CISO2CISO.COM & CYBER SECURITY GROUP
Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO.COM
From Cyber Technicals to C-Levels Cyber Advisors.
The Most Complete Reference & News Site For The Global Cyber Community.
Cyber Security Stories & News
HOT & DAILY UPDATED
Cyber Security Stories & News
CISO´s Notepad & Pappers
MOST POPULAR
Attacks
Cyber Attacks
Data Breaches
Vulnerabilities
Malware
About US
Account Login
Register
Login
Password Reset
CISO2CISO Last Published Stories
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
20/12/2022
CISA
Insider Threat Mitigation Guide by Cybersecurity Insfrastructure Security Agency
20/12/2022
ACFE
ANTI-FRAUD PLAYBOOK – THE BEST DEFENSES IS A GOOD OFFENSE BY ACFE –...
19/12/2022
OECD Publishing
ROUTING SECURITY – BGP INCIDENTS, MITIGATION, TECHNIQUES AND POLICY ACTIONS BY OECD
19/12/2022
NSA
NSA CYBERSECURITY – YEAR IN REVIEW REPORT 2022. You must read IT !
19/12/2022
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
16/12/2022
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats 2022 by Tushar Subhra...
02/12/2022
National Cyber Crime Agencie
Manual on Social Media Intelligence (SOCMINT) for Law Enforcement Agencies by National Cyber...
20/11/2022
Wallarm
DevOps Tools and Insfrastructure Under Attack by Wallarm
18/11/2022
Data Breach Today
Massive Ransomware Campaign Targets VMware ESXi Servers
05/02/2023
Data Breach Today
Cyber Insurer Sees Remote Access, Cloud Databases Under Fire
04/02/2023
Data Breach Today
Indian Official Highlights Djvu Ransomware as Threat
04/02/2023
Data Breach Today
IBM Security GM on Seeing a Target Through the Hacker’s Eyes
04/02/2023
Data Breach Today
Hackers Posing as Ukrainian Ministry Deploy Info Stealers
04/02/2023
Data Breach Today
CrowdStrike CEO on Why It’s Tough to Defend Sensitive Assets
04/02/2023
Data Breach Today
Webinar | 6 Ways to Cut Costs with a Zero Trust Architecture
03/02/2023
Data Breach Today
ISMG Editors: Does US Takedown Mark Hive Group’s Demise?
03/02/2023
IST
MAPPING THE RANSOMWARE PAYMENT ECOSYSTEM BY ZOE BRAMMER – IST Institute of Security...
18/11/2022
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
17/11/2022
esset
ESSET THREAT REPORT T2 2022
17/11/2022
OECD Publishing
SECURITY OF THE DOMAIN NAME SYSTEM (DNS) – AN INTRODUCTION FOR POLICY MAKERS
17/11/2022
SecurityGen
Telecom Cybersecurity – 5G Protection Use Cases by SecurityGen
17/11/2022
HornetSecurity
THE 2022 HORNETSECURITY RANSOMWARE ATTACKS ANALYSIS
17/11/2022
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
17/11/2022
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips...
09/11/2022
Ankit Pangasa
Security Protocols – SSL vs TLS – ALL YOU NEED TO KNOW.
06/11/2022
Data Breach Today
Wiz CEO on the Need to Consolidate Cloud Security Technology
03/02/2023
Data Breach Today
World Economic Forum’s Cybersecurity Outlook 2023 Highlights
03/02/2023
Data Breach Today
Proofpoint CEO on Thwarting Post-Compromise Lateral Movement
03/02/2023
Data Breach Today
Live Webinar | Move Fast, Don’t Break Things! The Truth About IAM, VPN...
03/02/2023
Data Breach Today
Live Webinar | Hacking Multifactor Authentication: An IT Pro’s Lessons Learned After Testing...
03/02/2023
Data Breach Today
Dragos CEO on Opening Execs’ Eyes to OT Security Threats
03/02/2023
Data Breach Today
Feds Smack Banner Health With $1.25 Million Fine in Breach
03/02/2023
Data Breach Today
Scottish Schools’ Use of Facial Recognition Violated GDPR
03/02/2023
EKOPARTY SECURITY CONFERENCE
#EKOPARTY2022 – Ekoparty is a technical security conference born in 2001. +3000 guests, single...
