Threat Level: green Handler on Duty: Jan Kopriva

SANS ISC: Diaries by Keyword Diaries by Keyword

Participate: Learn more about our honeypot network
https://isc.sans.edu/honeypot.html

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

DATA BREACH RESPONSE PLAN

2014-12-01Guy BruneauDo you have a Data Breach Response Plan?

DATA

2020-07-04/a>Russ McReeHappy FouRth of July from the Internet Storm Center
2020-03-14/a>Didier StevensPhishing PDF With Incremental Updates.
2020-02-28/a>Xavier MertensShow me Your Clipboard Data!
2019-05-19/a>Guy BruneauIs Metadata Only Approach, Good Enough for Network Traffic Analysis?
2018-07-04/a>Didier StevensXPS Metadata
2018-06-16/a>Russ McReeAnomaly Detection & Threat Hunting with Anomalize
2017-12-16/a>Xavier MertensMicrosoft Office VBA Macro Obfuscation via Metadata
2017-08-07/a>Xavier MertensIncrease of phpMyAdmin scans
2017-05-28/a>Guy BruneauCyberChef a Must Have Tool in your Tool bag!
2017-02-01/a>Xavier MertensQuick Analysis of Data Left Available by Attackers
2017-01-06/a>John BambenekGreat Misadventures of Security Vendors: Absurd Sandboxing Edition
2016-09-22/a>Rick WannerYAHDD! (Yet another HUGE data Breach!)
2016-08-31/a>Deborah HaleDropbox Breach
2016-08-19/a>Xavier MertensData Classification For the Masses
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-20/a>Xavier MertensUsing Your Password Manager to Monitor Data Leaks
2016-02-22/a>Xavier MertensReducing False Positives with Open Data Sources
2016-01-30/a>Xavier MertensAll CVE Details at Your Fingertips
2015-09-01/a>Daniel WesemannEncryption of "data at rest" in servers
2015-07-31/a>Russ McReeTech tip: Invoke a system command in R
2015-07-31/a>Russ McReeTech tip follow-up: Using the data Invoked with R's system command
2015-05-23/a>Guy BruneauBusiness Value in "Big Data"
2015-03-21/a>Russell EubanksHave you seen my personal information? It has been lost. Again.
2014-12-01/a>Guy BruneauDo you have a Data Breach Response Plan?
2014-02-04/a>Johannes UllrichOdd ICMP Echo Request Payload
2013-10-16/a>Adrien de BeaupreAccess denied and blockliss
2013-07-06/a>Guy BruneauIs Metadata the Magic in Modern Network Security?
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-11-30/a>Daniel WesemannSnipping Leaks
2012-11-22/a>Kevin ListonGreek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks
2012-01-16/a>Kevin ShorttZappos Breached
2011-04-20/a>Daniel WesemannData Breach Investigations Report published by Verizon
2011-01-12/a>Richard PorterHow Many Loyalty Cards do you Carry?
2011-01-12/a>Richard PorterYet Another Data Broker? AOL Lifestream.
2010-09-26/a>Daniel WesemannEgosurfing, the corporate way
2010-07-29/a>Rob VandenBrinkThe 2010 Verizon Data Breach Report is Out
2010-04-27/a>Rob VandenBrinkLayer 2 Security - L2TPv3 for Disaster Recovery Sites
2010-04-22/a>John BambenekData Redaction: You're Doing it Wrong
2010-02-10/a>Marcus SachsDatacenters and Directory Traversals
2009-10-19/a>Daniel WesemannBacked up, lately ?
2009-09-07/a>Lorna HutchesonEncrypting Data
2009-07-28/a>Adrien de BeaupreYYAMCCBA
2009-04-24/a>John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15/a>Marcus Sachs2009 Data Breach Investigation Report
2009-03-02/a>Swa FrantzenObama's leaked chopper blueprints: anything we can learn?
2009-01-30/a>Mark HofmanWe all "Love" USB drives
2008-12-17/a>donald smithTeam CYMRU's Malware Hash Registry
2008-08-25/a>John BambenekThoughts on the Best Western Compromise

