#incidentresponse — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #incidentresponse, aggregated by home.social.
-
How to Investigate with Windows Prefetch Files
-
How to Investigate with Windows Prefetch Files
-
How to Investigate with Windows Prefetch Files
-
How to Investigate with Windows Prefetch Files
-
Kazuar: Anatomy of a nation-state botnet | Microsoft Security Blog
https://www.microsoft.com/en-us/security/blog/2026/05/14/kazuar-anatomy-of-a-nation-state-botnet/
Read on HackerWorkspace: https://hackerworkspace.com/article/kazuar-anatomy-of-a-nation-state-botnet-microsoft-security-blog
-
Kazuar: Anatomy of a nation-state botnet | Microsoft Security Blog
https://www.microsoft.com/en-us/security/blog/2026/05/14/kazuar-anatomy-of-a-nation-state-botnet/
Read on HackerWorkspace: https://hackerworkspace.com/article/kazuar-anatomy-of-a-nation-state-botnet-microsoft-security-blog
-
Kazuar: Anatomy of a nation-state botnet | Microsoft Security Blog
https://www.microsoft.com/en-us/security/blog/2026/05/14/kazuar-anatomy-of-a-nation-state-botnet/
Read on HackerWorkspace: https://hackerworkspace.com/article/kazuar-anatomy-of-a-nation-state-botnet-microsoft-security-blog
-
Kazuar: Anatomy of a nation-state botnet | Microsoft Security Blog
https://www.microsoft.com/en-us/security/blog/2026/05/14/kazuar-anatomy-of-a-nation-state-botnet/
Read on HackerWorkspace: https://hackerworkspace.com/article/kazuar-anatomy-of-a-nation-state-botnet-microsoft-security-blog
-
NATO Locked Shields 2026: RL Joins Live-Fire Cyber Event | RL Blog
https://www.reversinglabs.com/blog/locked-shields-2026
Read on HackerWorkspace: https://hackerworkspace.com/article/nato-locked-shields-2026-rl-joins-live-fire-cyber-event-rl-blog
-
NATO Locked Shields 2026: RL Joins Live-Fire Cyber Event | RL Blog
https://www.reversinglabs.com/blog/locked-shields-2026
Read on HackerWorkspace: https://hackerworkspace.com/article/nato-locked-shields-2026-rl-joins-live-fire-cyber-event-rl-blog
-
NATO Locked Shields 2026: RL Joins Live-Fire Cyber Event | RL Blog
https://www.reversinglabs.com/blog/locked-shields-2026
Read on HackerWorkspace: https://hackerworkspace.com/article/nato-locked-shields-2026-rl-joins-live-fire-cyber-event-rl-blog
-
NATO Locked Shields 2026: RL Joins Live-Fire Cyber Event | RL Blog
https://www.reversinglabs.com/blog/locked-shields-2026
Read on HackerWorkspace: https://hackerworkspace.com/article/nato-locked-shields-2026-rl-joins-live-fire-cyber-event-rl-blog
-
Mustang Panda Linked to FDMTP Backdoor in Asia-Pacific Espionage
https://www.infosecurity-magazine.com/news/mustang-panda-fdmtp-backdoor-apj/
Read on HackerWorkspace: https://hackerworkspace.com/article/mustang-panda-linked-to-fdmtp-backdoor-in-asia-pacific-espionage
-
Mustang Panda Linked to FDMTP Backdoor in Asia-Pacific Espionage
https://www.infosecurity-magazine.com/news/mustang-panda-fdmtp-backdoor-apj/
Read on HackerWorkspace: https://hackerworkspace.com/article/mustang-panda-linked-to-fdmtp-backdoor-in-asia-pacific-espionage
-
Mustang Panda Linked to FDMTP Backdoor in Asia-Pacific Espionage
https://www.infosecurity-magazine.com/news/mustang-panda-fdmtp-backdoor-apj/
Read on HackerWorkspace: https://hackerworkspace.com/article/mustang-panda-linked-to-fdmtp-backdoor-in-asia-pacific-espionage
-
Mustang Panda Linked to FDMTP Backdoor in Asia-Pacific Espionage
https://www.infosecurity-magazine.com/news/mustang-panda-fdmtp-backdoor-apj/
Read on HackerWorkspace: https://hackerworkspace.com/article/mustang-panda-linked-to-fdmtp-backdoor-in-asia-pacific-espionage
-
Say what you want about internal corporate Copilot. Having to write several incident reports in one day, Copilot is doing the heavy lifting of editing the mess of text I am dumping into the report template.
