Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST CYBER NEWS
11
/
20
:
7:04 pm
:
SquareX Brings Industry’s First Browser Detection Response Solution to AISA Melbourne CyberCon 2024 – Source:hackread.com
11
/
20
:
7:04 pm
:
US and UK Military Social Network “Forces Penpals” Exposes SSN, PII Data – Source:hackread.com
11
/
20
:
7:04 pm
:
Hackers Exploit Misconfigured Jupyter Servers for Illegal Sports Streaming – Source:hackread.com
11
/
20
:
7:04 pm
:
ANY.RUN Sandbox Now Automates Interactive Analysis of Complex Cyber Attack Chains – Source:hackread.com
11
/
20
:
7:03 pm
:
Apple Rolls Out Urgent Security Updates to Address Actively Exploited Zero-Day Vulnerabilities – Source:cyble.com
11
/
20
:
7:03 pm
:
CISOs’ Key Takeaways from the ANZ (Australia and New Zealand) Threat Landscape Report 2024 – Source:cyble.com
11
/
20
:
6:03 pm
:
China’s ‘Liminal Panda’ APT Attacks Telcos, Steals Phone Data – Source: www.darkreading.com
11
/
20
:
6:03 pm
:
Alleged Ford ‘Breach’ Encompasses Auto Dealer Info – Source: www.darkreading.com
11
/
20
:
6:03 pm
:
Apple Urgently Patches Actively Exploited Zero-Days – Source: www.darkreading.com
11
/
20
:
6:03 pm
:
Small US Cyber Agencies Are Underfunded & That’s a Problem – Source: www.darkreading.com
11
/
20
:
6:03 pm
:
‘Water Barghest’ Sells Hijacked IoT Devices for Proxy Botnet Misuse – Source: www.darkreading.com
11
/
20
:
6:03 pm
:
African Reliance on Foreign Suppliers Boosts Insecurity Concerns – Source: www.darkreading.com
11
/
20
:
6:03 pm
:
DeepTempo Launches AI-Based Security App for Snowflake – Source: www.darkreading.com
11
/
20
:
6:03 pm
:
RIIG Launches With Risk Intelligence Solutions – Source: www.darkreading.com
11
/
20
:
6:03 pm
:
SWEEPS Educational Initiative Offers Application Security Training – Source: www.darkreading.com
11
/
20
:
6:02 pm
:
Name That Toon: Meeting of Minds – Source: www.darkreading.com
11
/
20
:
5:03 pm
:
Fintech Giant Finastra Investigating Data Breach – Source: krebsonsecurity.com
11
/
20
:
3:03 pm
:
Five Privilege Escalation Flaws Found in Ubuntu needrestart – Source: www.infosecurity-magazine.com
11
/
20
:
3:03 pm
:
60% of Emails with QR Codes Classified as Spam or Malicious – Source: www.infosecurity-magazine.com
11
/
20
:
3:03 pm
:
Chinese APT Group Targets Telecom Firms Linked to Belt and Road Initiative – Source: www.infosecurity-magazine.com
11
/
20
:
3:03 pm
:
Apple Issues Emergency Security Update for Actively Exploited Vulnerabilities – Source: www.infosecurity-magazine.com
11
/
20
:
3:03 pm
:
OWASP Warns of Growing Data Exposure Risk from AI in New Top 10 List for LLMs – Source: www.infosecurity-magazine.com
11
/
20
:
3:03 pm
:
Hackers Hijack Jupyter Servers for Sport Stream Ripping – Source: www.infosecurity-magazine.com
11
/
20
:
3:03 pm
:
One Deepfake Digital Identity Attack Strikes Every Five Minutes – Source: www.infosecurity-magazine.com
11
/
20
:
3:03 pm
:
Cybercriminals Exploit Weekend Lull to Launch Ransomware Attacks – Source: www.infosecurity-magazine.com
11
/
20
:
2:03 pm
:
Erneute Phishing-Attacke auf IHK-Unternehmen – Source: www.csoonline.com
11
/
20
:
2:03 pm
:
Chinas Cyber-Pandas greifen Telekom-Unternehmen an – Source: www.csoonline.com
11
/
20
:
2:03 pm
:
Weaponized pen testers are becoming a new hacker staple – Source: www.csoonline.com
11
/
20
:
2:03 pm
:
11 biggest financial sector cybersecurity threats – Source: www.csoonline.com
11
/
20
:
2:03 pm
:
SBOM erklärt: Was ist eine Software Bill of Materials? – Source: www.csoonline.com
11
/
20
:
2:03 pm
:
Palo Alto Networks zero-day firewall flaws caused by basic dev mistakes – Source: www.csoonline.com
11
/
20
:
1:03 pm
:
VMware vCenter Users Risk RCE Attacks. Two Flaws Exploited in the Wild – Source: heimdalsecurity.com
11
/
20
:
12:04 pm
:
Twine Snags $12M for AI-Powered ‘Digital Employees’ Tech – Source: www.securityweek.com
11
/
20
:
12:04 pm
:
Surf Security Adds Deepfake Detection Tool to Enterprise Browser – Source: www.securityweek.com
11
/
20
:
12:04 pm
:
D-Link Warns of RCE Vulnerability in Legacy Routers – Source: www.securityweek.com
11
/
20
:
12:04 pm
:
CISA Warns of Progress Kemp LoadMaster Vulnerability Exploitation – Source: www.securityweek.com
11
/
20
:
12:04 pm
:
GitHub Launches Fund to Improve Open Source Project Security – Source: www.securityweek.com
11
/
20
:
12:04 pm
:
Cyera Raises $300 Million at $3 Billion Valuation – Source: www.securityweek.com
11
/
20
:
12:04 pm
:
Oracle Patches Exploited Agile PLM Zero-Day – Source: www.securityweek.com
11
/
20
:
12:04 pm
:
Ford Says Blames Third-Party Supplier for Data Breach – Source: www.securityweek.com
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
DEVSECOPS
CISO2CISO Advisors recomended posts
N/A
Security Metrics & KPIs for Measuring SOC Success – Measure Up: How SOC Metrics Elevate...
Marcos Jaimovich
Remember: Compliance is a checkbox, Real Cybersecurity is a journey.
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by...
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
Latest Published Posts
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by...
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Lacework
CISO’s Playbookto Cloud Security by Lacework
CISO STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
CYBER ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
SOC CSIRT OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
CYBERSECURITY TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
CYBERSECURITY VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
CYBERSECURITY MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
CYBER ORGANIZATIONS
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
CISO2CISO STRATEGIC VALLEY
BlakerHostetler
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
Gartner Research
CISO Foundations – Cybersecurity Talent Strategies for CISOs by Gartner Research
KATY ANTON - JIM MANICO - JIM BIRD
OWASP PRO Active Controls for Developers v. 3 – Securing Coding Best Practices – 10...
Rockwell
Cybersecurity Preparedness in Critical Infraestructure – Avoinding The Big Shutdown
Enterprise Strategy Group - ESG
Cybersecurity in the C-suite and Boardroom by Jon Oltsik – Enterprise Strategy Group (ESG)
MSSP ALERT
TOP 250 MSSPs 2022 edition by MSSP Alert – A CyberRisk Alliance Resource
CISO2CISO SOC OPERATIONS VALLEY
OAS
Practical Guide for CSIRTs by OAS – A Sustainable Business Model.
IGNITE Technologies
Incident Response Cheatsheet Windows & Linux by Hackingarticles.in – Ignite Technologies
Purple Knight
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory...
Akamai
Network Segmentation and Microsegmentation in Moderm Enterprise Environments by Akamai
PICUS
The Complete Active Directory Security Handbook – Exploitation – Detection and Migitation Strategies by PICUS
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
MSSP ALERT
TOP 250 MSSPs 2022 edition by MSSP Alert – A CyberRisk Alliance Resource
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
LATEST CYBER NEWS
Hackread
20/11/2024
SquareX Brings Industry’s First Browser Detection Response Solution to AISA Melbourne CyberCon 2024 – Source:hackread.com
Hackread
20/11/2024
US and UK Military Social Network “Forces Penpals” Exposes SSN, PII Data – Source:hackread.com
Hackread
20/11/2024
Hackers Exploit Misconfigured Jupyter Servers for Illegal Sports Streaming – Source:hackread.com
Hackread
20/11/2024
ANY.RUN Sandbox Now Automates Interactive Analysis of Complex Cyber Attack Chains – Source:hackread.com
Hackread
20/11/2024
How Bitcoin’s digital signature feature facilitates Web3 adoption – Source:hackread.com
Cyble Blog
20/11/2024
Apple Rolls Out Urgent Security Updates to Address Actively Exploited Zero-Day Vulnerabilities – Source:cyble.com
Cyble Blog
20/11/2024
CISOs’ Key Takeaways from the ANZ (Australia and New Zealand) Threat Landscape Report 2024 –...
