2 min
Incident Response
4 Key Lessons from the Citycomp Data Breach
On April 30, 2019 Motherboard reported on a combined data breach and extortion attempt against Citycomp, a network and internet infrastructure firm based in Germany.
3 min
Breach Response News
PHP Extension and Application Repository (PEAR) Compromise: What You Need to Know
According to the PHP Extension and Application Repository (PEAR), a security breach had been found on the `pear.php.net` web server.
4 min
Research
How Your Organization Can Respond After News of a Major Security Breach
When data breaches occur, there are proactive actions organizations can take to double-check their current-state security posture, practices, and protocols.
2 min
Application Security
The British Airways Breach: PCI is Not Enough
Magecart's techniques are sophisticated and worth understanding in detail, especially because they point out a major gap that occurs even with perfect PCI compliance.
4 min
Breach Response News
The Cloudflare (Cloudbleed) Proxy Service Vulnerability Explained
TL;DR
This week a vulnerability was disclosed, which could result in sensitive data
being leaked from websites using Cloudflare's proxy services. The vulnerability
- referred to as "Cloudbleed" - does not affect Rapid7's solutions/services.
This is a serious security issue, but it's not a catastrophe. Out of an
abundance of caution, we recommend you reset your passwords, starting with your
most important accounts (especially admin accounts). A reasonable dose of
skepticism and prudence will go
6 min
Breach Response News
NCSAM: You Should Use a Password Manager
October is National Cyber Security Awareness month and Rapid7 is taking this
time to celebrate security research. This year, NCSAM coincides with new legal
protections for security research under the DMCA
[/2016/10/03/cybersecurity-awareness-month-2016-this-ones-for-the-researchers]
and the 30th anniversary of the CFAA - a problematic law that hinders beneficial
security research. Throughout the month, we will be sharing content that
enhances understanding of what independent security research
3 min
Breach Response News
Changing Threat Landscape Evolves IDR
This is part 2 of a 2-part blog series on how Incident Response is changing.
Here's part one [/2016/03/03/incident-response-the-times-they-are-a-changin].
The changing threat landscape forced an evolution in incident detection &
response (IDR) that encompasses changes in tools, process, and people. While in
2005 we could get away with basic detection and a “pave and re-image” approach,
2016 sees us needing complex detection methodologies enabled by powerful
software and hardware to enable expe
2 min
Breach Response News
Trey's InfoSec SitRep [16 Nov 2015]
First, if you aren't listening to the Risky Business [http://risky.biz/]
podcast, fix that. Patrick Gray [http://twitter.com/riskybusiness] is my go-to
source for infosec news.
In the News:
The insight we get into breaches is sparse, so be armed with these stories.
* JPMorgan's 2014 Hack Tied to Largest Cyber Breach Ever | Bloomberg
[http://www.bloomberg.com/news/articles/2015-11-10/hackers-accused-by-u-s-of-targeting-top-banks-mutual-funds]
* Arrests in JP Morgan, eTrade, Scottrade Hack
6 min
Public Policy
Will the Data Security and Breach Notification Act Protect Consumers?
Last week, the House Energy and Commerce Committee published a discussion draft
of a proposed breach notification bill – the Data Security and Breach
Notification Act of 2015
[http://energycommerce.house.gov/sites/republicans.energycommerce.house.gov/files/analysis/20150312DataSecurityDraft.pdf]
.
I'm a big fan of the principles at play here: as a consumer, I expect that if a
company I have entrusted with my personally identifiable information (PII) has
reason to believe that information has be
2 min
Compliance
Top 3 Takeaways from the "Security in Retail: An Industry at a Crossroads" Webcast
Retail is one of the industries hit hardest by the high-profile mega-breaches of
late, so Jane Man [/author/jane-man], product marketing manager at Rapid7, and
Wim Remes [/author/wim-remes], manager of strategic services at Rapid7 (read
his
intro blog here [/2015/02/13/why-i-joined-rapid7]), came together to discuss the
challenges and future of retail security, and how organizations need to think
about the balance between compliance and focusing on attack prevention and
detection. Read on to le
4 min
Breach Response News
Managing the Impact of the Ebay Breach on You and Your Company
eBay announced [http://blog.ebay.com/ebay-inc-ask-ebay-users-change-passwords/]
earlier today that they were the victims of an attack that compromised the email
address, encrypted password, physical address, phone number and date of birth of
eBay customers. It's important to note that the company indicated that they
have not detected any fraudulent network activity and that credit card
information was not taken.
Breached Credentials #1 Attack Vector and #1 Most Commonly Sold Information on
Bl
1 min
Breach Response News
Cyber security around the world - 7/4/14 - Germany
With so much happening in cyber security around the world lately, we're
highlighting some of the interesting stories each week from across Europe,
Middle East, Africa and Asia Pacific. This week we're in Germany where officials
have found the second mass user account hacking this year…
Germany
Last week German officials confirmed that 18 million email address and
passwords
were hacked
[http://www.dw.de/german-officials-confirm-18-million-emails-and-passwords-stolen/a-17542815]
in a mass dat
2 min
Breach Response News
Cyber security around the world - 11/2/14 - South Korea & Russia
With so much happening in cyber security around the world lately, we're going to
start highlighting some of the interesting stories each week from across Europe,
Middle East, Africa and Asia Pacific. This week, we're in South Korea and
Russia.
South Korea
A couple of weeks ago, South Korea's Financial Services Commission (FSC)
announced that over 20 million credit cards in the country had been compromised
– the country's entire population is only 50 million. As a result, the FSC is
stepping up
2 min
Breach Response News
Shock and awe with gawker.com: How to test if you have been breached
Google Fusion table listing the MD5 hashes of breached
email address from Gawker.com data breach
This weekend, the Web and back-end database of Gawker.com was published on
Pirate Bay. If you had a personal email account registered at Gawker or one of
their associated web sites, such as Engaged, you may have been breached. This
especially becomes a problem if you are using the same password across a number
of sites because we expect that malicious hackers are already trying to use the
same