Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST CYBER NEWS
12
/
26
:
12:03 pm
:
Ruijie Networks’ Cloud Platform Flaws Could’ve Exposed 50,000 Devices to Remote Attacks – Source:thehackernews.com
12
/
26
:
10:03 am
:
Must-Read Cyble Research Reports of 2024: Trends and Key Takeaways – Source:cyble.com
12
/
26
:
8:03 am
:
A cyber attack hit Japan Airlines delaying ticket sales for flights – Source: securityaffairs.com
12
/
26
:
8:03 am
:
Apache fixed a critical SQL Injection in Apache Traffic Control – Source: securityaffairs.com
12
/
26
:
8:03 am
:
BellaCPP, Charming Kitten’s BellaCiao variant written in C++ – Source: securityaffairs.com
12
/
26
:
8:03 am
:
DMM Bitcoin $308M Bitcoin heist linked to North Korea – Source: securityaffairs.com
12
/
26
:
8:03 am
:
How are you securing your communications in the wake of the Volt Typhoon revelations? – Source: www.csoonline.com
12
/
26
:
5:03 am
:
SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps – Source:hackread.com
12
/
26
:
2:03 am
:
Adobe ColdFusion Any File Read Vulnerability (CVE-2024-53961) – Source: securityboulevard.com
12
/
26
:
2:03 am
:
Feel Supported: Integrating IAM with Your Security Policies – Source: securityboulevard.com
12
/
26
:
2:03 am
:
Stay Calm and Secure: Secrets Management for the Modern Age – Source: securityboulevard.com
12
/
26
:
2:03 am
:
Relax with Secure Cloud-Native Solutions – Source: securityboulevard.com
12
/
26
:
2:03 am
:
Drive Innovation with Enhanced Secrets Scanning – Source: securityboulevard.com
12
/
26
:
2:03 am
:
Happy Hanukkah To Our Friends And Families – Source: securityboulevard.com
12
/
26
:
2:03 am
:
A Merry Little Christmas And A Happy New Year – Source: securityboulevard.com
12
/
26
:
1:03 am
:
Former NSA cyberspy’s not-so-secret hobby: Hacking Christmas lights – Source: go.theregister.com
12
/
26
:
1:03 am
:
Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability – Source:sec.cloudapps.cisco.com
12
/
25
:
10:03 pm
:
Weekly Update 431 – Source: www.troyhunt.com
12
/
25
:
4:04 pm
:
WhatsApp Wins Lawsuit Against Israeli Spyware Maker NSO Group – Source:hackread.com
12
/
25
:
4:04 pm
:
The Fintech Wild West: Why Preventive Cybersecurity Is Essential for Survival – Source:hackread.com
12
/
25
:
1:02 pm
:
Multiple Cisco Products Snort Rate Filter Bypass Vulnerability – Source:sec.cloudapps.cisco.com
12
/
25
:
1:02 pm
:
Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability – Source:sec.cloudapps.cisco.com
12
/
25
:
12:03 pm
:
Spyware Maker NSO Group Found Liable for Hacking WhatsApp – Source: www.schneier.com
12
/
25
:
12:03 pm
:
Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks – Source:thehackernews.com
12
/
25
:
12:03 pm
:
Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now – Source:thehackernews.com
12
/
25
:
12:03 pm
:
Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware – Source:thehackernews.com
12
/
25
:
10:03 am
:
10 essenzielle Maßnahmen für physische Sicherheit – Source: www.csoonline.com
12
/
25
:
10:03 am
:
The 2024 cyberwar playbook: Tricks used by nation-state actors – Source: www.csoonline.com
12
/
25
:
7:03 am
:
Adobe is aware that ColdFusion bug CVE-2024-53961 has a known PoC exploit code – Source: securityaffairs.com
12
/
25
:
7:03 am
:
Apache Foundation fixed a severe Tomcat vulnerability – Source: securityaffairs.com
12
/
25
:
5:03 am
:
The AI Fix #30: ChatGPT reveals the devastating truth about Santa (Merry Christmas!) – Source: grahamcluley.com
12
/
25
:
4:03 am
:
FBI Blames North Korea for $308M Cryptocurrency Hack as Losses Surge in 2024 – Source: www.securityweek.com
12
/
25
:
4:03 am
:
American Addiction Centers Data Breach Impacts 422,000 People – Source: www.securityweek.com