Dark Reading Security
20/11/2024
China’s ‘Liminal Panda’ APT Attacks Telcos, Steals Phone Data – Source: www.darkreading.com
Dark Reading Security
20/11/2024
Alleged Ford ‘Breach’ Encompasses Auto Dealer Info – Source: www.darkreading.com
Dark Reading Security
20/11/2024
Apple Urgently Patches Actively Exploited Zero-Days – Source: www.darkreading.com
Dark Reading Security
20/11/2024
Small US Cyber Agencies Are Underfunded & That’s a Problem – Source: www.darkreading.com
Dark Reading Security
20/11/2024
‘Water Barghest’ Sells Hijacked IoT Devices for Proxy Botnet Misuse – Source: www.darkreading.com
Dark Reading Security
20/11/2024
African Reliance on Foreign Suppliers Boosts Insecurity Concerns – Source: www.darkreading.com
Dark Reading Security
20/11/2024
DeepTempo Launches AI-Based Security App for Snowflake – Source: www.darkreading.com
Dark Reading Security
20/11/2024
RIIG Launches With Risk Intelligence Solutions – Source: www.darkreading.com
Dark Reading Security
20/11/2024
SWEEPS Educational Initiative Offers Application Security Training – Source: www.darkreading.com
Dark Reading Security
20/11/2024
Name That Toon: Meeting of Minds – Source: www.darkreading.com
Krebs On Security
20/11/2024
Fintech Giant Finastra Investigating Data Breach – Source: krebsonsecurity.com
Infosecurity Magazine
20/11/2024
Five Privilege Escalation Flaws Found in Ubuntu needrestart – Source: www.infosecurity-magazine.com
Infosecurity Magazine
20/11/2024
60% of Emails with QR Codes Classified as Spam or Malicious – Source: www.infosecurity-magazine.com
Infosecurity Magazine
20/11/2024
Chinese APT Group Targets Telecom Firms Linked to Belt and Road Initiative – Source: www.infosecurity-magazine.com
Infosecurity Magazine
20/11/2024
Apple Issues Emergency Security Update for Actively Exploited Vulnerabilities – Source: www.infosecurity-magazine.com
Infosecurity Magazine
20/11/2024
OWASP Warns of Growing Data Exposure Risk from AI in New Top 10 List for...
Infosecurity Magazine
20/11/2024
Hackers Hijack Jupyter Servers for Sport Stream Ripping – Source: www.infosecurity-magazine.com
Latest Published Posts
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by...
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Lacework
CISO’s Playbookto Cloud Security by Lacework
MITRE - Carson Zimmerman
Ten Strategies of a World-Class Cybersecurity Operations Center by MITRE
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
The Claroty Research Team
EVIL PLC ATTACK
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
EU AI Act – EU 2024/1689
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Bird&Bird
General Data Protection Regulation (GDPR) Guide
Microsoft
GDPR & Generative AI
GDPR
GDPR for Third-party Risk Management
CISO STRATEGICS
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Privacy
Risk & Compliance
Resilience
Social Engineering
Osint - Humint
CYBER ARCHITECTURE
IOT Security
MAC-OS Security
Metaverse Security
Mitre Att&ck
Mobile & 5G Security
Network Security
NIST Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT OPERATIONS
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Mallware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY TOOLS
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY VENDORS
Fortinet
Guardicore
IBM
Mcafee - Trellix
Mandiant
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY MSSP
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CYBER REGULATIONS
PCI - DSS
ISO 27001
SOX
CYBER ORGANIZATIONS
NSA
NIST
SANS
WEF
EVENTS & CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
USERS MOST VOTED POST
SecurityHQ
A Checklist for Effective Threat Hunting by SecurityHQ
WILEY
Mitre Attack for Dummies
UNIT 42 Palo Alto Networks
RANSOMWARE THREAT REPORT 2022 by UNIT 42 Palo Alto Networks
World Economic Forum
Building a cyber resilience strategy for a geopolitically unstable world
LOG RHYTHM
Using MITRE ATT&CK IN THREAT HUNTING AND DETECTION BY LogRhythm
CLOUDFLARE
DDoS Attack Threat Landscape trend from Q2 2022 by CLOUDFLARE
CISA
Chemical Sector Cybersecurity – Framework Implementation Guidance by CISA
Jon Radoff
The Metaverse Value Chain – The Seven Layers of the Metaverse by Jon Radoff
CSA Cloud Security Alliance
TOP Threats to Cloud Computing – Pandemic Eleven 2022 by Cloud Security Alliance report.