04/11/2022
CISO2CISO ToolBox Series
CISO2CISO Toolbox Series – Cyber Security Blogs / Cyber Security RSS Feeds List...
03/11/2022
Canadian Centre for CyberSecurity
BASELINE CYBER SECURITY CONTROLS FOR SMALL AND MEDIUM ORGANIZATIONS V1.2 by Canadian Centre...
27/10/2022
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures –...
27/10/2022
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by...
27/10/2022
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security...
25/10/2022
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader...
25/10/2022
ANSSI & CCA France
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest...
25/10/2022
PICUS
ILLUMINATING DARKSIDE – TTPs, Tools, and the Trend Towards Defense Evasion by PICUS
25/10/2022
Data Breach Today
How Much Did BonqDAO Lose in Smart Contracts Hack?
03/02/2023
Data Breach Today
The Troublemaker CISO: Defending Against Insider Threat
02/02/2023
Data Breach Today
‘No Pineapple’ Hacking Campaign Reveals North Korean Toolkit
02/02/2023
Data Breach Today
Ransomware Gang Stole Customer Data, Arnold Clark Confirms
02/02/2023
Data Breach Today
Okta Lays Off 300 Employees After Sales Execution Challenges
02/02/2023
Data Breach Today
FTC Hits Firm With $1.5M Fine in Health Data-Sharing Case
02/02/2023
Data Breach Today
Banner Year for North Korean Cryptocurrency Hacking
02/02/2023
Data Breach Today
Tanium Taps Tibco CEO Dan Streetman to Replace Orion Hindawi
02/02/2023
BONI YEAMIN
OPEN SOURCE SOC TOOLS BY BONI YEAMIN
25/10/2022
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced...
25/10/2022
varonis
Pentesting Active Directory Environments by VARONIS
25/10/2022
WILEY
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech...
25/10/2022
iapp
2022 PRIVACY TECH VENDOR REPORT by IAPP
25/10/2022
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
25/10/2022
Microsoft Security
Microsoft Implements Brute Force Attack Protection for All Windows Versions – As of...
12/10/2022
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies...
10/10/2022
ENDGAME
KERNEL MODE THREATS AND PRACTICAL DEFENSES BY Joe Desimone and Ganriel Landau –...
09/10/2022
CISO2CISO Most Viewed & Popular Stories
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
17/11/2022
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips...
09/11/2022
Codrut Andrei
Secure Software Development Lifecycle Fundamentals by Codrut Andrei
29/08/2022
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
26/08/2022
Jon Radoff
The Metaverse Value Chain – The Seven Layers of the Metaverse by Jon Radoff
09/08/2022
Americn Public Power A.
Public Power Cyber Incident Response Playbook by American Public Power Association
09/08/2022
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
09/08/2022
ALLIANZ
Allianz 2022 Risk Barometer – The most important business risks for the next...
07/08/2022
CHECKPOINT RESEARCH
Checkpoint Cyber Attack Trend 2022 Mid Year Report by Check Point Research
06/08/2022
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP – AZURE by Joas Antonio
05/08/2022
Codrut Andrei
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
03/08/2022
Cyber Rescue Alliance
The Best Cyber Insights of 2022 by The Cyber Rescue Alliance
02/08/2022
Chris Davis
Blue Team Cheat Sheets by Chris Davis
02/08/2022
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
01/08/2022
OCCUPYTHEWEB
Linux Basics for Hackers by Occupytheweb
31/07/2022
Apress
Jump-start Your SOC Analyst Career – A Roadmap to Cybersecurity Success by Apress
31/07/2022
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
31/07/2022
Microsoft
Microsoft Zero Trust Maturity Model
31/07/2022
Nathalie Cole
How Much 10 Companies Paid Their Virtual CISO Service in 2022 Benchmark by...
30/07/2022
WILEY
Cybercrime Investigators Handbook by WILEY
30/07/2022
NSA
NSA Network Infrastructure Security Guidance V1.0 March 2022
30/07/2022
ENISA
TELECOM SECURITY INCIDENTS REPORT 2021 BY ENISA
30/07/2022
RedHat
State of Kubernetes Security Report 2022 by RedHat
29/07/2022
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
29/07/2022
IBM Security
How much does a data breach cost in 2022? IBM Cost of a...
