Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST CYBER NEWS
03
/
30
:
4:03 am
:
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features – Source:thehackernews.com
03
/
30
:
3:03 am
:
FBI and DOJ seize $8.2 Million in romance baiting crypto fraud scheme – Source: securityaffairs.com
03
/
30
:
3:03 am
:
Experts warn of the new sophisticate Crocodilus mobile banking Trojan – Source: securityaffairs.com
03
/
30
:
2:03 am
:
What are the cost implications of maintaining NHI compliance? – Source: securityboulevard.com
03
/
30
:
2:03 am
:
What best practices ensure long-term compliance for NHIs? – Source: securityboulevard.com
03
/
30
:
2:03 am
:
How can technology simplify the process of NHI compliance? – Source: securityboulevard.com
03
/
30
:
2:03 am
:
BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3 Weeks, To Protect Your Stuff. What Do You Do? – Source: securityboulevard.com
03
/
30
:
2:03 am
:
Babuk Locker 2.0 vs Seceon Platform: MITRE ATT&CK Mapping and Early-Stage Detection & Remediation – Source: securityboulevard.com
03
/
30
:
2:03 am
:
News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus – Source: securityboulevard.com
03
/
30
:
2:03 am
:
Executive Perspectives: Pierre Noel on Cybersecurity Leadership, Risk, and Resilience – Source: securityboulevard.com
03
/
30
:
2:03 am
:
Building Smarter, Safer Businesses: How SecureFLO is Bridging AI Innovation with Cybersecurity – Source: securityboulevard.com
03
/
30
:
1:04 am
:
Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job – Source:hackread.com
03
/
29
:
4:03 pm
:
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials – Source:thehackernews.com
03
/
29
:
4:02 pm
:
New Security Flaws Found in VMware Tools and CrushFTP — High Risk, PoC Released – Source:thehackernews.com
03
/
29
:
3:03 pm
:
Malware in Lisp? Now you’re just being cruel – Source: go.theregister.com
03
/
29
:
12:04 pm
:
Birthday freebies: how to cash in on UK retailers’ gifts and discounts – Source: www.theguardian.com
03
/
29
:
11:05 am
:
SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk – Source:hackread.com
03
/
29
:
6:03 am
:
Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware – Source: www.securityweek.com
03
/
29
:
6:03 am
:
9-Year-Old NPM Crypto Package Hijacked for Information Theft – Source: www.securityweek.com
03
/
29
:
6:03 am
:
In Other News: Hellcat Hackers Unmasked, CrushFTP Bug Controversy, NYU Hacked – Source: www.securityweek.com
03
/
29
:
6:03 am
:
New Issuance Requirements Improve HTTPS Certificate Validation – Source: www.securityweek.com
03
/
29
:
6:03 am
:
Morphing Meerkat Phishing Kits Target Over 100 Brands – Source: www.securityweek.com
03
/
29
:
6:03 am
:
Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe – Source: www.securityweek.com
03
/
29
:
6:03 am
:
Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia – Source: www.securityweek.com
03
/
29
:
4:03 am
:
Evilginx Tool (Still) Bypasses MFA – Source: www.darkreading.com
03
/
29
:
4:03 am
:
Oracle Still Denies Breach as Researchers Persist – Source: www.darkreading.com
03
/
29
:
4:03 am
:
Harmonic Security Raises $17.5M Series A to Accelerate Zero-Touch Data Protection to Market – Source: www.darkreading.com
03
/
29
:
4:03 am
:
Traditional Data Loss Prevention Solutions Are Not Working for Most Organizations – Source: www.darkreading.com
03
/
29
:
4:03 am
:
SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks – Source: www.darkreading.com
03
/
29
:
4:03 am
:
Malaysia PM Refuses to Pay $10M Ransomware Demand – Source: www.darkreading.com
03
/
29
:
4:03 am
:
Concord Orthopaedic Notifies Individuals of Security Incident – Source: www.darkreading.com
03
/
29
:
4:03 am
:
Navigating Cyber-Risks and New Defenses – Source: www.darkreading.com
03
/
29
:
4:03 am
:
Student-Powered SOCs Train Security’s Next Generation – Source: www.darkreading.com
03
/
29
:
4:03 am
:
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability – Source:thehackernews.com
03
/
29
:
4:03 am
:
Windows 10 End-of-Life Puts SMBs at Risk – Source: www.darkreading.com
03
/
29
:
2:03 am
:
Crooks are reviving the Grandoreiro banking trojan – Source: securityaffairs.com
03
/
29
:
2:03 am
:
Russian authorities arrest three suspects behind Mamont Android banking trojan – Source: securityaffairs.com
03
/
29
:
2:03 am
:
Mozilla fixed critical Firefox vulnerability CVE-2025-2857 – Source: securityaffairs.com
03
/
29
:
2:03 am
:
PCI DSS 4.0: Achieve Compliance with Feroot Before March 31 – Source: securityboulevard.com
03
/
29
:
2:03 am
:
Cybersecurity & Infrastructure Security Agency (CISA) Pledge – Source: securityboulevard.com
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
DEVSECOPS
CISO2CISO Advisors recomended posts
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat...