blueteamfieldmanual.com
BTFM – Blue Team Field Manual 2022 – by Alan White and Ben Clark
PreScouter
Quantum Computing and Cybersecurity – Preparing for Post-Quantum Cryptography
HEIDRICK & STRUGGLES
2022 Global Chief Information Security Officer (CISO) Survey by HEIDRICK & STRUGGLES – SPECIALITY PRACTICES...
IGNITE Technologies
Linux Privilege Escalation on Docker by Ignite Technologies
CSA Cloud Security Alliance
CISO Perspectives and Progress in Deploying Zero Trust Report & Survey by Cloud Security Alliance...
CRS Report Services
The Metaverse – Concepts and Issues for Congress by Congressional Research Service
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency...
DNSSENSE
DNS LAYER SECURITY from the MITRE ATT&CK Perspective whitepapper by DNSSense
NIST
National Initiative for Cybersecurity Education (NICE) – Cybersecurity Workforce Framework – NIST Special Publication 800-181
Dr. Erdal Ozkaya
Hiring a CISO – Super Guide for startups by Erdal Ozkaya
Joas Antonio
Windows Persistence Techniques by Joas Antonio
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection...
LATEST CYBER NEWS
Infosecurity Magazine
20/11/2024
Hackers Hijack Jupyter Servers for Sport Stream Ripping – Source: www.infosecurity-magazine.com
Infosecurity Magazine
20/11/2024
One Deepfake Digital Identity Attack Strikes Every Five Minutes – Source: www.infosecurity-magazine.com
Infosecurity Magazine
20/11/2024
Cybercriminals Exploit Weekend Lull to Launch Ransomware Attacks – Source: www.infosecurity-magazine.com
CSO - Online
20/11/2024
Erneute Phishing-Attacke auf IHK-Unternehmen – Source: www.csoonline.com
CSO - Online
20/11/2024
Chinas Cyber-Pandas greifen Telekom-Unternehmen an – Source: www.csoonline.com
CSO - Online
20/11/2024
Weaponized pen testers are becoming a new hacker staple – Source: www.csoonline.com
CSO - Online
20/11/2024
11 biggest financial sector cybersecurity threats – Source: www.csoonline.com
CSO - Online
20/11/2024
SBOM erklärt: Was ist eine Software Bill of Materials? – Source: www.csoonline.com
CSO - Online
20/11/2024
Palo Alto Networks zero-day firewall flaws caused by basic dev mistakes – Source: www.csoonline.com
HeimdalSecurity.com
20/11/2024
VMware vCenter Users Risk RCE Attacks. Two Flaws Exploited in the Wild – Source: heimdalsecurity.com
securityweek.com
20/11/2024
Twine Snags $12M for AI-Powered ‘Digital Employees’ Tech – Source: www.securityweek.com
securityweek.com
20/11/2024
Surf Security Adds Deepfake Detection Tool to Enterprise Browser – Source: www.securityweek.com
securityweek.com
20/11/2024
D-Link Warns of RCE Vulnerability in Legacy Routers – Source: www.securityweek.com
securityweek.com
20/11/2024
CISA Warns of Progress Kemp LoadMaster Vulnerability Exploitation – Source: www.securityweek.com
securityweek.com
20/11/2024
GitHub Launches Fund to Improve Open Source Project Security – Source: www.securityweek.com
securityweek.com
20/11/2024
Cyera Raises $300 Million at $3 Billion Valuation – Source: www.securityweek.com
securityweek.com
20/11/2024
Oracle Patches Exploited Agile PLM Zero-Day – Source: www.securityweek.com
securityweek.com
20/11/2024
Ford Says Blames Third-Party Supplier for Data Breach – Source: www.securityweek.com
grahamcluley.com
20/11/2024
The AI Fix #25: Beware of the superintelligence, and a spam-eating AI super gran –...
