Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST CYBER NEWS
10
/
29
:
6:03 pm
:
New LightSpy Spyware Targets iOS with Enhanced Capabilities – Source: www.infosecurity-magazine.com
10
/
29
:
6:03 pm
:
Chenlun’s Evolving Phishing Tactics Target Trusted Brands – Source: www.infosecurity-magazine.com
10
/
29
:
6:03 pm
:
Law Enforcement Operation Takes Down Redline and Meta Infostealers – Source: www.infosecurity-magazine.com
10
/
29
:
6:03 pm
:
NIS2 Compliance Puts Strain on Business Budgets – Source: www.infosecurity-magazine.com
10
/
29
:
6:03 pm
:
Suspicious Social Media Accounts Deployed Ahead of COP29 – Source: www.infosecurity-magazine.com
10
/
29
:
6:03 pm
:
Five Eyes Agencies Launch Startup Security Initiative – Source: www.infosecurity-magazine.com
10
/
29
:
6:03 pm
:
ICO: 55% of UK Adults Have Had Data Lost or Stolen – Source: www.infosecurity-magazine.com
10
/
29
:
4:03 pm
:
Cisco Adaptive Security Appliance and Firepower Threat Defense Software SNMP Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com
10
/
29
:
4:03 pm
:
Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com
10
/
29
:
2:03 pm
:
Guest Essay: Wallarm report shows API exposures rose steeply across all industries in Q3 2024 – Source: www.lastwatchdog.com
10
/
29
:
2:03 pm
:
News alert: INE shares guidance to help companies invest in year-end cybersecurity, networking training – Source: www.lastwatchdog.com
10
/
29
:
2:03 pm
:
PlayBoy-Bande brüstet sich mit DIHK-Daten – Source: www.csoonline.com
10
/
29
:
2:03 pm
:
Securiti to help businesses build secure, compliant Gen AI with a new tool – Source: www.csoonline.com
10
/
29
:
2:03 pm
:
Atende refused to pay the ransom, and now pays the price – Source: www.csoonline.com
10
/
29
:
2:03 pm
:
5 cybersecurity issues at stake in next week’s US election – Source: www.csoonline.com
10
/
29
:
2:03 pm
:
Security outsourcing on the rise as CISOs seek cyber relief – Source: www.csoonline.com
10
/
29
:
2:03 pm
:
Anti-Mitarbeiterbindung: Was toxische CISOs anrichten – Source: www.csoonline.com
10
/
29
:
2:03 pm
:
Security researchers circumvent Microsoft Azure AI Content Safety – Source: www.csoonline.com
10
/
29
:
11:03 am
:
Augmenting Training Datasets Using Generative AI – Source:hackread.com
10
/
29
:
11:03 am
:
Lumma/Amadey: fake CAPTCHAs want to know if you’re human – Source: securelist.com
10
/
29
:
11:03 am
:
Innovator Spotlight: Cloud Range – Source: www.cyberdefensemagazine.com
10
/
29
:
11:03 am
:
How a CISO Should Brief the Board of Directors – Source: www.cyberdefensemagazine.com
10
/
29
:
10:04 am
:
Zenity Raises $38 Million to Secure Agentic AI – Source: www.securityweek.com
10
/
29
:
10:04 am
:
Fitness App Strava Gives Away Location of Biden, Trump and other Leaders, French Newspaper Says – Source: www.securityweek.com
10
/
29
:
10:04 am
:
How to Improve the Security of AI-Assisted Software Development – Source: www.securityweek.com
10
/
29
:
10:04 am
:
Canada Says Chinese Reconnaissance Scans Targeting Government Organizations – Source: www.securityweek.com
10
/
29
:
10:04 am
:
Apple Patches Over 70 Vulnerabilities Across iOS, macOS, Other Products – Source: www.securityweek.com
10
/
29
:
10:04 am
:
ChatGPT Jailbreak: Researchers Bypass AI Safeguards Using Hexadecimal Encoding and Emojis – Source: www.securityweek.com
10
/
29
:
10:04 am
:
Armis Raises $200M at $4.2B Valuation, Eyes IPO – Source: www.securityweek.com
10
/
29
:
10:04 am
:
Google Invests in Alternative Neutral Atom Quantum Technology – Source: www.securityweek.com
10
/
29
:
10:03 am
:
US Bans Investments Into Cutting-Edge Chinese Tech – Source: www.databreachtoday.com
10
/
29
:
10:03 am
:
Armis Secures $200M to Drive M&A and Federal Market Growth – Source: www.databreachtoday.com
10
/
29
:
10:03 am
:
Forrester’s 2025 Predictions: Gen AI Investments to Decline – Source: www.databreachtoday.com
10
/
29
:
10:03 am
:
Deepfake Phone Scams for Less Than a Dollar a Pop – Source: www.databreachtoday.com
10
/
29
:
10:03 am
:
How PowerSchool Builds Their AI/ML Apps with Snowflake – Source: www.databreachtoday.com
10
/
29
:
10:03 am
:
