<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Incident-Response on Matt Suiche</title><link>https://www.msuiche.com/categories/incident-response/</link><description>Recent content in Incident-Response on Matt Suiche</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 10 Jun 2017 00:00:00 +0000</lastBuildDate><atom:link href="https://www.msuiche.com/categories/incident-response/index.xml" rel="self" type="application/rss+xml"/><item><title>Lessons from TV5Monde 2015 Hack</title><link>https://www.msuiche.com/posts/lessons-from-tv5monde-2015-hack/</link><pubDate>Sat, 10 Jun 2017 00:00:00 +0000</pubDate><guid>https://www.msuiche.com/posts/lessons-from-tv5monde-2015-hack/</guid><description>&lt;p&gt;This week during the SSTIC2017 annual cyber security conference, a French conference running consecutively since 2004, the National Cybersecurity Agency of France (ANSSI) gave a presentation detailing their 2015 audit of their investigation and remediation of the intrusion which affected TV5Monde television network channel. This intrusion was allegedly conducted by the &lt;a href="http://securityaffairs.co/wordpress/37710/hacking/apt28-hacked-tv5monde.html" target="_blank" rel="noopener"&gt;Fancy Bear/APT28&lt;/a&gt; actor, and resulted into broadcasting and social media sabotage.&lt;/p&gt;
&lt;p&gt;Although, this happened two years ago — hats off to both ANSSI and TV5Monde for sharing their experience, what they have learned and their methodology during the investigation. Very few companies understand the importance of sharing such information in order to prevent similar scenarios. This sort of feedback is incredibly valuable and informative for the community. Thanks.&lt;/p&gt;</description></item></channel></rss>