27/07/2022
FIRE EYE
The Cyber Risk Playbook – What boards of directors and executives should know...
25/07/2022
Unbound Security
The Cybersecurity Acronym Book
20/07/2022
Ciso Council
CISO Security Officer Handbook
17/07/2022
Splunk
Top 50 Security Threats by Splunk
17/07/2022
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
12/07/2022
iSMG
RSA Conference 2022 Compendium: 150+ Interviews and More by SMG
11/07/2022
Verizon
Verizon 2022 DBIR Data Breach Investigations Report
10/07/2022
Gartner
Gartner Unveils the Top Eight Cybersecurity Predictions for 2022-23
28/06/2022
SentinelOne
90 DAYS A CISO´s Journey to Impact define your role !!
21/06/2022
help net security
Compliance does not equal security !!
21/10/2021
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
05/09/2021
Last Cyber Security News
Data Breach Today
Scottish Schools’ Use of Facial Recognition Violated GDPR
03/02/2023
Data Breach Today
How Much Did BonqDAO Lose in Smart Contracts Hack?
03/02/2023
The Register
Super Bock says ‘cyber’ nasty ‘disrupting computer services’
02/02/2023
Data Breach Today
The Troublemaker CISO: Defending Against Insider Threat
02/02/2023
Data Breach Today
‘No Pineapple’ Hacking Campaign Reveals North Korean Toolkit
02/02/2023
Data Breach Today
Ransomware Gang Stole Customer Data, Arnold Clark Confirms
02/02/2023
Data Breach Today
OpenEMR Flaws Could Allow Attackers to Steal Data, More
01/02/2023
Data Breach Today
CISA to Set Up New Office for Supply Chain Security
01/02/2023
Data Breach Today
Skyrocketing Cyber Insurance Premium Growth May Slow
01/02/2023
Data Breach Today
Founder Sachin Nayyar Back as CEO of Identity Vendor Saviynt
31/01/2023
Data Breach Today
Russian Sandworm APT Adds New Wiper to Its Arsenal
31/01/2023
Data Breach Today
Are We Doomed? Not If We Focus on Cyber Resilience
31/01/2023
Data Breach Today
Tenable’s $25M Venture Capital Fund Seeks Early-Stage Firms
31/01/2023
Data Breach Today
HHS, AHA Warn of Surge in Russian DDoS Attacks on Hospitals
31/01/2023
Data Breach Today
JD Sports Details Data Breach Affecting 10 Million Customers
30/01/2023
csonline
Timeline of the latest LastPass data breaches
30/01/2023
csonline
The CSO guide to top security conferences
30/01/2023
The Hacker News
Gootkit Malware Continues to Evolve with New Components and Obfuscations
30/01/2023
The Hacker News
Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices
30/01/2023
csonline
Economic headwinds could deepen the cybersecurity skills shortage
30/01/2023
The Hacker News
Titan Stealer: A New Golang-Based Information Stealer Malware Emerges
30/01/2023
csonline
How to survive below the cybersecurity poverty line
30/01/2023
CSH CYBER SECURITY HUB
Prevent advanced ransomware attacks with good email security
30/01/2023
The Guardian UK
Medibank hacker says ransom demand was US$10m as purported abortion health records posted
30/01/2023
The Guardian UK
Is it worth taking out personal cyber insurance in case you are caught...
30/01/2023
The Guardian UK
Medibank hackers announce ‘case closed’ and dump huge data file on dark web
30/01/2023
The Guardian UK
Password app LastPass hit by cybersecurity breach but says data remains safe
30/01/2023
The Guardian UK
I am a Medibank customer. Am I affected by the cyber-attack? What can...
30/01/2023
The Guardian UK
Telstra sorry for publishing up to 130,000 customers’ details online
30/01/2023
The Guardian UK
TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hack
30/01/2023
The Guardian UK
Clare O’Neil on national security amid cyber hacks and threats to democracy
30/01/2023
The Guardian UK
What is LockBit ransomware and how does it operate?
30/01/2023
The Guardian UK
MP calls for action on crime in ‘under siege’ town – as it...
