social.coop is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Fediverse instance for people interested in cooperative and collective projects. If you are interested in joining our community, please apply at https://join.social.coop/registration-form.html.

Administered by:

Server stats:

499
active users

#incidentmanagement

0 posts0 participants0 posts today
LavX News<p>Harnessing Near Misses: A New Frontier in Incident Management</p><p>In the complex landscape of software development and systems reliability, near misses often go unnoticed, yet they hold the key to preventing future incidents. By treating these operational surprises ...</p><p><a href="https://news.lavx.hu/article/harnessing-near-misses-a-new-frontier-in-incident-management" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/harnessin</span><span class="invisible">g-near-misses-a-new-frontier-in-incident-management</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mastodon.cloud/tags/ReliabilityEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReliabilityEngineering</span></a> <a href="https://mastodon.cloud/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a></p>
craque sprung 🏳️‍🌈<p>I am very happy because my DevEx team at work is becoming a lot more official and getting a lot of attention. Which means we may be able to officially make it a real team and the three of us can be 100% on it. So we're creating a new wiki space and top-level jira project and all that.</p><p>But sad, too, because I am moving resilience and incident documentation out of SRE and into our space. Because I am more concerned about seeing the work get done than I am about what team should own it.</p><p>So I'm satisfied that incident program management fell into DevEx. There are also no other SREs but me (out of like 12) that like dealing with incident management anyway.</p><p>My boss said that after what I did with the retro, he is completely comfortable having me oversee the improvement of our incident management.</p><p>Seems like I am becoming adept at fixing fucked on-call rotations!</p><p><a href="https://c.im/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a> <a href="https://c.im/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a></p>
dan slimmon<p>Blog! <a href="https://blog.danslimmon.com/2025/01/29/incident-sev-scales-are-a-waste-of-time/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.danslimmon.com/2025/01/29</span><span class="invisible">/incident-sev-scales-are-a-waste-of-time/</span></a> <a href="https://hachyderm.io/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://hachyderm.io/tags/sre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sre</span></a> <a href="https://hachyderm.io/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://hachyderm.io/tags/webops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webops</span></a> <a href="https://hachyderm.io/tags/itil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itil</span></a> <a href="https://hachyderm.io/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://hachyderm.io/tags/incidentmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentmanagement</span></a></p>
Dissent Doe :cupofcoffee:<p>Lexington School District Four in SC reported that 15,894 residents were affected by the PowerSchool breach. The state reached out to districts on Jan. 8 to tell them what was known at that time. </p><p>The district filed this with the state today: <a href="https://www.consumer.sc.gov/sites/consumer/files/Documents/Security%20Breach%20Notices/2025/LexingtonSchoolDistrictFour.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">consumer.sc.gov/sites/consumer</span><span class="invisible">/files/Documents/Security%20Breach%20Notices/2025/LexingtonSchoolDistrictFour.pdf</span></a></p><p>It appears to be a copy of what they have sent out to residents as a preliminary notification.</p><p>If memory serves, PowerSchool had told districts they would be giving them something for communications by the evening of the 8th. Did they ever do that? Or are the four bullets in the district's notification what <a href="https://infosec.exchange/tags/PowerSchool" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerSchool</span></a> gave districts to use? </p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@douglevin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>douglevin</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@brett" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>brett</span></a></span> <span class="h-card" translate="no"><a href="https://freeradical.zone/@funnymonkey" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>funnymonkey</span></a></span> </p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/incidentmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentmanagement</span></a> <a href="https://infosec.exchange/tags/EduSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EduSec</span></a></p>
AndiMann<p>'The <a href="https://masto.ai/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> tools that could disrupt the entire <a href="https://masto.ai/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://masto.ai/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a> market"</p><p>LOL no! Grafana is great for what it is, but 💯 no to this headline LOL!😂</p><p><a href="https://masto.ai/tags/Grafana" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Grafana</span></a> <a href="https://masto.ai/tags/PagerDuty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PagerDuty</span></a> <a href="https://masto.ai/tags/AIOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIOps</span></a> <a href="https://masto.ai/tags/Observability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Observability</span></a> <a href="https://masto.ai/tags/O11Y" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>O11Y</span></a> <a href="https://masto.ai/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://masto.ai/tags/OSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSS</span></a> <a href="https://masto.ai/tags/VictorOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VictorOps</span></a> # Splunk <a href="https://masto.ai/tags/OnCall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnCall</span></a> <a href="https://masto.ai/tags/XMatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XMatters</span></a> <a href="https://masto.ai/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a> <a href="https://masto.ai/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a></p><p><a href="https://www.zdnet.com/article/the-open-source-tools-that-could-disrupt-the-entire-it-incident-management-market/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zdnet.com/article/the-open-sou</span><span class="invisible">rce-tools-that-could-disrupt-the-entire-it-incident-management-market/</span></a></p>