Why Shoring Up Cyber at Rural and Small Hospitals Is Urgent – Source: www.databreachtoday.com
10
/
29
:
10:03 am
:
Don’t Let a Third-Party Data Breach Destroy Your Institution’s Reputation – Source: www.databreachtoday.com
10
/
29
:
10:03 am
:
A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation – Source:thehackernews.com
10
/
29
:
10:03 am
:
Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus – Source:thehackernews.com
10
/
29
:
10:03 am
:
U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing – Source:thehackernews.com
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
DEVSECOPS
CISO2CISO Advisors recomended posts
N/A
Security Metrics & KPIs for Measuring SOC Success – Measure Up: How SOC Metrics Elevate...
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK: FIRST 100 DAYS Setting the CISO up for success
Microsoft
Microsoft Zero Trust Maturity Model
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
Marcos Jaimovich
Remember: Compliance is a checkbox, Real Cybersecurity is a journey.
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined...
CISO2CISO Advisors recomended posts
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original...
Codrut Andrei
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
ACSC Australia
Personal Cyber Security First Steps by Australian Government – ACSC
Unbound Security
The Cybersecurity Acronym Book
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
CISO STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
CYBER ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
SOC CSIRT OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
CYBERSECURITY TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
CYBERSECURITY VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
CYBERSECURITY MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
CYBER ORGANIZATIONS
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
CISO2CISO STRATEGIC VALLEY
Shawn Powers & Michael Jablonski
The Real Cyber War – The Political Economy of Internet Freedom by Shawn Powers &...
Google Cybersecurity Action Team
Perspectives on Security for the Board by Cybersecurity Action Team – Google Cloud – April...
Apress
Zero Trust Security – An Enterprise Guide – Jason Garbis & Jerry Chapman – apress
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips with cyber...
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial...
NSA
NSA CYBERSECURITY – YEAR IN REVIEW REPORT 2022. You must read IT !
CISO2CISO SOC OPERATIONS VALLEY
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
cybereason
Ransomware and the Modern SOC – How Ransomware is Driving the Requirements for SOC Modernization...
PICUS
The Complete Active Directory Security Handbook – Exploitation – Detection and Migitation Strategies by PICUS
Maddie Stone - Google
0-days Detected in-the-Wild in 2022 – Year in Review – Maddie Stone – Zer0Con 2023...
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
OAS
Practical Guide for CSIRTs by OAS – A Sustainable Business Model.
aws
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
LATEST CYBER NEWS
Infosecurity Magazine
29/10/2024
New LightSpy Spyware Targets iOS with Enhanced Capabilities – Source: www.infosecurity-magazine.com
Infosecurity Magazine
29/10/2024
Chenlun’s Evolving Phishing Tactics Target Trusted Brands – Source: www.infosecurity-magazine.com
Infosecurity Magazine
29/10/2024
Law Enforcement Operation Takes Down Redline and Meta Infostealers – Source: www.infosecurity-magazine.com
Infosecurity Magazine
29/10/2024
NIS2 Compliance Puts Strain on Business Budgets – Source: www.infosecurity-magazine.com
Infosecurity Magazine
29/10/2024
Suspicious Social Media Accounts Deployed Ahead of COP29 – Source: www.infosecurity-magazine.com
Infosecurity Magazine
29/10/2024
Five Eyes Agencies Launch Startup Security Initiative – Source: www.infosecurity-magazine.com
Infosecurity Magazine
29/10/2024
ICO: 55% of UK Adults Have Had Data Lost or Stolen – Source: www.infosecurity-magazine.com
Cisco Security Blog
29/10/2024
Cisco Adaptive Security Appliance and Firepower Threat Defense Software SNMP Denial of Service Vulnerability –...
