-system-for-months.htmlRead on HackerWorkspace: https://hackerworkspace.com/article/hackers-accessed-bwh-hotels-reservation-system-for-months#databreach #incidentresponse #privacy
  • 0 Votes
    1 Posts
    0 Views
    hackerworkspace@infosec.exchangeH
    Accelerating detection engineering using AI-assisted synthetic attack logs generation | Microsoft Security Bloghttps://www.microsoft.com/en-us/security/blog/2026/05/12/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation/Read on HackerWorkspace: https://hackerworkspace.com/article/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation-microsoft-security-blog#cybersecurity #incidentresponse #threatintelligence
  • The two speeds of incident response:

    Uncategorized incidentrespons
    2
    0 Votes
    2 Posts
    0 Views
    davemwilburn@infosec.exchangeD
    @Emily Most of my experience has been both, simultaneously.
  • 🔵 THREAT INTELLIGENCE

    Uncategorized infosec ransomware incidentrespons
    1
    0 Votes
    1 Posts
    0 Views
    matchbook3469@infosec.exchangeM
    THREAT INTELLIGENCEIvanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level AccessVulnerability | CRITICALCVEs: CVE-2026-6973Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day...Full analysis:https://www.yazoul.net/news/article/ivanti-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-acces#InfoSec #Ransomware #IncidentResponse
  • 0 Votes
    1 Posts
    0 Views
    hackerworkspace@infosec.exchangeH
    Instructure confirms data breach, ShinyHunters claims attackhttps://www.bleepingcomputer.com/news/security/instructure-confirms-data-breach-shinyhunters-claims-attack/Read on HackerWorkspace: https://hackerworkspace.com/article/instructure-confirms-data-breach-shinyhunters-claims-attack#databreach #cybersecurity #incidentresponse
  • 0 Votes
    1 Posts
    0 Views
    hackerworkspace@infosec.exchangeH
    Police dismantles 9 crypto scam centers, arrests 276 suspectshttps://www.bleepingcomputer.com/news/security/police-dismantles-9-crypto-investment-scam-centers-arrests-276-suspects/Read on HackerWorkspace: https://hackerworkspace.com/article/police-dismantles-9-crypto-scam-centers-arrests-276-suspects#cybersecurity #incidentresponse #threatintelligence
  • 0 Votes
    1 Posts
    3 Views
    rootshellonline@infosec.exchangeR
    What’s trending in cybersecurity today? Find out with the latest YouTube playlist we’ve curated. https://www.youtube.com/playlist?list=PLXqx05yil_mfZioOOXxtIbrFO95MsYapW#Malware #Phishing #IncidentResponse #CyberAwareness #AppSec
  • 0 Votes
    1 Posts
    0 Views
    firstdotorg@infosec.exchangeF
    FIRST's Q1FY26 Newsletter is here, and it's packed.Here's a look at what's inside: On Vulnerabilities & VulnConFIRST Chair Olivier Caleff reflects on VulnCon 2026 and what it means for how CSIRTs approach vulnerability management, from prioritization to escalation to the evolving role of EPSS in daily operations. Global Policy & the UN Cybersecurity MechanismFIRST is engaging with the newly launched UN Global Cybersecurity Mechanism (G-Mech), bringing operational incident response expertise to international policy discussions.Member Spotlight: Koen Van Impe20+ years in cybersecurity, a core contributor to the MISP project, and a tireless open-source advocate.Koen's work is a reminder of what community-first contribution looks like in practice. SIG Updates STP SIG published a white paper, authored by AUSCERT, on the future of CERTs/CSIRTs/ISACs Vulnerability SIG forecast report predicted 2026 will be the first year to exceed 50,000 published CVEs CTI SIG launched new educational videos and a blog series NETSEC SIG published guidance on characterizing abusive IP proxies Metrics SIG released Version 1.0 of Metrics for the FIRST CSIRT Services Framework Community & Capacity BuildingFIRST CORE welcomed support from the Internet Society and Internet Society Foundation through the newly launched Common Good Cyber Fund.In two years, FIRST's Africa Regional Liaison initiative has worked with 1,210 cybersecurity professionals and delivered 50+ initiatives across 33 countries. Events & ConferencesA strong start to the year with three Technical Colloquia: Paris, Bangalore, and Uzbekistan, each bringing together regional communities to share lessons on resilience, AI, and cyber response.FIRST also announced its three flagship 2026 conferences: VulnCon (Scottsdale), the CTI Conference (Munich), and the 38th Annual Conference (Denver). Looking AheadThe 2026 FIRST AGM takes place June 15 during the Annual Conference in Denver and will also be streamed for remote observation.Members, make sure your voting rep is updated before May 12!Read more https://go.first.org/smsdl#CyberDefense #cybersecurity #IncidentResponse #infosec
  • 0 Votes
    1 Posts
    1 Views
    pogowasright@infosec.exchangeP