Dissent Doe :cupofcoffee:<p>From the Better-Late-Than-Never Department:</p><p>"Washington County is preparing to implement a new policy on how to respond to future cybersecurity attacks after a ransomware strike crippled the county government for more than two weeks earlier this year.</p><p>County solicitor Gary Sweat is asking the commissioners to consider approving a “business continuity and disaster contingency” plan that would have a protocol for county workers and its IT department to follow in the event of another cyber emergency."</p><p>As a reminder, they paid $350k ransom to ransomware gang to get decryptor key. </p><p><a href="https://www.observer-reporter.com/news/local-news/2024/dec/18/washington-county-considering-ransomware-policy-after-january-cyberattack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">observer-reporter.com/news/loc</span><span class="invisible">al-news/2024/dec/18/washington-county-considering-ransomware-policy-after-january-cyberattack/</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/govsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>govsec</span></a> <a href="https://infosec.exchange/tags/riskassessment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>riskassessment</span></a> <a href="https://infosec.exchange/tags/disasterplan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disasterplan</span></a> <a href="https://infosec.exchange/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Noble Shift<p>Most holiday movies that involve Santa in some way exist due to poor SOP, Opsec, and Incident &amp; Response Management.</p><p><a href="https://mastodon.social/tags/opsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opsec</span></a> <a href="https://mastodon.social/tags/incidentmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentmanagement</span></a> <a href="https://mastodon.social/tags/responce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>responce</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/santa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>santa</span></a> <a href="https://mastodon.social/tags/holiday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>holiday</span></a> <a href="https://mastodon.social/tags/movies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>movies</span></a> <a href="https://mastodon.social/tags/northpole" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>northpole</span></a> <a href="https://mastodon.social/tags/sop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sop</span></a> <a href="https://mastodon.social/tags/hohoho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hohoho</span></a></p>
Dissent Doe :cupofcoffee:<p>OK, a huge thumbs up to Byte Federal for their breach notification letter. They frankly admit where they screwed up and what happened. I wish more notifications were as clear and straightforward as this one. </p><p><a href="https://databreaches.net/2024/12/17/a-positive-example-of-forthright-breach-disclosure/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">databreaches.net/2024/12/17/a-</span><span class="invisible">positive-example-of-forthright-breach-disclosure/</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/transparency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>transparency</span></a> <a href="https://infosec.exchange/tags/disclosure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disclosure</span></a> <a href="https://infosec.exchange/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a> <a href="https://infosec.exchange/tags/IncidentReporting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentReporting</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
craque sprung 🏳️‍🌈<p>I *cringe* when I see the phrase "stand down" in regard to incident response in software.</p><p>It brings up images of police and military actions and I hate it.</p><p><a href="https://c.im/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a> <a href="https://c.im/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a></p>
Kevin Riggle<p>Discover how Akamai's innovative approach to <a href="https://ioc.exchange/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a>, born out of necessity, influenced the industry standard, in this <a href="https://ioc.exchange/tags/CriticalPointWarStories" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalPointWarStories</span></a> bonus episode with Abhijit Mehta!</p><p><a href="https://youtu.be/NVUY4fvY89A" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/NVUY4fvY89A</span><span class="invisible"></span></a></p>
Phil<p>We had a string of <a href="https://mstdn.io/tags/incidents" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidents</span></a> at work last week. The app would suddenly start slowing to a crawl before tipping over entirely. We were pretty sure there was a problem at a vendor's end but we weren't sure what else was at play. <br>Our key engineer spent a lot time digging into what was going on and by the third day had told our other two engineers and brought them into the conversation too. </p><p>Our customer support reps were freaking out. What should they tell the customers?? <a href="https://mstdn.io/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a></p>
