engagements
-
What is this blog post about? This blog post is about why incident responder artifacts not only play a role on the defensive but also offensive side of cyber security. We are gonna look at some of the usually collected evidences and how they can be valuable to us as red team operators. We will…
-
It’s no secret that the cyber threat landscape is growing with each passing day. Companies of all sizes are increasingly at risk of data breaches, ransomware, social engineering, and many other types of malicious, sophisticated cyber activity.
-
I’m curious to know how the IR consultant approaches the ransomware incident(say when some of the servers of a client got ransomed). Without breaking NDA if you could walk through an incident that you worked on in the past for a client. After scoping, what was your approach and initial recommendation to client ( e.g.…
-
James CondonDirector of Research, Lacework Labs The year is drawing to a close, but we still have a few conferences left! A lot happened this year in Cloud Security. We saw many breaches from misconfigurations to overly permissive policies. We also saw a large focus on securing Cloud Native Technologies for those operating in the…
-
Data theft extortion rises, while healthcare is still most-targeted vertical in Talos IR engagements
·
Cisco Talos Incident Response (Talos IR) responded to a growing number of data theft extortion incidents that did not involve encrypting files or deploying ransomware, a 25 percent increase since last quarter and the most-observed threat in the second quarter of 2023.