The Hacker News
20/11/2024
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments – Source:thehackernews.com
The Hacker News
20/11/2024
NHIs Are the Future of Cybersecurity: Meet NHIDR – Source:thehackernews.com
The Hacker News
20/11/2024
Decades-Old Security Vulnerabilities Found in Ubuntu’s Needrestart Package – Source:thehackernews.com
The Hacker News
20/11/2024
Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity – Source:thehackernews.com
The Hacker News
20/11/2024
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks – Source:thehackernews.com
Latest Published Posts
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Bird&Bird
General Data Protection Regulation (GDPR) Guide
Microsoft
GDPR & Generative AI
GDPR
GDPR for Third-party Risk Management
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
Gartner
Gartner Security & Risk Management Summit
FS.ISAC
Navigating Cyber
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Thecyphere
How to Manage Cyber Incidents?
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
UpGuard
A Complete Guide to Data Breaches
Incibe
Ciberseguridad en Smart Toys
INCIBE & SPAIN GOVERNMENT
Defensa de endpoints en sistemas de control industrial
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
ThreatMon
GLOBAL CYBER THREAT REPORT
Gary Hinson
Getting started withsecurity metrics
CAPACITACION USACH
Gestión de Riesgos de Ciberseguridad
LATEST CYBER NEWS
The Hacker News
20/11/2024
Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities – Source:thehackernews.com
The Hacker News
20/11/2024
Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation – Source:thehackernews.com
Data Breach Today
20/11/2024
US Agencies Urged to Combat Growing Chinese Cyberthreat – Source: www.databreachtoday.com
Data Breach Today
20/11/2024
Data Protection Startup Cyera Raises $300M on $3B Valuation – Source: www.databreachtoday.com
Data Breach Today
20/11/2024
India Fines WhatsApp $25M, Bans Data Sharing for 5 Years – Source: www.databreachtoday.com
Data Breach Today
20/11/2024
Oklahoma Hospital Says Ransomware Hack Hits 133,000 People – Source: www.databreachtoday.com
cyberdefense magazine
20/11/2024
Mitigating the Risk of Cybercrime While Traveling Abroad – Source: www.cyberdefensemagazine.com
Security TechRepublic
20/11/2024
Vishing, Wangiri, and Other VoIP Fraud Tactics On the Rise – Source: www.techrepublic.com
Security TechRepublic
20/11/2024
Dell Unveils AI and Cybersecurity Solutions at Microsoft Ignite 2024 – Source: www.techrepublic.com
Security TechRepublic
20/11/2024
The 6 Best Free Antivirus Software Providers for Mac in 2024 – Source: www.techrepublic.com
Security TechRepublic
20/11/2024
Microsoft Ignite 2024 Unveils Groundbreaking AI, Security, and Teams Innovations – Source: www.techrepublic.com
Davinci Cybersecurity
20/11/2024
Social Media Hackers: How They Operate and How to Protect Yourself – Source:davinciforensics.co.za
Davinci Cybersecurity
20/11/2024
What is 2FA? – Source:davinciforensics.co.za
govinfosecurity.com
20/11/2024
US Agencies Urged to Combat Growing Chinese Cyberthreat – Source: www.govinfosecurity.com
govinfosecurity.com
20/11/2024
India Fines WhatsApp $25M, Bans Data Sharing for 5 Years – Source: www.govinfosecurity.com
govinfosecurity.com
20/11/2024
Oklahoma Hospital Says Ransomware Hack Hits 133,000 People – Source: www.govinfosecurity.com
govinfosecurity.com
20/11/2024
UK CMA Clears Alphabet, Anthropic Partnership – Source: www.govinfosecurity.com
The Register Security
20/11/2024
Data is the new uranium – incredibly powerful and amazingly dangerous – Source: go.theregister.com
The Register Security
20/11/2024
Healthcare org Equinox notifies 21K patients and staff of data theft – Source: go.theregister.com
The Register Security
20/11/2024
China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer – Source: go.theregister.com
The Register Security
20/11/2024
Russian suspected Phobos ransomware admin extradited to US over $16M extortion – Source: go.theregister.com
The Register Security
20/11/2024
America’s drinking water systems have a hard-to-swallow cybersecurity problem – Source: go.theregister.com
The Register Security
20/11/2024
Palo Alto Networks tackles firewall-busting zero-days with critical patches – Source: go.theregister.com
The Register Security
20/11/2024
Navigating third-party risks – Source: go.theregister.com
The Register Security
20/11/2024
Crook breaks into AI biz, points $250K wire payment at their own account – Source:...