12
/
25
:
4:03 am
:
2025 NDAA Provides $3 Billion Funding for FCC’s Rip-and-Replace Program – Source: www.securityweek.com
12
/
25
:
4:03 am
:
Adobe Patches ColdFusion Flaw at High Risk of Exploitation – Source: www.securityweek.com
12
/
25
:
3:04 am
:
Postman Workspaces Leak 30000 API Keys and Sensitive Tokens – Source:hackread.com
12
/
25
:
3:03 am
:
How Androxgh0st rose from Mozi’s ashes to become ‘most prevalent malware’ – Source: go.theregister.com
12
/
25
:
3:03 am
:
What do ransomware and Jesus have in common? A birth month and an unwillingness to die – Source: go.theregister.com
12
/
25
:
3:03 am
:
One third of adults can’t delete device data – Source: go.theregister.com
12
/
25
:
2:03 am
:
Unmasking the Risks: Auditing Your Web Pixel Usage – Source: securityboulevard.com
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
DEVSECOPS
CISO2CISO Advisors recomended posts
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by...
Marcos Jaimovich
Remember: Compliance is a checkbox, Real Cybersecurity is a journey.
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
N/A
Security Metrics & KPIs for Measuring SOC Success – Measure Up: How SOC Metrics Elevate...
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
CISO STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
CYBER ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
SOC CSIRT OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
CYBERSECURITY TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
CYBERSECURITY VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
CYBERSECURITY MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
CYBER ORGANIZATIONS
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
CISO2CISO STRATEGIC VALLEY
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Microsoft Security
Azure Defenses for Ransomware Attack by Microsoft Security
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
Deloitte
Communicating the value of cybersecurity to boards and leadership – Seven strategies for life sciences...
NIST
Artificial Intelligence Risk Management Framework – AI RMF 1.0 By NIST
Dr. Erdal Ozkaya
Hiring a CISO – Super Guide for startups by Erdal Ozkaya
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
Akamai Guardicore
Risk Mitigation , Prevention and Cutting the Kill Chain – Minimize the impact of ransomware...
CISO2CISO SOC OPERATIONS VALLEY
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
TIDAL CYBER
The Ultimate Guide to CYBER THREAT Profiling by TIDAL CYBER
Kaspersky
Incident Response 2022 Report by Kaspersky
OAS
Practical Guide for CSIRTs by OAS – A Sustainable Business Model.
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
Akamai
Network Segmentation and Microsegmentation in Moderm Enterprise Environments by Akamai
LATEST CYBER NEWS
The Hacker News
26/12/2024
Ruijie Networks’ Cloud Platform Flaws Could’ve Exposed 50,000 Devices to Remote Attacks – Source:thehackernews.com
Cyble Blog
26/12/2024
Must-Read Cyble Research Reports of 2024: Trends and Key Takeaways – Source:cyble.com
SecurityAffairs.com
26/12/2024
A cyber attack hit Japan Airlines delaying ticket sales for flights – Source: securityaffairs.com
SecurityAffairs.com
26/12/2024
Apache fixed a critical SQL Injection in Apache Traffic Control – Source: securityaffairs.com
SecurityAffairs.com
26/12/2024
BellaCPP, Charming Kitten’s BellaCiao variant written in C++ – Source: securityaffairs.com
SecurityAffairs.com
26/12/2024
DMM Bitcoin $308M Bitcoin heist linked to North Korea – Source: securityaffairs.com
CSO - Online
26/12/2024
How are you securing your communications in the wake of the Volt Typhoon revelations? –...