30/01/2023
The Guardian UK
US authorities seize servers for Hive ransomware group
30/01/2023
The Guardian UK
Australia to consider European-style right to be forgotten privacy laws
30/01/2023
The Guardian UK
Fake text messages on the rise, but experts warn Australians most losses are...
30/01/2023
The Guardian UK
JD Sports hit by cyber-attack that leaked 10m customers’ data
30/01/2023
Data Breach Today
Ukraine Links Media Center Attack to Russian Intelligence
29/01/2023
The Hacker News
Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of...
28/01/2023
The Hacker News
Microsoft Urges Customers to Secure On-Premises Exchange Servers
28/01/2023
Data Breach Today
Ransomware Profits Dip as Fewer Victims Pay Extortion
28/01/2023
Data Breach Today
What Makes Sumo Logic an Appealing Target for Private Equity
28/01/2023
Data Breach Today
Why Healthcare Orgs Must Prioritize 3rd-Party Risk Management
28/01/2023
Data Breach Today
Targets of Opportunity: How Ransomware Groups Find Victims
28/01/2023
Data Breach Today
Securing the SaaS Layer
28/01/2023
Data Breach Today
David Derigiotis on the Complex World of Cyber Insurance
28/01/2023
Data Breach Today
Protecting the Hidden Layer in Neural Networks
28/01/2023
Data Breach Today
The Persisting Risks Posed by Legacy Medical Devices
28/01/2023
The Hacker News
Gootkit Malware Continues to Evolve with New Components and Obfuscations
Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices
Titan Stealer: A New Golang-Based Information Stealer Malware Emerges
Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge
Microsoft Urges Customers to Secure On-Premises Exchange Servers
Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort
Threatpost
Google Patches Chrome’s Fifth Zero-Day of the Year
iPhone Users Urged to Update to Patch 2 Zero-Days
Fake Reservation Links Prey on Weary Travelers
Firewall Bug Under Active Attack Triggers CISA Warning
Twitter Whistleblower Complaint: The TL;DR Version
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Naked Security
Hive ransomware servers shut down at last, says FBI
Dutch suspect locked up for alleged personal data megathefts
S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text]
Multi-million investment scammers busted in four-country Europol raid
S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text]
Serious Security: Unravelling the LifeLock “hacked passwords” story
Cyber Security Hub
Prevent advanced ransomware attacks with good email security
The top XDR investment decisions for CISOs
Banking Trojan apocalypse: how hackers are stealing millions
How to foster secure and efficient data practices
Why good email security is essential for every business
Adopting GRC and cyber security to help facilitate enterprise risk management
CISO2CISO Last Published Stories
NHTSA
Cybersecurity Best Practices for the Safety of Modern Vehicles – Updatd 2022 by...
09/10/2022
CLOUDFLARE
Simplifying the way we protect SaaS applications – How to protect users and...
09/10/2022
Virusbulletin.com
LAZARUS AND BYOVD – EVIL TO THE WINDOWS CORE By Peter Kalnai –...
09/10/2022
Alejandro Corletti - Darfe.es
Libro Ciberseguridad – Una estrategia Informatica-Militar by Alejandro Corletti Estrada – darfE.es
09/10/2022
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
08/10/2022
HADESS
TALE OF PHIHING – Some Phishing Techniques & Awareness by HADESS.IO
08/10/2022
Cobalt
The Estate of Pentesting 2022 by Cobalt
08/10/2022
CheckPoint
KEEPING YOUR EMAIL SECURE – WHO DOES IT BEST ? A Especial analysis...
07/10/2022
Cybersecurity Top Youtube Channels
Cybersecurity 85 Top Youtube Channels on Github.com
06/10/2022
Salman Abdulkarim
AWS Cloud Security – The AWS Shared Responsibility Model by Salman Abdulkarim
05/10/2022
Cynalytica
5 Targets Hackers Look for When Attacking an OT Network by Cynalytica
04/10/2022
rpi
THE IoT LANDSCAPE – The next decade of the Internet of Things by...
04/10/2022
FORTINET
A Solution Guide to Operational Technology (OT) Cybersecurity by Fortinet – The “air...