Cisco Security Blog
29/10/2024
Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability...
The Last Watchdog
29/10/2024
Guest Essay: Wallarm report shows API exposures rose steeply across all industries in Q3 2024...
The Last Watchdog
29/10/2024
News alert: INE shares guidance to help companies invest in year-end cybersecurity, networking training –...
CSO - Online
29/10/2024
PlayBoy-Bande brüstet sich mit DIHK-Daten – Source: www.csoonline.com
CSO - Online
29/10/2024
Securiti to help businesses build secure, compliant Gen AI with a new tool – Source:...
CSO - Online
29/10/2024
Atende refused to pay the ransom, and now pays the price – Source: www.csoonline.com
CSO - Online
29/10/2024
5 cybersecurity issues at stake in next week’s US election – Source: www.csoonline.com
CSO - Online
29/10/2024
Security outsourcing on the rise as CISOs seek cyber relief – Source: www.csoonline.com
CSO - Online
29/10/2024
Anti-Mitarbeiterbindung: Was toxische CISOs anrichten – Source: www.csoonline.com
CSO - Online
29/10/2024
Security researchers circumvent Microsoft Azure AI Content Safety – Source: www.csoonline.com
Hackread
29/10/2024
Augmenting Training Datasets Using Generative AI – Source:hackread.com
securelist.com
29/10/2024
Lumma/Amadey: fake CAPTCHAs want to know if you’re human – Source: securelist.com
cyberdefense magazine
29/10/2024
Innovator Spotlight: Cloud Range – Source: www.cyberdefensemagazine.com
cyberdefense magazine
29/10/2024
How a CISO Should Brief the Board of Directors – Source: www.cyberdefensemagazine.com
securityweek.com
29/10/2024
Zenity Raises $38 Million to Secure Agentic AI – Source: www.securityweek.com
securityweek.com
29/10/2024
Fitness App Strava Gives Away Location of Biden, Trump and other Leaders, French Newspaper Says...
Latest Published Posts
The Claroty Research Team
EVIL PLC ATTACK
EU AI Act – EU 2024/1689
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Bird&Bird
General Data Protection Regulation (GDPR) Guide
Microsoft
GDPR & Generative AI
GDPR
GDPR for Third-party Risk Management
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
Gartner
Gartner Security & Risk Management Summit
FS.ISAC
Navigating Cyber
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Thecyphere
How to Manage Cyber Incidents?
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
CISO STRATEGICS
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Privacy
Risk & Compliance
Resilience
Social Engineering
Osint - Humint
CYBER ARCHITECTURE
IOT Security
MAC-OS Security
Metaverse Security
Mitre Att&ck
Mobile & 5G Security
Network Security
NIST Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT OPERATIONS
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Mallware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY TOOLS
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY VENDORS
Fortinet
Guardicore
IBM
Mcafee - Trellix
Mandiant
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY MSSP
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CYBER REGULATIONS
PCI - DSS
ISO 27001
SOX
CYBER ORGANIZATIONS
NSA
NIST
SANS
WEF
EVENTS & CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
USERS MOST VOTED POST
The Hacker News
Cybersecurity CISOs priorities in 2021: focus and return to the basics
FUTURUM - SPLUNK
How to design your Security Operations Center (SOC) to work smarter, not harder.
hackercombat
The Ultimate Web Application Penetration Testing Checklist by Hackercombat
HADESS
DDos Attacks Methods & Mitigations by Hadess
PLEXTRAC
Effective Purple Teaming by PlexTrac
PALADION CYBER DEFENSE
45 SIEM Use Cases for Security Monitoring by Paladion Cyber Defense.
CSA Singapure
Guide to Cyber Threat Modelling by CSA Singapure
U.S. Department of Defense
Cybersecurity Resources and References Guide by U.S. Department of Defense
NCSC
Guidance for Reducing data exfiltration by malicious insiders by National Cyber Security Centre (NCSC)
NIST
Guide to a Secure Enterprise Network Landscape NIST SP 800-215
Boston Consulting Group
Turning a Cybersecurity Strategy Into Reality – A Holistic Performance Management Framework by Boston Consulting...
