Get a Pentest and security assessment of your IT network.

News

When Lawsuits Attack

The company was compromised for nine months, but now the scope could reach almost a year prior. The question is whether this is evidence of compromise by another group or the same group. Most if not all of the preventative systems TJX might have applied are worthless for response and forensics. I’m guessing TJX is relying on host-centric forensics like analysis of MAC times of files on artifacts on victim servers to scope the incident. This is the sort of incident that my future National Digital Security Board would do well to investigate and report.”]

Source: https://taosecurity.blogspot.com/2007/03/when-lawsuits-attack.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Thousands of Magento websites compromised to serve malware

News

Office 365 Secure Score: An Introduction