en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

250
active users

#incidentresponse

4 posts3 participants2 posts today

🔥 Launching today: Discernible Drills - our new weekly security/privacy communication training delivered via Slack!

Based on 20 years of experience in, this new service helps security and privacy professionals practice communication skills through weekly 60-minute drills.

- Covers 12 different incident types
- Text-based with multimedia elements for auditory learners
- No PO required - individual subscriptions
- Currently runs Wednesdays 12-1pm ET with more times coming soon
- Two tiers: $50/mo or $100/mo

Security incidents are more than breaches, and communication is more than media statements. Practice makes perfect.

Learn more at discernibleinc.com/blog/introd

Discernible IncIntroducing Discernible Drills: The Power of Persistent Practice — Discernible IncJoin a new incident response communication drill with industry peers every week!

@hacks4pancakes (@dragosinc) will join us on March 19 for our Foundations of DFIR panel!

While that's a few weeks away, you can check out Lesley's blog post on The Shifting Landscape of OT Incident Response which illustrates the importance of specialized incident response and digital forensics in maintaining the security and integrity of OT systems.

Find it here: dragos.com/blog/the-shifting-l

If you want to catch Lesley along with panelists @danonsecurity, David Bianco, and Sarah Sabotka for unique insights on bolstering your DFIR foundations, save your spot here: domaintools.com/webinar-gettin

🇳🇿 I've had quite a few outrageous responses to my alerts, this is another one of those, sent by teammateapp.com CEO.

After my initial alert and follow up email, I get a reply lying about the severity of the exposure and telling me to stop harassing the company.

This CEO also didn't know what Proton is and thought I work for them and threatened to report me to them in case I didn't stop. :blobshrug:

Read about it here: jltee.substack.com/p/new-zeala

The Hub of Stupi.. *misconfigs · New Zealand Company’s ‘Impossible-to-Hack’ Security Turns Out to Be No Security at AllBy JayeLTee

Some folks may get confused by PowerSchool saying that if they have medical records on students, they may have to notify under HIPAA.

Most student medical/health records are not covered under HIPAA. They are covered under FERPA.

If the district is billing the student's health insurance for services like speech therapy, physical therapy, or occupational therapy, then there's a HIPAA issue. Or if the school has arrangements with an actual clinic that is providing medical/health services to students. But most things like doctor's absence notes or even allergy action plans or school medication orders are not under HIPAA.

If the district has a health plan for employees that it administers, there's also a HIPAA issue there.

#PowerSchool #databreach #incidentresponse #HIPAA #FERPA

@douglevin @funnymonkey

Wondering if anyone else has seen this behavior.

We received an alert from MS Defender for Cloud that a suspicious IP had downloaded from a storage blob using a SAS token. It turned out that someone was misusing the SAS token feature and had sent the URL via email.

Since then, we've determined that every URL sent via email (O365) is being downloaded immediately by... someone. We brought in someone for IR but they haven't seen anything similar and we can't find a cause. We even set up two secops mailboxes (which are supposed to bypass all MS security) and sending an email between them still triggers the downloads.

The source IPs so far have all been in the US, and Spur tags most with "Oculus Proxy" and most ASNs are "Constant" or "HostRoyale". User agents match Chrome 125 or 131.

The only thing I've found online is complaints on Reddit about this causing a 100% click rate in KnowBe4. No real resolution there though.

We're thinking it's something automated/enterprise, but I want to be sure. Has anyone seen anything similar? TIA.

Edit: forgot one important detail. This only happens on outbound messages. So corp to gmail triggers the download, gmail to corp does not.

Bolton Walk-In Clinic in Ontario: lock down your backup already!

DataBreaches hates reporting on an incident when the entity has not yet secured misconfigured storage, but after four months of futile efforts to get a Canadian clinic to respond to responsible disclosures, maybe publication will help get them off the dime.

Do any personal injury lawyers in Ontario, Canada, or folks in the Information and Privacy Commissioner of Ontario follow me? Maybe they can get something done.

Read more at:
databreaches.net/2024/12/03/bo

#misconfiguration #error #healthsec #dataleak #databreach #exposure #incidentresponse
#DontCallMeHoney

@brett

The University of Maribor (UM), 2nd largest Slovenian university, has been compromised on Wednesday 8pm CEST.

Supposedly all files are locked by ransomware including the daily backups that were supposedly on the same or a connected server and not offline or separate enough.

The official site, school emails, student systems where they get and submit tasks, and more are all down. This affects all of the 17 faculties in Maribor. MS Teams works with the current session but you cannot log in if you get logged out. School Wi-Fi eduroam is also down.

School work currently is continuing normally for now via other communication channels.

They are in contact with SI-CERT and police is also involved.

Official site
um.si

Slovenian news sources
vecer.com/maribor/aktualno/uni
delo.si/novice/slovenija/kiber
24ur.com/novice/slovenija/kibe

@campuscodi

Mini Blue Team Diaries Story:

It was a springtime Saturday many years back, and all was right in the world. I was mowing the yard, which at the time, meant a very small patch of grass that could be mowed by an electric mower plugged in with a tiny extension cord. All of a sudden, the perfect spring time in suburbia came to a screeching halt. The on-call phone was going off.

At the end of the line, an engineer from our hosting ops department, who was taking advantage of a maintenance window to do some patching on VMWare ESX hosts. He was actually updating the hypervisors in person, at the datacenter, so he could be quick to respond if something went sideways.

Alas, something had gone sideways. The ESX machines, appeared to have all been compromised! The engineer had called in a panic.

Upon reboot of the machine, an ominous message never before seen by the engineer just after the POST screen.

"All your servers are belong to us!" read the message, in an apparent nod to Zero Wing.

Clearly this was the calling card of some malicious actor who had rooted the hypervisor and was now deep enough into the system that they could own our entire stack. So he'd called SecOps for our take.

I had two thoughts. 1) Run the compromise checklist, and see if there was anything strange going on, and 2) ring the engineer who'd worked there the longest to see if they'd ever seen this message before.

1) was well underway, and found no evidence of a breach. 2) took a bit longer to get ahold of the right person, but when we did, we had our answer.

"Oh, that was just Don who used to work here. He put that message on all the servers he set up as a joke. He's a great guy."

And just like that, the incident was over, and I returned to the yard work.

Incidentally - I made a very big deal out of making sure that the engineer who'd rung the on-call for that knew that he'd done 100% the right thing. What I didn't want to happen was, although this time turned out to be nothing, was for him to be worried about raising the alarm again in future, and missing something real.

Want more, slightly less mini stories like this? Check out: infosecdiaries.com/

Infosec DiariesInfosec DiariesLearn Pen Testing, Blue Teaming and Digital Forensics

Some security tools provide "isolated browsers" for analysts to interact with malicious web sites. For example Proofpoint Isolation Browser is part of Proofpoint TAP.

Are there any highly usable isolation browsers available as a standalone service?

I have a few sandboxes that allow me to run an interactive session, but usability is lacking.

I've built my own disposable EC2 linux instance accessible via VNC-over-SSH, but I don't want to maintain it. I want to buy a service.

Does what I want exist? I want it isolated, disposable, interactive, and NOT a pain to use. 😉