Hackerone
20/11/2024
How HackerOne Employees Stay Connected and Have Fun – Source:www.hackerone.com
Infosecurity Magazine
20/11/2024
CISA Chief Jen Easterly Set to Step Down on January 20 – Source: www.infosecurity-magazine.com
Infosecurity Magazine
20/11/2024
T-Mobile Breached in Major Chinese Cyber-Attack on Telecoms – Source: www.infosecurity-magazine.com
Security Boulevard
20/11/2024
5-Star Fraud: The FTC’s Ban on Fake Reviews – Source: securityboulevard.com
Security Boulevard
20/11/2024
Imperva and the Secure by Design Pledge: A Commitment to Cybersecurity Excellence – Source: securityboulevard.com
Security Boulevard
20/11/2024
EPA IG Office: ‘High-Risk’ Security Flaws in Hundreds of Water Systems – Source: securityboulevard.com
Security Boulevard
20/11/2024
DEF CON 32 – Breaching AWS Through Shadow Resources – Source: securityboulevard.com
Security Boulevard
20/11/2024
Randall Munroe’s XKCD ‘The Future of Orion’ – Source: securityboulevard.com
Security Boulevard
20/11/2024
Unraveling Raspberry Robin’s Layers: Analyzing Obfuscation Techniques and Core Mechanisms – Source: securityboulevard.com
Security Boulevard
20/11/2024
Why Shadow APIs provide a defenseless path for threat actors – Source: securityboulevard.com
Security Boulevard
20/11/2024
Ransomware is doubling down—What you need to know about the recent surge – Source: securityboulevard.com
Security Boulevard
20/11/2024
Adware on the rise—Why your phone isn’t as safe as you think – Source: securityboulevard.com
Security Boulevard
20/11/2024
DEF CON 32 – Bricked & Abandoned: How To Keep IoT From Becoming An IoTrash...
Dark Reading Security
20/11/2024
Linux Variant of Helldown Ransomware Targets VMware ESxi Systems – Source: www.darkreading.com
Dark Reading Security
20/11/2024
Russian Ransomware Gangs on the Hunt for Pen Testers – Source: www.darkreading.com
Latest Published Posts
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
ALPEREN UGURLU
Hospital Security is at Risk Penetration Tests
Hacker Combat
How Are Passwords Cracked?
PURPLESEC
How To Plan & Develop An Effective Cyber Security Strategy
CIS - Center for Internet Security
How to Plan a Cybersecurity Roadmap in Four Steps
Ministry of MOS Security
INFOSEC AWARENESS POSTERS
ACSC Australia
Information Security Manual
Kaspersky
Incident Response Playbook: Dark Web Breaches
Incident Handling Process (HTB)
ninjaOne
Endpoint Hardening Checklist
OWASP
Firmware Security Testing Methodology
HADESS
Important Active Directory Attribute
TALLIN UNIVERSITY OF TECHNOLOGY
Implementing a SOAR Solution in a Security Operations Center on the Example of Cybers
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
CheatSheet
Communication Protocols inIndustrial Control System/Operational Technology
Rajneesh Gupta
IAM Security CHECKLIST
BIS
Generative artificial intelligence and cyber securityin central banking
sqrrl
Hunt Evil
Centre for Cyber Security Belgium
HOW TO RESPOND TO A RANSOMWARE ATTACK IN 12 STEPS
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
DOYENSEC
Exploiting Client-Side Path Traversal
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
Azhar Ghafoor
Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform
IGNITE Technologies
A Detailed Guide on Covenant
CIS - Center for Internet Security
CIS Critical Security Controls
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
COMPREHENSIVE GUIDE ON SSH TUNNELING
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
DAN ELLIOTT
Crack the Code
YL VENTURES
CISO Reporting Landscape 2024
CYBER LEADERSHIP INSTITUTE
CISO PLAY BOOK
CISO Edition
Reporting Cyber Risk to Boards
certnz
MODERN APPROACHES TO NETWORK ACCESS SECURITY
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
LABCIBE
ESTADO DE LA CIBERSEGURIDAD EN COSTA RICA 2023
INCIBE & SPAIN GOVERNMENT
Nuevas normativas de 2024 de ciberseguridad para vehículos
NATIONAL DEMOCRATIC INSTITUTE
Manual de Ciberseguridad
INNOVERY
RESILIENCIA
Views: 13905