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK: FIRST 100 DAYS Setting the CISO up for success
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
Marcos Jaimovich
CISO: The Jedi Master of Cybersecurity. Take Off Strong in Your First 100 Days! Detailed...
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
CISO STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
CYBER ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
SOC CSIRT OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
CYBERSECURITY TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
CYBERSECURITY VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
CYBERSECURITY MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
CYBER ORGANIZATIONS
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
CISO2CISO STRATEGIC VALLEY
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original...
Akamai Guardicore
Risk Mitigation , Prevention and Cutting the Kill Chain – Minimize the impact of ransomware...
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk Alliance Resource...
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
Argentina
Propuesta de Anteproyecto de Ley de Proteccion de Datos Personales – Ley 25326 – Agencia...
DNSSENSE
Things of the Internet Global Cyber Domain Report by DNSSense – H2 – 2022 Report
CISO2CISO SOC OPERATIONS VALLEY
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
Cyber Chief Magazine
Prevent Mallware with System Hardering – Strengthen Security by Cyber Chief Magazine
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
TIDAL CYBER
The Ultimate Guide to CYBER THREAT Profiling by TIDAL CYBER
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
MSSP ALERT
TOP 250 MSSPs 2022 edition by MSSP Alert – A CyberRisk Alliance Resource
LATEST CYBER NEWS
The Hacker News
30/03/2025
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features – Source:thehackernews.com
SecurityAffairs.com
30/03/2025
FBI and DOJ seize $8.2 Million in romance baiting crypto fraud scheme – Source: securityaffairs.com
SecurityAffairs.com
30/03/2025
Experts warn of the new sophisticate Crocodilus mobile banking Trojan – Source: securityaffairs.com
Security Boulevard
30/03/2025
What are the cost implications of maintaining NHI compliance? – Source: securityboulevard.com
Security Boulevard
30/03/2025
What best practices ensure long-term compliance for NHIs? – Source: securityboulevard.com
Security Boulevard
30/03/2025
How can technology simplify the process of NHI compliance? – Source: securityboulevard.com
Security Boulevard
30/03/2025
BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3 Weeks,...
Security Boulevard
30/03/2025
Babuk Locker 2.0 vs Seceon Platform: MITRE ATT&CK Mapping and Early-Stage Detection & Remediation –...
Security Boulevard
30/03/2025
News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus – Source: securityboulevard.com
Security Boulevard
30/03/2025
Executive Perspectives: Pierre Noel on Cybersecurity Leadership, Risk, and Resilience – Source: securityboulevard.com
Security Boulevard
30/03/2025
Building Smarter, Safer Businesses: How SecureFLO is Bridging AI Innovation with Cybersecurity – Source: securityboulevard.com
Hackread
30/03/2025
Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job – Source:hackread.com
The Hacker News
29/03/2025
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials – Source:thehackernews.com
The Hacker News
29/03/2025
New Security Flaws Found in VMware Tools and CrushFTP — High Risk, PoC Released –...
The Register Security
29/03/2025
Malware in Lisp? Now you’re just being cruel – Source: go.theregister.com
The Guardian UK
29/03/2025
Birthday freebies: how to cash in on UK retailers’ gifts and discounts – Source: www.theguardian.com
Hackread
29/03/2025
SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk – Source:hackread.com
securityweek.com
29/03/2025
Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware – Source: www.securityweek.com
securityweek.com
29/03/2025
9-Year-Old NPM Crypto Package Hijacked for Information Theft – Source: www.securityweek.com
securityweek.com
29/03/2025
In Other News: Hellcat Hackers Unmasked, CrushFTP Bug Controversy, NYU Hacked – Source: www.securityweek.com
securityweek.com
29/03/2025
New Issuance Requirements Improve HTTPS Certificate Validation – Source: www.securityweek.com
securityweek.com
29/03/2025
Morphing Meerkat Phishing Kits Target Over 100 Brands – Source: www.securityweek.com
securityweek.com
29/03/2025
Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe – Source: www.securityweek.com
securityweek.com
29/03/2025
Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia – Source: www.securityweek.com
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by...
