Posts tagged Breach Response News

2 min Incident Response

4 Key Lessons from the Citycomp Data Breach

On April 30, 2019 Motherboard reported on a combined data breach and extortion attempt against Citycomp, a network and internet infrastructure firm based in Germany.

3 min Breach Response News

PHP Extension and Application Repository (PEAR) Compromise: What You Need to Know

According to the PHP Extension and Application Repository (PEAR), a security breach had been found on the `` web server.

4 min Research

How Your Organization Can Respond After News of a Major Security Breach

When data breaches occur, there are proactive actions organizations can take to double-check their current-state security posture, practices, and protocols.

2 min Application Security

The British Airways Breach: PCI is Not Enough

Magecart's techniques are sophisticated and worth understanding in detail, especially because they point out a major gap that occurs even with perfect PCI compliance.

4 min Breach Response News

The Cloudflare (Cloudbleed) Proxy Service Vulnerability Explained

TL;DR This week a vulnerability was disclosed, which could result in sensitive data being leaked from websites using Cloudflare's proxy services. The vulnerability - referred to as "Cloudbleed" - does not affect Rapid7's solutions/services. This is a serious security issue, but it's not a catastrophe. Out of an abundance of caution, we recommend you reset your passwords, starting with your most important accounts (especially admin accounts). A reasonable dose of skepticism and prudence will go

6 min Breach Response News

NCSAM: You Should Use a Password Manager

October is National Cyber Security Awareness month and Rapid7 is taking this time to celebrate security research. This year, NCSAM coincides with new legal protections for security research under the DMCA [/2016/10/03/cybersecurity-awareness-month-2016-this-ones-for-the-researchers] and the 30th anniversary of the CFAA - a problematic law that hinders beneficial security research. Throughout the month, we will be sharing content that enhances understanding of what independent security research

3 min Breach Response News

Changing Threat Landscape Evolves IDR

This is part 2 of a 2-part blog series on how Incident Response is changing. Here's part one [/2016/03/03/incident-response-the-times-they-are-a-changin]. The changing threat landscape forced an evolution in incident detection & response (IDR) that encompasses changes in tools, process, and people. While in 2005 we could get away with basic detection and a “pave and re-image” approach, 2016 sees us needing complex detection methodologies enabled by powerful software and hardware to enable expe

2 min Breach Response News

Trey's InfoSec SitRep [16 Nov 2015]

First, if you aren't listening to the Risky Business [] podcast, fix that. Patrick Gray [] is my go-to source for infosec news. In the News: The insight we get into breaches is sparse, so be armed with these stories. * JPMorgan's 2014 Hack Tied to Largest Cyber Breach Ever | Bloomberg [] * Arrests in JP Morgan, eTrade, Scottrade Hack

6 min Public Policy

Will the Data Security and Breach Notification Act Protect Consumers?

Last week, the House Energy and Commerce Committee published a discussion draft of a proposed breach notification bill – the Data Security and Breach Notification Act of 2015 [] . I'm a big fan of the principles at play here: as a consumer, I expect that if a company I have entrusted with my personally identifiable information (PII) has reason to believe that information has be

2 min Compliance

Top 3 Takeaways from the "Security in Retail: An Industry at a Crossroads" Webcast

Retail is one of the industries hit hardest by the high-profile mega-breaches of late, so Jane Man [/author/jane-man], product marketing manager at Rapid7, and Wim Remes [/author/wim-remes], manager of strategic services at Rapid7 (read his intro blog here [/2015/02/13/why-i-joined-rapid7]), came together to discuss the challenges and future of retail security, and how organizations need to think about the balance between compliance and focusing on attack prevention and detection. Read on to le

4 min Breach Response News

Managing the Impact of the Ebay Breach on You and Your Company

eBay announced [] earlier today that they were the victims of an attack that compromised the email address, encrypted password, physical address, phone number and date of birth of eBay customers.  It's important to note that the company indicated that they have not detected any fraudulent network activity and that credit card information was not taken. Breached Credentials #1 Attack Vector and #1 Most Commonly Sold Information on Bl

1 min Breach Response News

Cyber security around the world - 7/4/14 - Germany

With so much happening in cyber security around the world lately, we're highlighting some of the interesting stories each week from across Europe, Middle East, Africa and Asia Pacific. This week we're in Germany where officials have found the second mass user account hacking this year… Germany Last week German officials confirmed that 18 million email address and passwords were hacked [] in a mass dat

2 min Breach Response News

Cyber security around the world - 11/2/14 - South Korea & Russia

With so much happening in cyber security around the world lately, we're going to start highlighting some of the interesting stories each week from across Europe, Middle East, Africa and Asia Pacific. This week, we're in South Korea and Russia. South Korea A couple of weeks ago, South Korea's Financial Services Commission (FSC) announced that over 20 million credit cards in the country had been compromised – the country's entire population is only 50 million. As a result, the FSC is stepping up

2 min Breach Response News

Shock and awe with How to test if you have been breached

Google Fusion table listing the MD5 hashes of breached email address from data breach This weekend, the Web and back-end database of was published on Pirate Bay. If you had a personal email account registered at Gawker or one of their associated web sites, such as Engaged, you may have been breached. This especially becomes a problem if you are using the same password across a number of sites because we expect that malicious hackers are already trying to use the same