SecurityScorecard
A Deep Dive into Black Basta Ransomware by SecurityScorecard
National Cyber Security Centre
Joint Ventures in the Construction Sector – Information Security Best Practice Guidance by National Cyber...
cybereason
Ransomware The True Cost to Business 2022 – A Global Study on Ransomware Business Impact...
KPMG
The Seven ways of the agile CISO – Cyber security leadership in the age by...
Ministry of Digital - Greece
CYBERSECURITY HANDBOOK – Best practices for the protection and resilience of network and information systems...
Telefonica Tech & Nozomi Networks
Cybersecurity in OT Environments – Case Study in the Oil & Gas Sector by Telefonica...
snyk
The State of Cloud Security Report 2022 – A report on the cloud risks and...
Practical DevSecOps
You are probably doing DevSecOps Wrong by Practical DevSecOps – DevSecOps can seem like a...
odaseva
The State of SaaS Ransomware Attack Preparedness – A survey of cloud data decision makers...
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
LATEST CYBER NEWS
securityweek.com
29/10/2024
How to Improve the Security of AI-Assisted Software Development – Source: www.securityweek.com
securityweek.com
29/10/2024
Canada Says Chinese Reconnaissance Scans Targeting Government Organizations – Source: www.securityweek.com
securityweek.com
29/10/2024
Apple Patches Over 70 Vulnerabilities Across iOS, macOS, Other Products – Source: www.securityweek.com
securityweek.com
29/10/2024
ChatGPT Jailbreak: Researchers Bypass AI Safeguards Using Hexadecimal Encoding and Emojis – Source: www.securityweek.com
securityweek.com
29/10/2024
Armis Raises $200M at $4.2B Valuation, Eyes IPO – Source: www.securityweek.com
securityweek.com
29/10/2024
Google Invests in Alternative Neutral Atom Quantum Technology – Source: www.securityweek.com
Data Breach Today
29/10/2024
US Bans Investments Into Cutting-Edge Chinese Tech – Source: www.databreachtoday.com
Data Breach Today
29/10/2024
Armis Secures $200M to Drive M&A and Federal Market Growth – Source: www.databreachtoday.com
Data Breach Today
29/10/2024
Forrester’s 2025 Predictions: Gen AI Investments to Decline – Source: www.databreachtoday.com
Data Breach Today
29/10/2024
Deepfake Phone Scams for Less Than a Dollar a Pop – Source: www.databreachtoday.com
Data Breach Today
29/10/2024
How PowerSchool Builds Their AI/ML Apps with Snowflake – Source: www.databreachtoday.com
Data Breach Today
29/10/2024
Why Shoring Up Cyber at Rural and Small Hospitals Is Urgent – Source: www.databreachtoday.com
Data Breach Today
29/10/2024
Don’t Let a Third-Party Data Breach Destroy Your Institution’s Reputation – Source: www.databreachtoday.com
The Hacker News
29/10/2024
A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation – Source:thehackernews.com
The Hacker News
29/10/2024
Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus – Source:thehackernews.com
The Hacker News
29/10/2024
U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing – Source:thehackernews.com
The Hacker News
29/10/2024
New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors – Source:thehackernews.com
Mcafee Security
29/10/2024
How To Survive the Deepfake Election with McAfee’s 2024 Election AI Toolkit – Source:www.mcafee.com
Dark Reading Security
29/10/2024
Sophos-SecureWorks Deal Focuses on Building Advanced MDR, XDR Platform – Source: www.darkreading.com
Dark Reading Security
29/10/2024
Windows ‘Downdate’ Attack Reverts Patched PCs to a Vulnerable State – Source: www.darkreading.com
Dark Reading Security
29/10/2024
China’s Elite Cyber Corps Hone Skills on Virtual Battlefields – Source: www.darkreading.com
Dark Reading Security
29/10/2024
Delta Launches $500M Lawsuit Against CrowdStrike – Source: www.darkreading.com
Dark Reading Security
29/10/2024
Russia Kneecaps Ukraine Army Recruitment With Spoofed ‘Civil Defense’ App – Source: www.darkreading.com
Dark Reading Security
29/10/2024
Mozilla: ChatGPT Can Be Manipulated Using Hex Code – Source: www.darkreading.com
Latest Published Posts
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Thecyphere
How to Manage Cyber Incidents?