04/10/2022
Victoria Beckman - Microsoft
Ransomware as a service (RaaS) – An explainer guide to cybercrime´s newest business...
04/10/2022
SCF
Secure & Privacy by Design Principles Framework & Security & Privacy Capability Maturity...
04/10/2022
APPLIED INCIDENT RESPONSE
Windows Event Security Log Analysis
04/10/2022
CAREER UP
7 Steps to your Cybersecurity Career – How to begin your career in...
02/10/2022
Aristeidis Michail
Security Operations Center – A Business Perspective by Aristeidis Michail
01/10/2022
IGNITE Technologies
RDP Penetration Testing by IGNITE Technologies
01/10/2022
Joas Antonio
Windows Persistence Techniques by Joas Antonio
01/10/2022
ALEX SIDORENKO & ELENA DEMIDENKO
GUIDE TO EFFECTIVE RISK MANAGEMENT 3.0 – ALEX SIDORENKO – ELENA DEMIDENKO
01/10/2022
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG...
01/10/2022
CSA Cloud Security Alliance
SaaS Governance Best Practices Cloud by CSA Cloud Security Alliance
01/10/2022
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY...
01/10/2022
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server
30/09/2022
PWC
2022 Global Digital Trust Insights – The C-suite guide to simplifyng for cyber...
30/09/2022
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
29/09/2022
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for...
28/09/2022
odaseva
The State of SaaS Ransomware Attack Preparedness – A survey of cloud data...
28/09/2022
CIS
CIS Critical Security Controls Version 8 – Mapping to PCI Data Security Standar...
28/09/2022
Microsoft
Windows 11 Security Book – Powerful security from chip to cloud – Built...
27/09/2022
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and...
27/09/2022
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect,...
26/09/2022
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark...
26/09/2022
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment ,...
26/09/2022
ECIIA
2023 RISK IN FOCUS – Hot topics for internal auditors by ECIIA –...
26/09/2022
CISO2CISO Most Viewed & Popular Stories
Dr. Erdal Ozkaya
Hiring a CISO – Super Guide for startups by Erdal Ozkaya
26/09/2022
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and...
26/09/2022
Argentina
Propuesta de Anteproyecto de Ley de Proteccion de Datos Personales – Ley 25326...
26/09/2022
NSA and NISA
Control System Defense – Know the Opponent by NSA and NISA
26/09/2022
Cencys
2022 State of the internet report by cencys
25/09/2022
O´REILLY
10 Steps Every CISO Should Take to Secure Next-Gen Software by Cindy Blake...
25/09/2022
TRIMARC
10 WAYS TO IMPROVE AD SECURITY QUICKLY – list of widely applicable “easy”...
25/09/2022
Packt
Guia de Implementacion y Estrategia de Azure cuarta edicion by Packt
25/09/2022
Practical DevSecOps
You are probably doing DevSecOps Wrong by Practical DevSecOps – DevSecOps can seem...
25/09/2022
TACTICX
Offensive Microsoft Active Directory 101 – Security Holes Everywere by TACTICX – Active...
24/09/2022
BARRACUDA
The State of Industrial Security in 2022 by Barracuda – Insecure remote access,...
23/09/2022
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security –...
23/09/2022
Europol
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by...
22/09/2022
SecurityGen
5G Cybersecurity – Telecom Cybersecurity – Decoding the ecosystem and its vulnerabilities by...
21/09/2022
BCG Global Cybersecurity Forum
Why Children Are Unsafe in Cyberspace ? Any effort to protect children in...
21/09/2022
European Commission
CYBER RESILIENCE ACT – New EU cybersecurity rules ensure more secure hardware and...
21/09/2022
Joas Antonio
Game Hacking 1 – Anti Cheat Bypass by Joas Antonio
21/09/2022
NIST
National Initiative for Cybersecurity Education (NICE) – Cybersecurity Workforce Framework – NIST Special...
20/09/2022
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk...
20/09/2022
ENISA-EUROPA
European Cybersecurity Skills Framework by ENISA & European Union Agency for Cybersecurity. Note:...
20/09/2022
SIMPLILEARN
Cloud Computing In 6 Minutes | What Is Cloud Computing? | Cloud Computing...