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Lacework
CISO’s Playbookto Cloud Security by Lacework
MITRE - Carson Zimmerman
Ten Strategies of a World-Class Cybersecurity Operations Center by MITRE
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
The Claroty Research Team
EVIL PLC ATTACK
EU AI Act – EU 2024/1689
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
CISO STRATEGICS
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Privacy
Risk & Compliance
Resilience
Social Engineering
Osint - Humint
CYBER ARCHITECTURE
IOT Security
MAC-OS Security
Metaverse Security
Mitre Att&ck
Mobile & 5G Security
Network Security
NIST Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT OPERATIONS
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Mallware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY TOOLS
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY VENDORS
Fortinet
Guardicore
IBM
Mcafee - Trellix
Mandiant
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY MSSP
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CYBER REGULATIONS
PCI - DSS
ISO 27001
SOX
CYBER ORGANIZATIONS
NSA
NIST
SANS
WEF
EVENTS & CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
USERS MOST VOTED POST
Vendict
The 2024 CISO Burnout Report by Vendict
The Hacker News
Cybersecurity CISOs priorities in 2021: focus and return to the basics
SANS
The R Word: Retelling the Recent Rise and Resurgence of Resilient Ransomware-as-a Service (RaaS) Operators...
CHAOS SEARCH
The Threat Hunter´s Handbook
UnifiedKillChain.com
The Unified Kill Chain by Paul Pols
ENISA
ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACK REPORT JULY 2022
WATI
RED TEAMING 101 Security Posture Assesment with Hackers-Eye View
Microsoft
Microsoft Azure Resiliency – Business Continuity and Disaster Recovery
IGNITE Technologies
Nmap for Pentesters – A Beginners Guide By Ignite Technologies
NCSC.GOV.UK
Securing the cloud by design and by Default by NCSC.GOV.UK – To reduce data breaches...
veeam
2022 VEEAM Ransomware Trends Report
CardinalOps
The State of SIEM Detection Risk 2022 Report – Quantifying the gaps in MITRE ATT&CK...
expel
MITRE ATT&CK in Google Cloud Platform (GCP) – A defender’s cheat sheet by expel
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
LUMU
The SOC of the Future by Jeffrey Wheat (Lumu`s CTO)
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
CLOUDFLARE
5 Ways to Maximize the Security, Performance and Reliability of Your Online Business by Cloudflare
MANDIANT
M-TRENDS 2022 Mandiant Special Report
Ministerio del Interior España
Guía sobre controles de seguridad en sistemas OT – Ministerio del Interior de España
O´REILLY
10 Steps Every CISO Should Take to Secure Next-Gen Software by Cindy Blake – O´REILLY...
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server
LATEST CYBER NEWS
Dark Reading Security
29/03/2025
Evilginx Tool (Still) Bypasses MFA – Source: www.darkreading.com
Dark Reading Security
29/03/2025
Oracle Still Denies Breach as Researchers Persist – Source: www.darkreading.com
Dark Reading Security
29/03/2025
Harmonic Security Raises $17.5M Series A to Accelerate Zero-Touch Data Protection to Market – Source:...
Dark Reading Security
29/03/2025
Traditional Data Loss Prevention Solutions Are Not Working for Most Organizations – Source: www.darkreading.com
Dark Reading Security
29/03/2025
SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks – Source: www.darkreading.com
Dark Reading Security
29/03/2025
Malaysia PM Refuses to Pay $10M Ransomware Demand – Source: www.darkreading.com
Dark Reading Security
29/03/2025
Concord Orthopaedic Notifies Individuals of Security Incident – Source: www.darkreading.com
Dark Reading Security
29/03/2025
Navigating Cyber-Risks and New Defenses – Source: www.darkreading.com
Dark Reading Security
29/03/2025
Student-Powered SOCs Train Security’s Next Generation – Source: www.darkreading.com
The Hacker News
29/03/2025
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability – Source:thehackernews.com
Dark Reading Security
29/03/2025
Windows 10 End-of-Life Puts SMBs at Risk – Source: www.darkreading.com
SecurityAffairs.com
29/03/2025
Crooks are reviving the Grandoreiro banking trojan – Source: securityaffairs.com
SecurityAffairs.com
29/03/2025
Russian authorities arrest three suspects behind Mamont Android banking trojan – Source: securityaffairs.com
SecurityAffairs.com
29/03/2025
Mozilla fixed critical Firefox vulnerability CVE-2025-2857 – Source: securityaffairs.com
Security Boulevard
29/03/2025
PCI DSS 4.0: Achieve Compliance with Feroot Before March 31 – Source: securityboulevard.com
Security Boulevard
29/03/2025
Cybersecurity & Infrastructure Security Agency (CISA) Pledge – Source: securityboulevard.com
Security Boulevard
29/03/2025
Oracle Hack PR Drama: Deny, Deny, Deny — Despite Damning Data – Source: securityboulevard.com
Security Boulevard
29/03/2025
BSidesLV24 – IATC – Cybersec And Ai Risk Management Challenges For The Next Generation Of...