    Almost one year after discovery, Sandhills Medical Foundation notifies 169,017 people affected by a cyberattackThis was an attack by INC Ransom, who dumped the data in June 2025. INC didn't tag it as an encryption invcident -- just as hack, exfil, ransom demand. So I'm not sure why it took Sandhills about a year to make notifications https://databreaches.net/2026/04/29/almost-one-year-after-discovery-sandhills-medical-foundation-notifies-169017-people-affected-by-a-cyberattack/#databreach #HIPAA #incidentresponse #INCransom #healthsec
  • 0 Votes
    1 Posts
    0 Views
    alonso_reydes@infosec.exchangeA
    ️ El Curso de Autopsy Digital Forensics está permanente disponible en el aula virtual para acceso inmediato. WhatsApp: https://wa.me/51949304030 https://www.reydes.com/e/Curso_Forense_de_Autopsy #digitalforensics #dfir #diskforensics #incidentresponse #forensictools #datacarving #cybercrime
  • 0 Votes
    1 Posts
    3 Views
    rootshellonline@infosec.exchangeR
    What’s trending in cybersecurity today? Find out with the latest YouTube playlist we’ve curated. https://www.youtube.com/playlist?list=PLXqx05yil_menB9CzGYR3VeV9TtRT_H1s#Malware #Phishing #IncidentResponse #CyberAwareness #AppSec
  • 0 Votes
    1 Posts
    1 Views
    chum1ng0@infosec.exchangeC
    Sensitive Data Exposure at the Venezuelan Football Federation (FVF)The Venezuelan Football Federation (FVF) maintained a publicly accessible storage system that exposed sensitive information belonging to several football clubs, including:Club licenses for teams such as Club Carabobo FC, Dynamo Puerto F.C., and Titanes FC.COMET player registration files from Club Carabobo FC.Tax returns and contracts.What specific data was exposed in the COMET files?Full names, national ID numbers (cédulas de identidad), phone numbers, email addresses, and home addresses.This vulnerability was responsibly reported on April 6 via email and through the official complaints/reporting section on the FVF website. The exposed storage was blocked on April 17.However, as of today, I have not received any from the FVF.In the last few hours I've learned that the FVF is looking for human capital in cybersecurity.If this hadn't been reported, it might still have been active and could have put players' data at risk.#databreach #Venezuela #cybersecurity #incidentresponse
  • 0 Votes
    1 Posts
    0 Views
    hackerworkspace@infosec.exchangeH
    DFIR Report – The Gentlemen & SystemBC: A Sneak Peek Behind the Proxyhttps://research.checkpoint.com/2026/dfir-report-the-gentlemen/Read on HackerWorkspace: https://hackerworkspace.com/article/dfir-report-the-gentlemen-systembc-a-sneak-peek-behind-the-proxy#cybersecurity #incidentresponse #threatintelligence
  • 0 Votes
    1 Posts
    1 Views
    bsidesluxembourg@infosec.exchangeB
    Inside the Tech: New Talk Added to BSides Luxembourg𝗠𝗔𝗦𝗧𝗘𝗥𝗜𝗡𝗚 𝗜𝗡𝗖𝗜𝗗𝗘𝗡𝗧 𝗥𝗘𝗦𝗣𝗢𝗡𝗦𝗘 𝗪𝗜𝗧𝗛 𝗞𝗔𝗡𝗩𝗔𝗦 – Ardit BeuBring clarity to chaos in this hands-on 40-minute talk focused on modern incident response workflows. Discover how Kanvas transforms scattered investigations into structured, visual timelines—replacing messy spreadsheets with a unified, collaborative workspace.From case management and attack chain mapping to threat intelligence lookups and reporting, this session showcases how open-source tooling can streamline IR, improve team collaboration, and accelerate investigations. Whether you're mapping MITRE ATT&CK or leveraging LLM-assisted workflows, this is a practical deep dive into making incident response faster and smarter.Ardit Beu is an Information Security Specialist at ESET with expertise in incident response, threat hunting, and security monitoring. His work focuses on improving real-world investigation workflows and empowering teams with practical, effective tooling. Conference Dates: 6–8 May 2026 | 09:00–18:00 14, Porte de France, Esch-sur-Alzette, Luxembourg️ Tickets: https://2026.bsides.lu/tickets/ Schedule: https://hackertracker.app/schedule?conf=BSIDESLUX2026 #BSidesLuxembourg2026 #IncidentResponse #ThreatIntelligence #DFIR #CyberSecurity #OpenSource
  • 0 Votes
    1 Posts
    6 Views
    rootshellonline@infosec.exchangeR
    New playlist online: from malware analysis to ethical hacking demos. Check it out here https://www.youtube.com/playlist?list=PLXqx05yil_mcO0pCcxipycCV0gQ2oFgNU#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
  • 0 Votes
    1 Posts
    1 Views
    hackerworkspace@infosec.exchangeH
    European Gym giant Basic-Fit data breach affects 1 million membershttps://www.bleepingcomputer.com/news/security/european-gym-giant-basic-fit-data-breach-affects-1-million-members/Read on HackerWorkspace: https://hackerworkspace.com/article/european-gym-giant-basic-fit-data-breach-affects-1-million-members#databreach #cybersecurity #incidentresponse
  • 0 Votes
    1 Posts
    3 Views
    rootshellonline@infosec.exchangeR
    Two playlists every day on hacking & defense. Discover the latest tools and techniques now. https://www.youtube.com/playlist?list=PLXqx05yil_mcEhaCb5HFCMiC2xzbDv8z1#CyberSecurity #IncidentResponse #CloudSecurity #Hacking #Phishing