15/09/2022
KROLL
Cyber Risk and CFOs – Over-Confidence is Costly – 2022 Edition by KROLL
14/09/2022
Ministerio del Interior España
Guía sobre controles de seguridad en sistemas OT – Ministerio del Interior de...
14/09/2022
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
14/09/2022
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
14/09/2022
snyk
The State of Cloud Security Report 2022 – A report on the cloud...
14/09/2022
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun...
13/09/2022
CROWDSTRIKE
2022 Falcon OverWatch Threat Hunting Report – NOWHERE TO HIDE by CROWDSTRIKE
13/09/2022
ConversationalGeek Series
ConversationalGeek Series – Cyber Insurance by Joseph Brunsman – Delinea
13/09/2022
Microsoft
Microsoft_Azure_Active_Directory_Data_Security_Considerations by Microsoft
13/09/2022
CSBS.ORG
Cybersecurity 101 – A Resource Guide for BANK EXECUTIVES – Executive Leadership of...
13/09/2022
sysdig snyk
Checklist Container Security from Code to Runtime by sysdig snyk
13/09/2022
Google Cybersecurity Action Team
Modern Data Security – A path to autonomic data security by Dr. Anton...
12/09/2022
DNSSENSE
DNS LAYER SECURITY from the MITRE ATT&CK Perspective whitepapper by DNSSense
12/09/2022
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by...
10/09/2022
Verizon Cyber Security
PSR 2022 – Payment Security Report 2022 by Verizon Cyber Security Consulting
10/09/2022
Last Cyber Security News
Data Breach Today
Live Webinar | You Don’t Know Your Environment – and IT Doesn’t Either
28/01/2023
Data Breach Today
LIVE Webinar | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware...
28/01/2023
Data Breach Today
Live Webinar | Mastering Vendor Risk Management: Key Insights For Building a Scalable...
28/01/2023
Data Breach Today
Live Webinar: Don’t Let DLP and Compliance Programs Fail – Here’s How!
28/01/2023
Data Breach Today
Russian Nuisance Hacking Group KillNet Targets Germany
28/01/2023
Data Breach Today
Entity Will Pay $4.3 Million Settlement in 2nd Big Hack Case
28/01/2023
Data Breach Today
European IoT Manufacturers Lag in Vulnerability Disclosure
28/01/2023
Data Breach Today
Coinbase Fined 3.3 Million Euros by Dutch Central Bank
28/01/2023
CSH CYBER SECURITY HUB
The top XDR investment decisions for CISOs
28/01/2023
CSH CYBER SECURITY HUB
Banking Trojan apocalypse: how hackers are stealing millions
28/01/2023
CSH CYBER SECURITY HUB
How to foster secure and efficient data practices
28/01/2023
CSH CYBER SECURITY HUB
Why good email security is essential for every business
28/01/2023
CSH CYBER SECURITY HUB
Adopting GRC and cyber security to help facilitate enterprise risk management
28/01/2023
CSH CYBER SECURITY HUB
Are smart devices cyber secure?
28/01/2023
CSH CYBER SECURITY HUB
Top tips for employee cyber security training
28/01/2023
CSH CYBER SECURITY HUB
CISO strategies and tactics for incident response
28/01/2023
The Hacker News
Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort
28/01/2023
The Hacker News
British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries
28/01/2023
csonline
FBI takes down Hive ransomware group in an undercover operation
28/01/2023
The Hacker News
3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox
28/01/2023
csonline
Hackers abuse legitimate remote monitoring and management tools in attacks
28/01/2023
The Hacker News
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
28/01/2023
The Hacker News
Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service
28/01/2023
The Hacker News
Ukraine Hit with New Golang-based ‘SwiftSlicer’ Wiper Malware in Latest Cyber Attack
28/01/2023
naked security
Hive ransomware servers shut down at last, says FBI
28/01/2023
naked security
Dutch suspect locked up for alleged personal data megathefts
28/01/2023
The Hacker News
ISC Releases Security Patches for New BIND DNS Software Vulnerabilities
28/01/2023
The Hacker News
Is Once-Yearly Pen Testing Enough for Your Organization?