Security Boulevard
29/03/2025
Why Cause Chaos? The Benefits of Having a “Chaos Day” – Source: securityboulevard.com
Security Boulevard
29/03/2025
Modern Security Testing – Leveling up the Crash Test Dummy – Source: securityboulevard.com
Security Boulevard
29/03/2025
Guide to Network Device Configuration Review – Source: securityboulevard.com
Security Boulevard
29/03/2025
Seceon Shines at Channel Partners Conference & Expo and MSP Summit 2025 – Source: securityboulevard.com
Security Boulevard
29/03/2025
BSidesLV24 – IATC – Wars And Rumors of Wars – What Are The Implications For...
Security Boulevard
29/03/2025
aiSIEM-Cguard: Revolutionizing Cybersecurity with AI-Powered Threat Detection – Source: securityboulevard.com
Latest Published Posts
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Bird&Bird
General Data Protection Regulation (GDPR) Guide
Microsoft
GDPR & Generative AI
GDPR
GDPR for Third-party Risk Management
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
FS.ISAC
Navigating Cyber
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Thecyphere
How to Manage Cyber Incidents?
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
UpGuard
A Complete Guide to Data Breaches
Incibe
Ciberseguridad en Smart Toys
INCIBE & SPAIN GOVERNMENT
Defensa de endpoints en sistemas de control industrial
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
ThreatMon
GLOBAL CYBER THREAT REPORT
LATEST CYBER NEWS
Cisco Security Blog
28/03/2025
Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability – Source:sec.cloudapps.cisco.com
Schneier on Security
28/03/2025
Friday Squid Blogging: Squid Werewolf Hacking Group – Source: www.schneier.com
Schneier on Security
28/03/2025
AIs as Trusted Third Parties – Source: www.schneier.com
CSO - Online
28/03/2025
Ubuntu namespace vulnerability should be addressed quickly: Expert – Source: www.networkworld.com
CSO - Online
28/03/2025
Zu wenig Budget für OT-Security – Source: www.csoonline.com
CSO - Online
28/03/2025
Salt Typhoon may have upgraded backdoors for efficiency and evasion – Source: www.csoonline.com
CSO - Online
28/03/2025
The Trump administration made an unprecedented security mistake – you can avoid doing the same...
CSO - Online
28/03/2025
How to create an effective crisis communication plan – Source: www.csoonline.com
CSO - Online
28/03/2025
Trotz Hinweisen: Oracle dementiert Cyberattacke – Source: www.csoonline.com
Hackread
28/03/2025
New Morphing Meerkat Phishing Kit Exploits DNS to Spoof 100+ Brands – Source:hackread.com
Hackread
28/03/2025
How to Implement CMMS Software in Your Organization – Source:hackread.com
Hackread
28/03/2025
Engaging Online Learning: Strategies to Keep Students Focused and Motivated – Source:hackread.com
socprime.com
28/03/2025
CoffeeLoader Detection: A New Sophisticated Malware Family Spread via SmokeLoader – Source: socprime.com
The Register Security
28/03/2025
Cardiff’s children’s chief confirms data leak 2 months after cyber risk was ‘escalated’ – Source:...
The Register Security
28/03/2025
After Chrome patches zero-day used to target Russians, Firefox splats similar bug – Source: go.theregister.com
The Register Security
28/03/2025
Cyber-crew claims it cracked American cableco, releases terrible music video to prove it – Source:...
The Register Security
28/03/2025
China’s FamousSparrow flies back into action, breaches US org after years off the radar –...
Infosecurity Magazine
28/03/2025
Solar Power System Vulnerabilities Could Result in Blackouts – Source: www.infosecurity-magazine.com
Infosecurity Magazine
28/03/2025
Nine in Ten Healthcare Organizations Use the Most Vulnerable IoT Devices – Source: www.infosecurity-magazine.com
Infosecurity Magazine
28/03/2025
Trump CISA Cuts Threaten US Election Integrity, Experts Warn – Source: www.infosecurity-magazine.com
Infosecurity Magazine
28/03/2025
Morphing Meerkat PhaaS Platform Spoofs 100+ Brands – Source: www.infosecurity-magazine.com
The Last Watchdog
28/03/2025
News alert: INE receives a dozen G2 badges highlighting its cybersecurity training leadership – Source:...