Do I like what it has produced? No, it is not in my style of writing.
Will I make my deadlines? Yep
-
Say what you want about internal corporate Copilot. Having to write several incident reports in one day, Copilot is doing the heavy lifting of editing the mess of text I am dumping into the report template.
Do I like what it has produced? No, it is not in my style of writing.
Will I make my deadlines? Yep
-
Say what you want about internal corporate Copilot. Having to write several incident reports in one day, Copilot is doing the heavy lifting of editing the mess of text I am dumping into the report template.
Do I like what it has produced? No, it is not in my style of writing.
Will I make my deadlines? Yep
-
Say what you want about internal corporate Copilot. Having to write several incident reports in one day, Copilot is doing the heavy lifting of editing the mess of text I am dumping into the report template.
Do I like what it has produced? No, it is not in my style of writing.
Will I make my deadlines? Yep
-
Say what you want about internal corporate Copilot. Having to write several incident reports in one day, Copilot is doing the heavy lifting of editing the mess of text I am dumping into the report template.
Do I like what it has produced? No, it is not in my style of writing.
Will I make my deadlines? Yep
-
Critical cybersecurity incidents continued to grow during 2025, especially in the industrial and food sectors.
Recent reports show the most affected industries were:
• IT → 23%
• Government → 18%
• Industrial → 18%Protecting infrastructure today requires continuous visibility, rapid detection, and expert response capabilities.
#cybersecurity #infosec #industrialsecurity #otsecurity #soc #mdr #incidentresponse
https://www.relianoid.com/blog/critical-cybersecurity-incidents-in-the-industrial-sector/
-
RE: https://infosec.exchange/@amvinfe/116567370386921171
I realize my view on whether it is ever okay to pay #ransom in a #hackandleak situation is contentious. Great thanks to @amvinfe for asking me to articulate my views. #incidentresponse #mitigation #responsibility #ethics
-
RE: https://infosec.exchange/@amvinfe/116567370386921171
I realize my view on whether it is ever okay to pay #ransom in a #hackandleak situation is contentious. Great thanks to @amvinfe for asking me to articulate my views. #incidentresponse #mitigation #responsibility #ethics
-
RE: https://infosec.exchange/@amvinfe/116567370386921171
I realize my view on whether it is ever okay to pay #ransom in a #hackandleak situation is contentious. Great thanks to @amvinfe for asking me to articulate my views. #incidentresponse #mitigation #responsibility #ethics
-
RE: https://infosec.exchange/@amvinfe/116567370386921171
I realize my view on whether it is ever okay to pay #ransom in a #hackandleak situation is contentious. Great thanks to @amvinfe for asking me to articulate my views. #incidentresponse #mitigation #responsibility #ethics
-
RE: https://infosec.exchange/@amvinfe/116567370386921171
I realize my view on whether it is ever okay to pay #ransom in a #hackandleak situation is contentious. Great thanks to @amvinfe for asking me to articulate my views. #incidentresponse #mitigation #responsibility #ethics
-
The Augmented Analyst: How AI Is Changing the Speed of Security Operations
-
The Augmented Analyst: How AI Is Changing the Speed of Security Operations
-
The Augmented Analyst: How AI Is Changing the Speed of Security Operations
-
The Augmented Analyst: How AI Is Changing the Speed of Security Operations
-
This affects so many companies..
-
This affects so many companies..
-
This affects so many companies..
-
This affects so many companies..