Hackread
26/12/2024
SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps – Source:hackread.com
Security Boulevard
26/12/2024
Adobe ColdFusion Any File Read Vulnerability (CVE-2024-53961) – Source: securityboulevard.com
Security Boulevard
26/12/2024
Feel Supported: Integrating IAM with Your Security Policies – Source: securityboulevard.com
Security Boulevard
26/12/2024
Stay Calm and Secure: Secrets Management for the Modern Age – Source: securityboulevard.com
Security Boulevard
26/12/2024
Relax with Secure Cloud-Native Solutions – Source: securityboulevard.com
Security Boulevard
26/12/2024
Drive Innovation with Enhanced Secrets Scanning – Source: securityboulevard.com
Security Boulevard
26/12/2024
Happy Hanukkah To Our Friends And Families – Source: securityboulevard.com
Security Boulevard
26/12/2024
A Merry Little Christmas And A Happy New Year – Source: securityboulevard.com
The Register Security
26/12/2024
Former NSA cyberspy’s not-so-secret hobby: Hacking Christmas lights – Source: go.theregister.com
Cisco Security Blog
26/12/2024
Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability – Source:sec.cloudapps.cisco.com
Troyhunt.com
25/12/2024
Weekly Update 431 – Source: www.troyhunt.com
Hackread
25/12/2024
WhatsApp Wins Lawsuit Against Israeli Spyware Maker NSO Group – Source:hackread.com
Hackread
25/12/2024
The Fintech Wild West: Why Preventive Cybersecurity Is Essential for Survival – Source:hackread.com
Cisco Security Blog
25/12/2024
Multiple Cisco Products Snort Rate Filter Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Cisco Security Blog
25/12/2024
Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Schneier on Security
25/12/2024
Spyware Maker NSO Group Found Liable for Hacking WhatsApp – Source: www.schneier.com
The Hacker News
25/12/2024
Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks – Source:thehackernews.com
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by...
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Lacework
CISO’s Playbookto Cloud Security by Lacework
MITRE - Carson Zimmerman
Ten Strategies of a World-Class Cybersecurity Operations Center by MITRE
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
The Claroty Research Team
EVIL PLC ATTACK
EU AI Act – EU 2024/1689
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
CISO STRATEGICS
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Privacy
Risk & Compliance
Resilience
Social Engineering
Osint - Humint
CYBER ARCHITECTURE
IOT Security
MAC-OS Security
Metaverse Security
Mitre Att&ck
Mobile & 5G Security
Network Security
NIST Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT OPERATIONS
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Mallware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY TOOLS
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY VENDORS
Fortinet
Guardicore
IBM
Mcafee - Trellix
Mandiant
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY MSSP
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CYBER REGULATIONS
PCI - DSS
ISO 27001
SOX
CYBER ORGANIZATIONS
NSA
NIST
SANS
WEF
EVENTS & CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
USERS MOST VOTED POST
Vendict
The 2024 CISO Burnout Report by Vendict
SANS
Sleeping with the enemy – A best practice guide for attacker engagement by Nick Klein.
NIST
Guide for Developing Security Plans by NIST
OFFENSIVE SECURITY
Offensive Security OSCP Exam with AD Preparation by Michael Mancao
LMNTRIX
How to Become a CISO by LMNTRIX
Bastian Ballman - Springer
Undestanding Networks Hacks – Attack and Defense with Python 2nd Edition by Bastian Ballman –...
WILEY
Anomaly Detection in Cybersecurity for Dummies by Ram Vaidyanathan
VIRUSTOTAL
Ransomware in a Global Context Report 2021 by Virustotal
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
SentinelOne
4 ways to Drive a Cybersecurity Centric Culture in Your Organization by SentinelOne
Nozomi Networks
Nozomi OT IoT Security Report – Cyber War Insights, Threats and Trends, Recommendations
Joas Antonio
Cybersecurity for Kids 1 by Joas Antonio
International Energy Agency
Enhancing Cyber Resilience in Electricy Systems by International Energy Agency
Dutch Blockchain Coalition
Blockchain Security – A Framework for Trust and Adoption by Dutch Blockchain Coalition
Claudio Benavente
Attack Surface Management by Claudio Benavente Cyber Security Advisor
SLOWMIST
Blockchain Security and AML Analysis Report 2022 Mid-Year by SLOWMIST
trendmicro
A global study EVERYTHING IS CONNECTED – Uncovering the ransomware threat from global supply chains...