26/01/2023
The Hacker News
Researchers Uncover Connection b/w Moses Staff and Emerging Abraham’s Ax Hacktivists Group
26/01/2023
The Hacker News
Researchers Release PoC Exploit for Windows CryptoAPI Bug Discovered by NSA
26/01/2023
naked security
S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text]
26/01/2023
The Hacker News
Google Takes Down 50,000 Instances of Pro-Chinese DRAGONBRIDGE Influence Operation
26/01/2023
Krebs on Security
Happy 13th Birthday, KrebsOnSecurity!
26/01/2023
Krebs on Security
Identity Thieves Bypassed Experian Security to View Credit Reports
26/01/2023
csonline
US Maritime Administrator to study port crane cybersecurity concerns
26/01/2023
csonline
European data protection authorities issue record €1.65 billion in GDPR fines
26/01/2023
csonline
DigiCert releases Trust Lifecycle Manager to unify certificate management, PKI services
26/01/2023
csonline
How attackers might use GitHub Codespaces to hide malware delivery
26/01/2023
Krebs on Security
Microsoft Patch Tuesday, January 2023 Edition
26/01/2023
csonline
Remote.it takes steps toward zero trust with ‘single line of code’ provisioning
26/01/2023
Krebs on Security
Thinking of Hiring or Running a Booter Service? Think Again.
26/01/2023
csonline
Why it’s time to review your on-premises Microsoft Exchange patch status
26/01/2023
The Register
Iran crew stole Charlie Hebdo database, says Microsoft
Guy accused of wrecking crypto exchange now hauled into court
Fast-evolving Prilex POS malware can block contactless payments
HeadCrab bots pinch 1,000+ Redis servers to mine coins
Chinese surveillance balloon over US causes fearful gasbagging
LockBit claims responsibility for ION ransomware attack but US/UK hounds are sniffing
Graham Cluley
After data breach put their lives at risk, US releases 3000 immigrants seeking asylum
Smashing Security podcast #306: No Fly lists, cell phones, and the end of ransomware riches?
ShinyHunters suspect extradited to United States from Morocco, could face 116 years in jail if...
Hive ransomware leak site and decryption keys seized in police sting
Don’t click too quick! FBI warns of malicious search engine ads
Operation Power Off: 50 DDoS-services taken offline in international crackdown
Data Breach Today
Massive Ransomware Campaign Targets VMware ESXi Servers
Cyber Insurer Sees Remote Access, Cloud Databases Under Fire
Indian Official Highlights Djvu Ransomware as Threat
IBM Security GM on Seeing a Target Through the Hacker’s Eyes
Hackers Posing as Ukrainian Ministry Deploy Info Stealers
CrowdStrike CEO on Why It’s Tough to Defend Sensitive Assets
SOC Prime
Turla Activity Detection: russian Cyberespionage Group Targeting Ukraine Uses Decade-Old USB-Delivered Andromeda Malware to Spread...
7Layers
Raspberry Robin Malware Detection: Enhanced Worm-Like Version Attacking European Financial Institutions
SOC Prime Threat Bounty — December 2022 Results
CVE-2022-42475 Detection: Zero-Day Vulnerability in FortiOS SSL-VPN Exploited in Attacks Against Government Entities and Large...
Driving Business Growth in Turbulent Times from CISO’s Perspective: Part I
CISO2CISO Last Published Stories
Mastercard RiskRecon
THIRD-PARTY SECURITY – RISK MANAGEMENT PLAYBOOK – A study of common , emerging,...
10/09/2022
RELIAQUEST
Threat Hunting 101 – A Framework for Building and Maturing a Proactive Threat...
10/09/2022
MANDIANT
M-TRENDS 2022 Mandiant Special Report
09/09/2022
Andreessen Horowitz
State of Crypto & the Web3 An overview report
09/09/2022
Andreessen Horowitz
Web3 Defined – An overview report by Brainsy
09/09/2022
Telefonica Tech & Nozomi Networks
Cybersecurity in OT Environments – Case Study in the Oil & Gas Sector...
09/09/2022
SOPHOS
The State of Ransomware in Retail 2022 by SOPHOS –
09/09/2022
FORGEROCK
2022 Consumer Identity Breach Report by ForgeRock – Eve Maler.
08/09/2022
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group –...
