What's Happening In Security #11

What's Happening In Security #11

- 3 mins

Navigating the ever-evolving landscape of cybersecurity can feel like a whirlwind—new threats, innovations, and incidents that are constantly reshaping the digital world. This week’s post breaks down some of the developments and that took place last week.

Rapid-fire:

A family taking pictures in a garden
Summer Happiness

AT&T Data Breach Affects Most Customers

Another company suffers at the hands of the Snowflake related breaches.

The attackers bought stolen Snowflake credentials to gain access to data like call records and “cell cite identification numbers” which can be used to triangulate the location where a call was made.

AT&T reportedly paid a ransom of $370,000 to have the hackers delete the stolen data. Amusingly, as proof of deletion the hacker sent a video of them deleting their copy.

A lack of 2FA on user accounts seemed to be the root cause of these breaches. In hopes of limiting further breaches, Snowflake has allowed admins to force MFA for their users.

Some interesting buildings
Beautiful Beige

Security Fundamentals

As I’ve begun my journey in the cybersecurity industry I have come across certain core processes that are common practice. Here’s an important one, the Incident Response Process.

The Incident Response Process in 6 steps:

  1. Prepare: The organization needs to define roles and responsibilities so everyone is ready in case of an incident
  2. Identification: Detecting threats is the first step towards remediation. There are many tools such as security information and event management (SIEM) solutions.
  3. Containment: Isolate the threat and stop it from spreading. In the short term this means quarantining the malicious processes or even the infected machine.
  4. Eradication: After assessing the attack surface (we learnt about attack surfaces in the 8th edition) find the root cause. Harden the system as needed which could include patching bugs or removing backdoors.
  5. Recovery: Restore your systems to a desired state and resume normal operations. To achieve this you may restore from back ups and reconfigure compromised accounts. At this point it is important to test your systems to ensure everything is as it should be.
  6. Lessons Learned: How did we get to this point? What went wrong? Did we react well? Share lessons learned and figure out how you can improve for next time.
Siddhantha Bose

Siddhantha Bose

Living, learning, and meeting people along the way

comments powered by Disqus