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by Dmitry Janushkevich...
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk Alliance Resource...
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
ALEX SIDORENKO & ELENA DEMIDENKO
GUIDE TO EFFECTIVE RISK MANAGEMENT 3.0 – ALEX SIDORENKO – ELENA DEMIDENKO
LATEST CYBER NEWS
The Hacker News
25/12/2024
Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now –...
The Hacker News
25/12/2024
Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware – Source:thehackernews.com
CSO - Online
25/12/2024
10 essenzielle Maßnahmen für physische Sicherheit – Source: www.csoonline.com
CSO - Online
25/12/2024
The 2024 cyberwar playbook: Tricks used by nation-state actors – Source: www.csoonline.com
SecurityAffairs.com
25/12/2024
Adobe is aware that ColdFusion bug CVE-2024-53961 has a known PoC exploit code – Source:...
SecurityAffairs.com
25/12/2024
Apache Foundation fixed a severe Tomcat vulnerability – Source: securityaffairs.com
grahamcluley.com
25/12/2024
The AI Fix #30: ChatGPT reveals the devastating truth about Santa (Merry Christmas!) – Source:...
securityweek.com
25/12/2024
FBI Blames North Korea for $308M Cryptocurrency Hack as Losses Surge in 2024 – Source:...
securityweek.com
25/12/2024
American Addiction Centers Data Breach Impacts 422,000 People – Source: www.securityweek.com
securityweek.com
25/12/2024
2025 NDAA Provides $3 Billion Funding for FCC’s Rip-and-Replace Program – Source: www.securityweek.com
securityweek.com
25/12/2024
Adobe Patches ColdFusion Flaw at High Risk of Exploitation – Source: www.securityweek.com
Hackread
25/12/2024
Postman Workspaces Leak 30000 API Keys and Sensitive Tokens – Source:hackread.com
The Register Security
25/12/2024
How Androxgh0st rose from Mozi’s ashes to become ‘most prevalent malware’ – Source: go.theregister.com
The Register Security
25/12/2024
What do ransomware and Jesus have in common? A birth month and an unwillingness to...
The Register Security
25/12/2024
One third of adults can’t delete device data – Source: go.theregister.com
Security Boulevard
25/12/2024
Unmasking the Risks: Auditing Your Web Pixel Usage – Source: securityboulevard.com
Security Boulevard
25/12/2024
Best of 2024: Gmail Error: Email Blocked Because Sender is Unauthenticated – Source: securityboulevard.com
Security Boulevard
25/12/2024
DEF CON 32 – What To Expect When You’re Exploiting: 0Days, Baby Monitors & Wi-Fi...
Security Boulevard
25/12/2024
Randall Munroe’s XKCD ‘D Roll’ – Source: securityboulevard.com
Security Boulevard
25/12/2024
DEF CON 32 – Your Smartcard Is Dumb: A Brief History Of Hacking Access Control...
Security Boulevard
25/12/2024
Best of 2024: An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections –...
Security Boulevard
25/12/2024
PowerDMARC in 2024: A Year in Review – Source: securityboulevard.com
Security Boulevard
25/12/2024
5 Common DNS Vulnerabilities and How to Protect Your Network – Source: securityboulevard.com
Security Boulevard
25/12/2024
How to Streamline Your Cybersecurity Risk Management Process – Source: securityboulevard.com
Latest Published Posts
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Bird&Bird
General Data Protection Regulation (GDPR) Guide
Microsoft
GDPR & Generative AI
GDPR
GDPR for Third-party Risk Management
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
FS.ISAC
Navigating Cyber
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Thecyphere
How to Manage Cyber Incidents?
