DEV Community

# incidentresponse

The process of responding to and managing security incidents and breaches.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
IRAS: Building a Production-Grade Autonomous Incident Response Agent

IRAS: Building a Production-Grade Autonomous Incident Response Agent

Comments
4 min read
The Config Rule Audit Your IR Playbook Is Missing

The Config Rule Audit Your IR Playbook Is Missing

2
Comments
3 min read
11 Months Undetected: Inside a Silent Data Exfiltration Through a Trusted Vendor's Remote-Access Tool

11 Months Undetected: Inside a Silent Data Exfiltration Through a Trusted Vendor's Remote-Access Tool

Comments
5 min read
12 practices that make on-call sustainable for small teams

12 practices that make on-call sustainable for small teams

Comments
3 min read
Post-incident reviews that actually improve things

Post-incident reviews that actually improve things

Comments
3 min read
Malware-Based Attacks: The Undying Threat of the Computer Virus

Malware-Based Attacks: The Undying Threat of the Computer Virus

Comments
5 min read
What Happens When an AI Agent Goes Rogue

What Happens When an AI Agent Goes Rogue

Comments
4 min read
The Day the Screens Went Blue: What We Learned from the CrowdStrike Catastrophe

The Day the Screens Went Blue: What We Learned from the CrowdStrike Catastrophe

Comments
3 min read
Relvy AI: Automated On-Call Runbooks for Engineering Teams!

Relvy AI: Automated On-Call Runbooks for Engineering Teams!

Comments
5 min read
Realistic, Safe Kubernetes Incident Response Practice: Simulating Production Scenarios for Effective Training

Realistic, Safe Kubernetes Incident Response Practice: Simulating Production Scenarios for Effective Training

Comments
11 min read
Building a Threat-Informed Defense: Lessons from Real-World Incidents

Building a Threat-Informed Defense: Lessons from Real-World Incidents

Comments
4 min read
Review: Tutor LMS Pro Authentication Bypass (30k+ Sites) — Exploit Path, Exposure Conditions, and WordPress Incident Response

Review: Tutor LMS Pro Authentication Bypass (30k+ Sites) — Exploit Path, Exposure Conditions, and WordPress Incident Response

Comments
4 min read
Fake IT Support Emails Deploy Havoc C2 Framework as Gateway to Ransomware

Fake IT Support Emails Deploy Havoc C2 Framework as Gateway to Ransomware

Comments
4 min read
Ransomware vs. Wiper Attacks: Know the Difference

Ransomware vs. Wiper Attacks: Know the Difference

Comments
5 min read
Event-Driven EC2 Isolation in AWS: Building a Minimal Cloud SOAR Without Buying One

Event-Driven EC2 Isolation in AWS: Building a Minimal Cloud SOAR Without Buying One

1
Comments 2
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.