Topic: incident containment

  • 3 Must-Haves to Survive a Cyberattack

    3 Must-Haves to Survive a Cyberattack

    Swift and effective response to a cyberattack depends on having clarity, control, and a reliable lifeline already in place. Clarity involves real-time detection and understanding of the incident's scope, enabling informed decisions to isolate and manage threats. Control means the ability to conta...

    Read More »
  • Plex Urges Password Reset Following New Data Breach

    Plex Urges Password Reset Following New Data Breach

    Plex is advising all users to reset their passwords immediately after an unauthorized party accessed a restricted database, compromising email addresses, usernames, and securely hashed passwords. The company recommends users change their passwords via a provided link and sign out of all connected...

    Read More »
  • Salesloft & Drift Breach: How Attackers Infiltrated Systems

    Salesloft & Drift Breach: How Attackers Infiltrated Systems

    A cybersecurity breach at Salesloft began with unauthorized access to its GitHub account, leading to data theft from customer Salesforce instances via stolen OAuth credentials from the Drift platform. The attack, attributed to threat group UNC6395, targeted sensitive credentials like AWS keys and...

    Read More »
  • Salesloft Links Drift Data Theft to March GitHub Hack

    Salesloft Links Drift Data Theft to March GitHub Hack

    A data breach at Salesloft originated from a March intrusion into its GitHub account, allowing attackers to steal authentication tokens and target major tech clients over several months. The attackers used stolen OAuth tokens to infiltrate companies like Google and Cloudflare via Salesloft's AWS ...

    Read More »
  • Plex Data Breach: Users Urged to Change Passwords, Upgrade Servers

    Plex Data Breach: Users Urged to Change Passwords, Upgrade Servers

    Plex has confirmed a security breach involving unauthorized access to customer emails, usernames, and securely hashed passwords, but no payment information was compromised. The company advises all users to reset their passwords, enable two-factor authentication, and log out from all devices to en...

    Read More »