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
UpGuard
A Complete Guide to Data Breaches
Incibe
Ciberseguridad en Smart Toys
INCIBE & SPAIN GOVERNMENT
Defensa de endpoints en sistemas de control industrial
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
ThreatMon
GLOBAL CYBER THREAT REPORT
LATEST CYBER NEWS
Security Boulevard
25/12/2024
Impact of Unpatched Vulnerabilities in 2025 – Source: securityboulevard.com
Hackerone
24/12/2024
What is a Responsible Disclosure Policy and Why You Need One – Source:www.hackerone.com
AT&T Cybersecurity
24/12/2024
DSPM vs CSPM: Key Differences and Their Roles in Data Protection – Source:levelblue.com
Infosecurity Magazine
24/12/2024
US and Japan Blame North Korea for $308m Crypto Heist – Source: www.infosecurity-magazine.com
Infosecurity Magazine
24/12/2024
Spyware Maker NSO Group Liable for WhatsApp User Hacks – Source: www.infosecurity-magazine.com
Infosecurity Magazine
24/12/2024
Major Biometric Data Farming Operation Uncovered – Source: www.infosecurity-magazine.com
Hackerone
24/12/2024
Open-Xchange Approaches 3 Years of Bug Bounties & 250 Valid Vulnerabilities – Source:www.hackerone.com
Hackerone
24/12/2024
5 Tips for an Effective AppSec Testing Strategy – Source:www.hackerone.com
Mcafee Security
24/12/2024
How to Spot Phishing Lures – Source:www.mcafee.com
Hackread
24/12/2024
Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data – Source:hackread.com
Dark Reading Security
24/12/2024
Too Much ‘Trust,’ Not Enough ‘Verify’ – Source: www.darkreading.com
Dark Reading Security
24/12/2024
Trump 2.0 Portends Big Shift in Cybersecurity Policies – Source: www.darkreading.com
Dark Reading Security
24/12/2024
DNSSEC Denial-of-Service Attacks Show Technology’s Fragility – Source: www.darkreading.com
CSO - Online
24/12/2024
7 biggest cybersecurity stories of 2024 – Source: www.csoonline.com
CSO - Online
24/12/2024
Hacker knacken das Smart Home – Source: www.csoonline.com
The Hacker News
24/12/2024
Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts – Source:thehackernews.com
The Hacker News
24/12/2024
North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin – Source:thehackernews.com
The Hacker News
24/12/2024
CISA Adds Acclaim USAHERDS Vulnerability to KEV Catalog Amid Active Exploitation – Source:thehackernews.com
The Hacker News
24/12/2024
Apache Tomcat Vulnerability CVE-2024-56337 Exposes Servers to RCE Attacks – Source:thehackernews.com
Cyble Blog
24/12/2024
IT Vulnerability Report: Cyble Urges Fixes for Apache Struts, Qualcomm & More – Source:cyble.com
Cyble Blog
24/12/2024
Cyble Sensors Detect Attacks on Ivanti, PHP, SAML, Network Devices, and More – Source:cyble.com
Schneier on Security
24/12/2024
Criminal Complaint against LockBit Ransomware Writer – Source: www.schneier.com
Security TechRepublic
24/12/2024
Protect 3 Devices With This Maximum Security Software – Source: www.techrepublic.com
Security TechRepublic
24/12/2024
Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead – Source: www.techrepublic.com
Security TechRepublic
24/12/2024
Best Patch Management Software (2025): Compare Features & Pricing – Source: www.techrepublic.com
SecurityAffairs.com
24/12/2024
Italy’s data protection watchdog fined OpenAI €15 million over ChatGPT’s data management violations – Source:...