-
Canvas Maker Instructure Reaches Agreement With Cybercriminals
https://www.infosecurity-magazine.com/news/canvas-cybercriminals-agreement/
Read on HackerWorkspace: https://hackerworkspace.com/article/canvas-maker-instructure-reaches-agreement-with-cybercriminals
-
Canvas Maker Instructure Reaches Agreement With Cybercriminals
https://www.infosecurity-magazine.com/news/canvas-cybercriminals-agreement/
Read on HackerWorkspace: https://hackerworkspace.com/article/canvas-maker-instructure-reaches-agreement-with-cybercriminals
-
Canvas Maker Instructure Reaches Agreement With Cybercriminals
https://www.infosecurity-magazine.com/news/canvas-cybercriminals-agreement/
Read on HackerWorkspace: https://hackerworkspace.com/article/canvas-maker-instructure-reaches-agreement-with-cybercriminals
-
Canvas Maker Instructure Reaches Agreement With Cybercriminals
https://www.infosecurity-magazine.com/news/canvas-cybercriminals-agreement/
Read on HackerWorkspace: https://hackerworkspace.com/article/canvas-maker-instructure-reaches-agreement-with-cybercriminals
-
Skoda-Shop gehackt: Das eigentliche Problem ist nicht die Schwachstelle – sondern die fehlende Nachvollziehbarkeit! Skoda muss einen Sicherheitsvorfall im eigenen Online-Shop einräumen: Über eine Schwachstelle in der eingesetzten Shop-Software konnten Unbefugte auf Kundendaten zugreifen. Betroffen sein könnten unter anderem Namen, Adressen, Kontaktdaten, Bestellinformationen und Zugangsdaten in gehashter Form. #CyberSecurity #IncidentResponse #Datenschutz #ITSecurity #Skoda
-
Skoda-Shop gehackt: Das eigentliche Problem ist nicht die Schwachstelle – sondern die fehlende Nachvollziehbarkeit! Skoda muss einen Sicherheitsvorfall im eigenen Online-Shop einräumen: Über eine Schwachstelle in der eingesetzten Shop-Software konnten Unbefugte auf Kundendaten zugreifen. Betroffen sein könnten unter anderem Namen, Adressen, Kontaktdaten, Bestellinformationen und Zugangsdaten in gehashter Form. #CyberSecurity #IncidentResponse #Datenschutz #ITSecurity #Skoda
-
Skoda-Shop gehackt: Das eigentliche Problem ist nicht die Schwachstelle – sondern die fehlende Nachvollziehbarkeit! Skoda muss einen Sicherheitsvorfall im eigenen Online-Shop einräumen: Über eine Schwachstelle in der eingesetzten Shop-Software konnten Unbefugte auf Kundendaten zugreifen. Betroffen sein könnten unter anderem Namen, Adressen, Kontaktdaten, Bestellinformationen und Zugangsdaten in gehashter Form. #CyberSecurity #IncidentResponse #Datenschutz #ITSecurity #Skoda
-
Skoda-Shop gehackt: Das eigentliche Problem ist nicht die Schwachstelle – sondern die fehlende Nachvollziehbarkeit! Skoda muss einen Sicherheitsvorfall im eigenen Online-Shop einräumen: Über eine Schwachstelle in der eingesetzten Shop-Software konnten Unbefugte auf Kundendaten zugreifen. Betroffen sein könnten unter anderem Namen, Adressen, Kontaktdaten, Bestellinformationen und Zugangsdaten in gehashter Form. #CyberSecurity #IncidentResponse #Datenschutz #ITSecurity #Skoda
-
Skoda-Shop gehackt: Das eigentliche Problem ist nicht die Schwachstelle – sondern die fehlende Nachvollziehbarkeit! Skoda muss einen Sicherheitsvorfall im eigenen Online-Shop einräumen: Über eine Schwachstelle in der eingesetzten Shop-Software konnten Unbefugte auf Kundendaten zugreifen. Betroffen sein könnten unter anderem Namen, Adressen, Kontaktdaten, Bestellinformationen und Zugangsdaten in gehashter Form. #CyberSecurity #IncidentResponse #Datenschutz #ITSecurity #Skoda
-
[DxBP] Part 1 - Technical Detection Engineering Best Practices
https://kqlquery.com/posts/dxbp-part1/
Read on HackerWorkspace: https://hackerworkspace.com/article/dxbp-part-1-technical-detection-engineering-best-practices