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
UpGuard
A Complete Guide to Data Breaches
Incibe
Ciberseguridad en Smart Toys
INCIBE & SPAIN GOVERNMENT
Defensa de endpoints en sistemas de control industrial
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
ThreatMon
GLOBAL CYBER THREAT REPORT
Gary Hinson
Getting started withsecurity metrics
CAPACITACION USACH
Gestión de Riesgos de Ciberseguridad
EDPS
Generative AI and the EUDPR.
Bright
2024 Guide to Application Security Testing Tools
CSA Singapure
GUIDE TO CYBER THREAT MODELLING
HADESS
Hacker Culture
Open Sec
HACKING API
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
ALPEREN UGURLU
Hospital Security is at Risk Penetration Tests
Hacker Combat
How Are Passwords Cracked?
LATEST CYBER NEWS
The Register Security
29/10/2024
Five Eyes nations tell tech startups to take infosec seriously. Again – Source: go.theregister.com
The Register Security
29/10/2024
Wanted. Top infosec pros willing to defend Britain on shabby salaries – Source: go.theregister.com
The Register Security
29/10/2024
JPMorgan Chase sues scammers following viral ‘infinite money glitch’ – Source: go.theregister.com
The Register Security
29/10/2024
Feds investigate China’s Salt Typhoon amid campaign phone hacks – Source: go.theregister.com
The Register Security
29/10/2024
Brazen crims selling stolen credit cards on Meta’s Threads – Source: go.theregister.com
The Register Security
29/10/2024
Delta officially launches lawyers at $500M CrowdStrike problem – Source: go.theregister.com
The Register Security
29/10/2024
Dutch cops pwn the Redline and Meta infostealers, leak ‘VIP’ aliases – Source: go.theregister.com
Cisco Security Blog
29/10/2024
Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Cross-Site Scripting...
Cisco Security Blog
29/10/2024
Cisco Secure Firewall Management Center Software SQL Injection Vulnerability – Source:sec.cloudapps.cisco.com
Hacker Combat
29/10/2024
How to Protect Against Ransomware Attacks? – Source:www.hackercombat.com
Hackerone
29/10/2024
Introducing My Programs – Source:www.hackerone.com
Hackerone
29/10/2024
Launching the Hacker Calendar, Never Miss a Challenge Again – Source:www.hackerone.com
Hackerone
29/10/2024
EU-FOSSA 2 Open Source Bug Bounty Programme Series | Q&A – Source:www.hackerone.com
Hackerone
29/10/2024
Riot Games Surpasses 1,000 Valid Reports: Q&A – Source:www.hackerone.com
Schneier on Security
29/10/2024
Criminals Are Blowing up ATMs in Germany – Source: www.schneier.com
Security Boulevard
29/10/2024
The SaaS Governance Gap | Grip Security – Source: securityboulevard.com
Security Boulevard
29/10/2024
Outdated SOAR Is Putting Your Organization at Risk – Source: securityboulevard.com
Security Boulevard
29/10/2024
News alert: INE shares guidance to help companies invest in year-end cybersecurity, networking training –...
Security Boulevard
29/10/2024
INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs –...
Security Boulevard
29/10/2024
DEF CON 32 – AppSec Village – BOLABuster-Harnessing LLMs for Automating BOLA Detection – Source:...