BREACH

2016-09-22/a>Rick WannerYAHDD! (Yet another HUGE data Breach!)
2016-08-31/a>Deborah HaleDropbox Breach
2015-04-08/a>Tom WebbIs it a breach or not?
2015-03-21/a>Russell EubanksHave you seen my personal information? It has been lost. Again.
2014-12-01/a>Guy BruneauDo you have a Data Breach Response Plan?
2014-08-23/a>Guy BruneauNSS Labs Cyber Resilience Report
2014-06-13/a>Richard PorterA welcomed response, PF Chang's
2013-12-21/a>Daniel WesemannAdobe phishing underway
2013-10-05/a>Richard PorterAdobe Breach Notification, Notifications?
2013-10-04/a>Johannes UllrichThe Adobe Breach FAQ
2013-07-22/a>Johannes UllrichApple Developer Site Breach
2013-07-21/a>Guy BruneauUbuntu Forums Security Breach
2013-02-22/a>Johannes UllrichZendesk breach affects Tumblr/Pinterest/Twitter
2013-01-04/a>Daniel WesemannBlue for Reset?
2012-11-22/a>Kevin ListonGreek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks
2012-07-16/a>Jim ClausingAn analysis of the Yahoo! passwords
2012-06-06/a>Jim ClausingPotential leak of 6.5+ million LinkedIn password hashes
2012-01-16/a>Kevin ShorttZappos Breached
2011-09-15/a>Swa FrantzenDigiNotar looses their accreditation for qualified certificates
2011-09-07/a>Lenny ZeltserGlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach
2011-09-06/a>Swa FrantzenDigiNotar audit - intermediate report available
2011-09-01/a>Swa FrantzenDigiNotar breach - the story so far
2011-06-21/a>Chris MohanStartSSL, a web authentication authority, suspend services after a security breach
2011-05-30/a>Johannes UllrichLockheed Martin and RSA Tokens
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-04-28/a>Chris MohanDSL Reports advise 9,000 accounts were compromised
2011-04-20/a>Daniel WesemannData Breach Investigations Report published by Verizon
2011-04-04/a>Mark HofmanWhen your service provider has a breach
2011-03-25/a>Rob VandenBrinkThe Recent RSA Breach - Imagining the Worst Case, And Why it Isn't Time to Panic (Yet)
2010-12-28/a>John BambenekMozilla Notifies of Relatively Minor Security Breach
2010-07-29/a>Rob VandenBrinkThe 2010 Verizon Data Breach Report is Out
2010-06-10/a>Deborah HaleiPad Owners Exposed
2010-04-13/a>Johannes UllrichApache.org Bugtracker Breach
2009-07-28/a>Adrien de BeaupreYYAMCCBA
2009-07-23/a>John BambenekMissouri Passes Breach Notification Law: Gap Still Exists for Banking Account Information
2009-06-06/a>Patrick NolanARRA/HIPAA Breach Reporting Dates Approaching
2009-05-09/a>Patrick NolanUnusable, Unreadable, or Indecipherable? No Breach reporting required
2009-05-05/a>Bojan ZdrnjaHealth database breached
2009-04-24/a>John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15/a>Marcus Sachs2009 Data Breach Investigation Report
2009-02-08/a>Mari NicholsAre we becoming desensitized to data breaches?
2009-01-30/a>Mark HofmanWe all "Love" USB drives

RESPONSE

2020-09-17/a>Xavier MertensSuspicious Endpoint Containment with OSSEC
2020-02-16/a>Guy BruneauSOAR or not to SOAR?
2019-08-25/a>Guy BruneauAre there any Advantages of Buying Cyber Security Insurance?
2018-12-19/a>Xavier MertensUsing OSSEC Active-Response as a DFIR Framework
2017-12-05/a>Tom WebbIR using the Hive Project.
2017-09-17/a>Guy BruneaurockNSM as a Incident Response Package
2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2016-08-24/a>Tom WebbStay on Track During IR
2016-02-11/a>Tom WebbTomcat IR with XOR.DDoS
2015-03-07/a>Guy BruneauShould it be Mandatory to have an Independent Security Audit after a Breach?
2014-12-24/a>Rick WannerIncident Response at Sony
2014-12-01/a>Guy BruneauDo you have a Data Breach Response Plan?
2014-04-04/a>Rob VandenBrinkDealing with Disaster - A Short Malware Incident Response
2014-01-23/a>Chris MohanLearning from the breaches that happens to others Part 2
2014-01-22/a>Chris MohanLearning from the breaches that happens to others
2013-10-05/a>Richard PorterAdobe Breach Notification, Notifications?
2013-03-18/a>Kevin ShorttCisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4
2013-03-02/a>Scott FendleyEvernote Security Issue
2012-11-16/a>Manuel Humberto Santander PelaezInformation Security Incidents are now a concern for colombian government
2012-04-23/a>Russ McReeEmergency Operations Centers & Security Incident Management: A Correlation
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-10-27/a>Mark BaggettCritical Control 18: Incident Response Capabilities
2011-07-25/a>Chris MohanMonday morning incident handler practice
2011-07-09/a>Chris MohanSafer Windows Incident Response
2011-04-25/a>Rob VandenBrinkSony PlayStation Network Outage - Day 5
2011-03-25/a>Kevin ListonAPT Tabletop Exercise
2010-10-18/a>Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis
2010-09-04/a>Kevin ListonInvestigating Malicious Website Reports
2010-03-25/a>Kevin ListonResponding to "Copyright Lawsuit filed against you"
2010-03-21/a>Chris CarboniResponding To The Unexpected
2010-01-22/a>Mari NicholsPass-down for a Successful Incident Response
2009-06-11/a>Rick WannerMIR-ROR Motile Incident Response - Respond Objectively Remediate
2009-05-01/a>Adrien de BeaupreIncident Management
2009-04-16/a>Adrien de BeaupreIncident Response vs. Incident Handling

PLAN

2017-12-14/a>Russ McReeSecurity Planner: Improve your online safety
2014-12-01/a>Guy BruneauDo you have a Data Breach Response Plan?
2013-04-17/a>John BambenekUPDATEDx1: Boston-Related Malware Campaigns Have Begun - Now with Waco Plant Explosion Fun