The Hacker News
28/03/2025
Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA – Source:thehackernews.com
The Hacker News
28/03/2025
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection – Source:thehackernews.com
The Hacker News
28/03/2025
Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity – Source:thehackernews.com
The Hacker News
28/03/2025
PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps – Source:thehackernews.com
adversary in the middle
28/03/2025
Stealing user credentials with evilginx – Source: news.sophos.com
grahamcluley.com
28/03/2025
VanHelsing ransomware: what you need to know – Source: www.tripwire.com
Dark Reading Security
28/03/2025
Iran’s MOIS-Linked APT34 Spies on Allies Iraq & Yemen – Source: www.darkreading.com
Dark Reading Security
28/03/2025
Hoff’s Rule: People First – Source: www.darkreading.com
Dark Reading Security
28/03/2025
How CISA Cuts Impact Election Security – Source: www.darkreading.com
Dark Reading Security
28/03/2025
OpenAI Bumps Up Bug Bounty Reward to $100K in Security Update – Source: www.darkreading.com
Hackread
28/03/2025
Russian Phishing Uses Fake CIA Sites to Target Anti-war, Ukraine Supporters – Source:hackread.com
cyberdefense magazine
28/03/2025
Best Laptop for Cybersecurity: Top Picks for Ethical Hackers & Security Professionals – Source: www.cyberdefensemagazine.com
securityweek.com
28/03/2025
Splunk Patches Dozens of Vulnerabilities – Source: www.securityweek.com
securityweek.com
28/03/2025
Russian Espionage Group Using Ransomware in Attacks – Source: www.securityweek.com
securityweek.com
28/03/2025
UK Software Firm Fined £3 Million Over Ransomware-Caused Data Breach – Source: www.securityweek.com
securityweek.com
28/03/2025
The Importance of Allyship for Women in Cyber – Source: www.securityweek.com
securityweek.com
28/03/2025
GetReal Security Raises $17.5 Million to Tackle Gen-AI Threats – Source: www.securityweek.com
securityweek.com
28/03/2025
Defense Contractor MORSE to Pay $4.6M to Settle Cybersecurity Failure Allegations – Source: www.securityweek.com
Latest Published Posts
HADESS
Hacker Culture
Open Sec
HACKING API
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
ALPEREN UGURLU
Hospital Security is at Risk Penetration Tests
Hacker Combat
How Are Passwords Cracked?
PURPLESEC
How To Plan & Develop An Effective Cyber Security Strategy
CIS - Center for Internet Security
How to Plan a Cybersecurity Roadmap in Four Steps
Ministry of MOS Security
INFOSEC AWARENESS POSTERS
ACSC Australia
Information Security Manual
Kaspersky
Incident Response Playbook: Dark Web Breaches
Incident Handling Process (HTB)
ninjaOne
Endpoint Hardening Checklist
OWASP
Firmware Security Testing Methodology
HADESS
Important Active Directory Attribute
TALLIN UNIVERSITY OF TECHNOLOGY
Implementing a SOAR Solution in a Security Operations Center on the Example of Cybers
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
CheatSheet
Communication Protocols inIndustrial Control System/Operational Technology
Rajneesh Gupta
IAM Security CHECKLIST
BIS
Generative artificial intelligence and cyber securityin central banking
sqrrl
Hunt Evil
Centre for Cyber Security Belgium
HOW TO RESPOND TO A RANSOMWARE ATTACK IN 12 STEPS
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
DOYENSEC
Exploiting Client-Side Path Traversal
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
Azhar Ghafoor
Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform
IGNITE Technologies
A Detailed Guide on Covenant
CIS - Center for Internet Security
CIS Critical Security Controls
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
COMPREHENSIVE GUIDE ON SSH TUNNELING
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
DAN ELLIOTT
Crack the Code
YL VENTURES
CISO Reporting Landscape 2024
CYBER LEADERSHIP INSTITUTE
CISO PLAY BOOK
CISO Edition
Reporting Cyber Risk to Boards
certnz
MODERN APPROACHES TO NETWORK ACCESS SECURITY
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
LABCIBE
ESTADO DE LA CIBERSEGURIDAD EN COSTA RICA 2023
INCIBE & SPAIN GOVERNMENT
Nuevas normativas de 2024 de ciberseguridad para vehículos
Views: 16650