April 24, 2020

Playbook for Maze Ransomware

You need to quickly contain the problem considering which part of kill chain your adversary is in. You to need contain and neutralize the impact of the incident by possibly shutting down specific services/servers/segments.

April 12, 2020

Playbooks for video conferencing app attacks

With the rush for Working From Home, organizations are overwhelmed with employees using video conferencing technologies, from Slack, Skype and Discord to GoToMeeting, Zoom and Webex. What are your security teams supposed to do when incidents like Fairfax school strike? Do they have the basic steps and planned approach to handle the events?. In this page we cover the top tips to analyze and mitigate/contain/remediate […]

April 6, 2020

Playbook for Phishing

If short on time directly jump to the playbooks section. Summary Any attempt to compromise a system and/or steal information by tricking a user into responding to a malicious message. The most common phishing attacks involve emails armed with malware hidden in attachments or links to infected websites, although phishing can be conducted via other methods such as voicemail, text messages, and social media, too. […]

November 23, 2024

Innovative Customer Engagement for a cyber Incident Response, Crisis and Resiliency company.

PREPAREDNESS to handle an cyber attack if it happens NOW is key for every organisation. This is foundational to every Enterprise today. The engagements have to be FUN while learning. Humor can add in a lot of value. Below are a few strategies which we found very effective over the last 7 years. Customer engagement requires active participation from customers. FlexibleIR creates the channels and […]

November 14, 2024

Playbook – Incident response for AI&ML Threats

Imagine a world where machines can diagnose diseases, write captivating novels, and even hold conversations that feel human. That’s the promise of Artificial Intelligence (AI) and Machine Learning (ML). AI refers to the broad field of computer science dedicated to creating intelligent machines, while Machine Learning is a specific technique where algorithms learn from data to improve their performance on a specific task. These technologies […]

November 14, 2024

Microsoft Azure Incident Response Use cases and Playbooks – Sentinel

A large number of Enterprises today run on Microsoft technologies, Azure cloud platform and security logging platforms as Sentinel. Responding diligently to alerts triggered due to abnormality and intrusion detections is key to avoid major crisis like Ransomware attacks and Data exfiltrations followed by publish on dark web. The below use cases are critical to identifying any of the early, middle, and end-stage operations of […]

November 7, 2024

Ransomware Recovery –  Isolated Recovery Environment (IRE)

This is required in worst-case scenarios of Ransomware attacks where everything including DR and Backups has failed. This is a critical part of your recovery strategy. Also known as a cyber recovery “clean room”. Understanding normal Disaster Recovery vs. Ransomware Disaster Recovery is key

October 22, 2024

AI-Incidents – Crisis management

FlexibleIR helps enterprises prepare for AI cyber incidents and crisis. Here we track the latest AI incidents. What happened and how they happened? We provide you with how you can respond. Below you can find a surated list of websites where we can find AI incidents database. Please free to mail us at contact@flexibleir.com A sample Playbook shown below to handle an incident of training […]

September 10, 2024

Incident Response – Need for continuous fine tuned detection and logging

Most major cyber attacks have a lot of early warning signals coming in, so early detection helps a lot and gives time for incident response. Logs for Incident Response https://www.first.org/resources/papers/conference2008/chuvakin-anton-slides.pdf Best practises for Event Logging Benefits of continuous and aggressive monitoring of your Event Logging:Enhanced Visibility: Gain a deeper understanding of network activity and potential threats.Faster Incident Response: Early Detection and quick response to security […]