Kevin Riggle<p>"I basically took out production and our production monitoring in one fell swoop." Julia Lunetta shares a cautionary tale about shared filesystems and single points of failure. <a href="https://ioc.exchange/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://ioc.exchange/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a> <a href="https://ioc.exchange/tags/CriticalPOintWarStories" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalPOintWarStories</span></a></p><p><a href="https://youtu.be/2f9ifyVxg1s" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/2f9ifyVxg1s</span><span class="invisible"></span></a></p>
Jason Yip<p>"Incidents are expensive, not only in their impact on customers but also in the burden they place on human operators. Incidents are stressful, and they usually demand human intervention. Effective <a href="https://mastodon.online/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a>, therefore, prioritizes preventive and proactive work over reactive work."</p><p><a href="https://mastodon.online/tags/AnatomyOfAnIncident" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AnatomyOfAnIncident</span></a></p>
Dissent Doe :cupofcoffee:<p>"Italy, exposed database puts dental clinic patients’ data at risk: "<br><a href="https://www.suspectfile.com/italy-exposed-database-puts-dental-clinic-patients-data-at-risk/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">suspectfile.com/italy-exposed-</span><span class="invisible">database-puts-dental-clinic-patients-data-at-risk/</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@amvinfe" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>amvinfe</span></a></span> followed up on some findings by <span class="h-card" translate="no"><a href="https://infosec.exchange/@chum1ng0" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>chum1ng0</span></a></span> and they tried to get two entities to lock down exposed data that includes personal information. </p><p>Despite repeated notifications, the data are still not locked down, it seems. </p><p><a href="https://infosec.exchange/tags/responsibledisclosure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>responsibledisclosure</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/incidentmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentmanagement</span></a> <a href="https://infosec.exchange/tags/GDPR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GDPR</span></a></p>
AndiMann<p>"@PagerDuty Expands <a href="https://masto.ai/tags/GenerativeAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenerativeAI</span></a> Solutions with PagerDuty Advance to Mitigate <a href="https://masto.ai/tags/Risk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Risk</span></a> of Operational <a href="https://masto.ai/tags/Outages" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Outages</span></a>"</p><p>Love this! In <a href="https://masto.ai/tags/Observability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Observability</span></a> &amp; <a href="https://masto.ai/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a> <a href="https://masto.ai/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> should do more for <a href="https://masto.ai/tags/CloudOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudOps</span></a> <a href="https://masto.ai/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a> <a href="https://masto.ai/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://masto.ai/tags/ITOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITOps</span></a> than read docs. It should do the work!</p><p><a href="https://investor.pagerduty.com/news/news-details/2024/PagerDuty-Expands-GenerativeAI-Solutions-with-PagerDuty-Advance-to-Mitigate-Risk-of-Operational-Outages/default.aspx" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">investor.pagerduty.com/news/ne</span><span class="invisible">ws-details/2024/PagerDuty-Expands-GenerativeAI-Solutions-with-PagerDuty-Advance-to-Mitigate-Risk-of-Operational-Outages/default.aspx</span></a></p>
AndiMann<p>"@PagerDuty Expands <a href="https://masto.ai/tags/GenerativeAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenerativeAI</span></a> Solutions with PagerDuty Advance to Mitigate <a href="https://masto.ai/tags/Risk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Risk</span></a> of Operational <a href="https://masto.ai/tags/Outages" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Outages</span></a>"</p><p>Love this! In <a href="https://masto.ai/tags/Observability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Observability</span></a> &amp; <a href="https://masto.ai/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a> <a href="https://masto.ai/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> should do more for <a href="https://masto.ai/tags/CloudOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudOps</span></a> <a href="https://masto.ai/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a> <a href="https://masto.ai/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://masto.ai/tags/ITOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITOps</span></a> than read docs. It should do the work!!</p><p><a href="https://investor.pagerduty.com/news/news-details/2024/PagerDuty-Expands-GenerativeAI-Solutions-with-PagerDuty-Advance-to-Mitigate-Risk-of-Operational-Outages/default.aspx" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">investor.pagerduty.com/news/ne</span><span class="invisible">ws-details/2024/PagerDuty-Expands-GenerativeAI-Solutions-with-PagerDuty-Advance-to-Mitigate-Risk-of-Operational-Outages/default.aspx</span></a></p>