SecurityAffairs.com
24/12/2024
U.S. CISA adds Acclaim Systems USAHERDS flaw to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
SecurityAffairs.com
24/12/2024
U.S. Court rules against NSO Group in WhatsApp spyware Lawsuit – Source: securityaffairs.com
SecurityAffairs.com
24/12/2024
Lazarus APT targeted employees at an unnamed nuclear-related organization – Source: securityaffairs.com
securityweek.com
24/12/2024
Beware Of Shadow AI – Shadow IT’s Less Well-Known Brother – Source: www.securityweek.com
securityweek.com
24/12/2024
5.6 Million Impacted by Ransomware Attack on Healthcare Giant Ascension – Source: www.securityweek.com
securityweek.com
24/12/2024
Sophos Patches Critical Firewall Vulnerabilities – Source: www.securityweek.com
securityweek.com
24/12/2024
LockBit Ransomware Developer Arrested in Israel at Request of US – Source: www.securityweek.com
securityweek.com
24/12/2024
Italy’s Privacy Watchdog Fines OpenAI for ChatGPT’s Violations in Collecting Users Personal Data – Source:...
securityweek.com
24/12/2024
Apple Complains Meta Requests Risk Privacy in Spat Over EU Efforts to Widen Access to...
The Register Security
24/12/2024
‘That’s not a bug, it’s a feature’ takes on a darker tone when malware’s involved...
The Register Security
24/12/2024
Suspected LockBit dev, facing US extradition, ‘did it for the money’ – Source: go.theregister.com
Security Boulevard
24/12/2024
How SLED Organizations Can Enhance Cybersecurity Compliance Before Year-End – Source: securityboulevard.com
Security Boulevard
24/12/2024
Achieving Stability with Enhanced Secret Detection – Source: securityboulevard.com
Security Boulevard
24/12/2024
DEF CON 32 – Disenshittify Or Die! How Hackers Can Seize The Means Of Computation...
Latest Published Posts
HADESS
Hacker Culture
Open Sec
HACKING API
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
ALPEREN UGURLU
Hospital Security is at Risk Penetration Tests
Hacker Combat
How Are Passwords Cracked?
PURPLESEC
How To Plan & Develop An Effective Cyber Security Strategy
CIS - Center for Internet Security
How to Plan a Cybersecurity Roadmap in Four Steps
Ministry of MOS Security
INFOSEC AWARENESS POSTERS
ACSC Australia
Information Security Manual
Kaspersky
Incident Response Playbook: Dark Web Breaches
Incident Handling Process (HTB)
ninjaOne
Endpoint Hardening Checklist
OWASP
Firmware Security Testing Methodology
HADESS
Important Active Directory Attribute
TALLIN UNIVERSITY OF TECHNOLOGY
Implementing a SOAR Solution in a Security Operations Center on the Example of Cybers
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
CheatSheet
Communication Protocols inIndustrial Control System/Operational Technology
Rajneesh Gupta
IAM Security CHECKLIST
BIS
Generative artificial intelligence and cyber securityin central banking
sqrrl
Hunt Evil
Centre for Cyber Security Belgium
HOW TO RESPOND TO A RANSOMWARE ATTACK IN 12 STEPS
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
DOYENSEC
Exploiting Client-Side Path Traversal
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
Azhar Ghafoor
Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform
IGNITE Technologies
A Detailed Guide on Covenant
CIS - Center for Internet Security
CIS Critical Security Controls
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
COMPREHENSIVE GUIDE ON SSH TUNNELING
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
DAN ELLIOTT
Crack the Code
YL VENTURES
CISO Reporting Landscape 2024
CYBER LEADERSHIP INSTITUTE
CISO PLAY BOOK
CISO Edition
Reporting Cyber Risk to Boards
certnz
MODERN APPROACHES TO NETWORK ACCESS SECURITY
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
LABCIBE
ESTADO DE LA CIBERSEGURIDAD EN COSTA RICA 2023
INCIBE & SPAIN GOVERNMENT
Nuevas normativas de 2024 de ciberseguridad para vehículos
Views: 14934