Security Boulevard
29/10/2024
NTT Data Taps Palo Alto Networks for MXDR Service – Source: securityboulevard.com
Security Boulevard
29/10/2024
NIS2 Arrives with Major Changes to EU SaaS Cybersecurity – Source: securityboulevard.com
Security Boulevard
29/10/2024
Data Masking Challenges: Overcoming Complexities in Multi-Database Environments – Source: securityboulevard.com
Security Boulevard
29/10/2024
Randall Munroe’s XKCD ‘Sandwich Helix’ – Source: securityboulevard.com
Security Boulevard
29/10/2024
Top 10 Valimail Alternatives: A Complete Comparison with Pros & Cons – Source: securityboulevard.com
Cyble Blog
29/10/2024
U.S. Agencies Investigate China-Linked Telecom Hacks Targeting High-Profile Politicians – Source:cyble.com
Cyble Blog
29/10/2024
New Vulnerabilities Identified in Philips Smart Lighting and Matrix Door Controller – Source:cyble.com
SecurityAffairs.com
29/10/2024
France’s second-largest telecoms provider Free suffered a cyber attack – Source: securityaffairs.com
SecurityAffairs.com
29/10/2024
A crime ring compromised Italian state databases reselling stolen info – Source: securityaffairs.com
SecurityAffairs.com
29/10/2024
Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain – Source: securityaffairs.com
SecurityAffairs.com
29/10/2024
Black Basta affiliates used Microsoft Teams in recent attacks – Source: securityaffairs.com
Hackread
28/10/2024
Apple Launches ‘Apple Intelligence’ and Offers $1M Bug Bounty for Security – Source:hackread.com
Hackread
28/10/2024
INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs –...
Hackread
28/10/2024
Russian Court Jails Four REvil Ransomware Gang Members – Source:hackread.com
Hackread
28/10/2024
TeamTNT Exploits 16 Million IPs in Malware Attack on Docker Clusters – Source:hackread.com
The Hacker News
28/10/2024
Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services – Source:thehackernews.com
The Hacker News
28/10/2024
Russian Espionage Group Targets Ukrainian Military with Malware via Telegram – Source:thehackernews.com
The Hacker News
28/10/2024
BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers – Source:thehackernews.com
Hackerone
28/10/2024
Securing Our Elections Through Vulnerability Testing and Disclosure – Source:www.hackerone.com
Hackerone
28/10/2024
FanDuel’s Liam Somerville on Prioritising Researchers as an Extension of the Security Team – Source:www.hackerone.com
Latest Published Posts
Incident Handling Process (HTB)
ninjaOne
Endpoint Hardening Checklist
OWASP
Firmware Security Testing Methodology
HADESS
Important Active Directory Attribute
TALLIN UNIVERSITY OF TECHNOLOGY
Implementing a SOAR Solution in a Security Operations Center on the Example of Cybers
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
CheatSheet
Communication Protocols inIndustrial Control System/Operational Technology
Rajneesh Gupta
IAM Security CHECKLIST
BIS
Generative artificial intelligence and cyber securityin central banking
sqrrl
Hunt Evil
Centre for Cyber Security Belgium
HOW TO RESPOND TO A RANSOMWARE ATTACK IN 12 STEPS
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
DOYENSEC
Exploiting Client-Side Path Traversal
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
Azhar Ghafoor
Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform
IGNITE Technologies
A Detailed Guide on Covenant
CIS - Center for Internet Security
CIS Critical Security Controls
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
COMPREHENSIVE GUIDE ON SSH TUNNELING
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
DAN ELLIOTT
Crack the Code
YL VENTURES
CISO Reporting Landscape 2024
CYBER LEADERSHIP INSTITUTE
CISO PLAY BOOK
CISO Edition
Reporting Cyber Risk to Boards
certnz
MODERN APPROACHES TO NETWORK ACCESS SECURITY
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
LABCIBE
ESTADO DE LA CIBERSEGURIDAD EN COSTA RICA 2023
INCIBE & SPAIN GOVERNMENT
Nuevas normativas de 2024 de ciberseguridad para vehículos
NATIONAL DEMOCRATIC INSTITUTE
Manual de Ciberseguridad
INNOVERY
RESILIENCIA
ACSC Australia
Choosing secureand verifiable technologies
CEH
Certifications Preparation Guide
Center for Security Studies (CSS)
CYBERDEFENSE REPORT
Sandhya Kaushik
Checklist for Securing Your Android Apps
SentinelLABS
CHAMELGANG & FRIENDS | CYBERESPIONAGE GROUPS ATTACKING CRITICAL INFRASTRUCTURE WITH RANSOMWARE
aDvens
May Cyber Threat Intelligence monthly report
CCN
Guía de Seguridad de las TIC CCN-STIC 885A
Insikt Group
Caught in the Net
IGNITE Technologies
BURP SUITE FOR PENTESTER TURBO INTRUDER
Views: 13062