Dissent Doe :cupofcoffee:<p>Change Healthcare submitted a breach notification to <a href="https://infosec.exchange/tags/HHS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HHS</span></a> on July 19. They report the number of patients affected as "500" (a marker for "We have no friggin' idea how many and we'll get back to you at some date before the end of civilization maybe."). </p><p>They didn't comply with the "no later than 60 calendar days" requirement and I'm not sure what good a "500" report does anyone. </p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/HIPAA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIPAA</span></a> <a href="https://infosec.exchange/tags/HITECH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HITECH</span></a> <a href="https://infosec.exchange/tags/HealthSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HealthSec</span></a> <a href="https://infosec.exchange/tags/ALPHV" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ALPHV</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/incidentmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentmanagement</span></a></p>
Dissent Doe :cupofcoffee:<p>Northeast Rehabilitation Hospital Network's "incident" was a <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> attack with data leaked, but they haven't said that. </p><p>And this wasn't their first cyberattack in recent years. </p><p><a href="https://databreaches.net/2024/07/29/northeast-rehabilitation-hospital-networks-incident-was-a-ransomware-attack-with-data-leaked-but-they-havent-said-that/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">databreaches.net/2024/07/29/no</span><span class="invisible">rtheast-rehabilitation-hospital-networks-incident-was-a-ransomware-attack-with-data-leaked-but-they-havent-said-that/</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/transparency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>transparency</span></a> <a href="https://infosec.exchange/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a> <a href="https://infosec.exchange/tags/HealthSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HealthSec</span></a> <a href="https://infosec.exchange/tags/HIPAA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIPAA</span></a> </p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@brett" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>brett</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@amvinfe" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>amvinfe</span></a></span></p>
Dissent Doe :cupofcoffee:<p>Almost 3 months afterDataBreaches[.]net reported on the <a href="https://infosec.exchange/tags/BlackSuit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlackSuit</span></a> attack on <a href="https://infosec.exchange/tags/Post" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Post</span></a>&amp;Courier, the paper posted a notice on its site. The notice doesn't mention that all the data was leaked on the dark web months ago or that the paper had negotiated to try to get the data deleted. </p><p>My coverage in April: <a href="https://databreaches.net/2024/04/17/the-post-and-courier-hacked-black-suit-claims-to-have-500-gb-of-data/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">databreaches.net/2024/04/17/th</span><span class="invisible">e-post-and-courier-hacked-black-suit-claims-to-have-500-gb-of-data/</span></a></p><p>Post &amp; Courier's notice in July: <a href="https://www.postandcourier.com/site/evening-post-publishing-provides-notice-of-data-event.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">postandcourier.com/site/evenin</span><span class="invisible">g-post-publishing-provides-notice-of-data-event.html</span></a></p><p>FITSNews blasted P&amp;C for its lack of timely <a href="https://infosec.exchange/tags/notification" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>notification</span></a> and <a href="https://infosec.exchange/tags/transparency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>transparency</span></a>: <a href="https://www.fitsnews.com/2024/07/23/the-post-and-courier-got-hacked/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fitsnews.com/2024/07/23/the-po</span><span class="invisible">st-and-courier-got-hacked/</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/journalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>journalism</span></a> <a href="https://infosec.exchange/tags/incidentmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentmanagement</span></a> </p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@brett" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>brett</span></a></span></p>
Dissent Doe :cupofcoffee:<p>I was just reading a follow-up on the Philippine Health Insurance (PhilHealth) breach by <a href="https://infosec.exchange/tags/Medusa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Medusa</span></a> in 2023, and I read something that struck me as unusual:</p><p>The govt didn't pay the TA's demands but what they did do was set up a portal where citizens could check to determine if Medusa had leaked their personal identification number.</p><p>I can't recall any govt or private sector entity ever creating a portal like that before. Can you? I mean, telling people to check HaveIBeenPwnd is one thing, but to create a portal on a .gov domain to check what TAs leaked? </p><p>Portal: <a href="https://philhealthleak.privacy.gov.ph/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">philhealthleak.privacy.gov.ph/</span><span class="invisible"></span></a></p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>campuscodi</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@zackwhittaker" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>zackwhittaker</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@brett" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>brett</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@troyhunt" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>troyhunt</span></a></span> </p><p><a href="https://infosec.exchange/tags/HealthSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HealthSec</span></a> <a href="https://infosec.exchange/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentManagement</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/notification" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>notification</span></a></p>