08/09/2022
MALTEGO
Maltego handbook for Incident Response
08/09/2022
Recorded Future
Malware and Vulnerability Trends Report H1 2022 by Recorded Future
08/09/2022
Renee Tarun y Susan Burg
CIBER SEGURO – Una guía perruna sobre seguridad en Internet para niños y...
07/09/2022
offs.ec
PEN-200 and the OSCP prep book by offs.ec
07/09/2022
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky...
07/09/2022
trendmicro
A global study EVERYTHING IS CONNECTED – Uncovering the ransomware threat from global...
07/09/2022
KPMG
Adopting secure DevOps – An introduction to transforming your organization by KPMG
07/09/2022
Cider Security
Top 10 CI/CD Security Risks by Cider Security
07/09/2022
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
06/09/2022
CLOUDFLARE
5 Ways to Maximize the Security, Performance and Reliability of Your Online Business...
06/09/2022
ONAPSIS
Five Ways to Secure SAP S/4 HANA Migrations by ONAPSIS
06/09/2022
VIRUSTOTAL
Deception at Scale – How Malware Abuses Trust by VIRUSTOTAL
06/09/2022
Ministry of Digital - Greece
CYBERSECURITY HANDBOOK – Best practices for the protection and resilience of network and...
06/09/2022
SANS DFIR
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
06/09/2022
IT Governance
Cyber Security and Business Resilience – Thinking strategically by IT Governance
06/09/2022
VINOD KUMAR
Telecom Threat Detection via Stride Mapping Case Study
05/09/2022
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
05/09/2022
RIT
Guide to Risk Assessment and Response by RIT
05/09/2022
ThreatLabz Team
2022 ThreatLabz Research Team – State of Ransomware Report by Zscaler
05/09/2022
McKinsey & Company
Value creation in the metaverse – The Real business of the virtual world...
05/09/2022
CRS Report Services
The Metaverse – Concepts and Issues for Congress by Congressional Research Service
05/09/2022
SLOWMIST
Blockchain Security and AML Analysis Report 2022 Mid-Year by SLOWMIST
05/09/2022
HADESS
GITHUB IN THE WILD – Some examples of offensive security used github by...
04/09/2022
Interpol
GUIDELINES FOR DIGITAL FORENSICS FIRST RESPONDERS BY INTERPOL
04/09/2022
Joas Antonio
Ransomware Investigation (OSINT & HUNTING) Overview PT1 by Joas Antonio
03/09/2022
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
03/09/2022
Cryptomeria Capital
The Metaverse Overview by Cryptomeria Capital – Vadim Krekotin
03/09/2022
CISO2CISO Most Viewed & Popular Stories
INDUSTRIAL DEFENDER
2022 State of Operational Technology (OT) Cybersecurity Survey – Research Report by INDUSTRIAL...
02/09/2022
KPMG
The Seven ways of the agile CISO – Cyber security leadership in the...
02/09/2022
Practical DevSecOps
The 4 Pillards of DevSecOps – CAMS: 1.Culture, 2.Automation, 3.Measurement and 4.Sharing) By...
01/09/2022
CLOUDSEK
Increased Cyber Attacks on the Global Health Sector by CloudSEK
01/09/2022
HONEYWELL FORGE
Industrial Cybersecurity USB Threath Report 2022 – Threats designed for USB exploitation rise...
01/09/2022
CISA
SECURING THE SOFTWARE SUPPLY CHAIN – RECOMMENDED PRACTICES GUIDE FOR DEVELOPERS
01/09/2022
Ben McCarty - No Start Press
Cyberjutsu – Cybersecurity for the Modern Ninja by Ben McCarty
01/09/2022
GSA
Zero Trust Architecture (ZTA) Buyer´s Guide by GSA
01/09/2022
CSA Cloud Security Alliance
Earning Trust in the 21st Century – Cloud Security Alliance – DC (CSA-DC)...
31/08/2022
CSA Cloud Security Alliance
CISO Perspectives and Progress in Deploying Zero Trust Report & Survey by Cloud...
31/08/2022
Claudio Benavente
Attack Surface Management by Claudio Benavente Cyber Security Advisor
31/08/2022
SCYTHE
Better Security Metrics – Hate on metrics all you want – they pay...
31/08/2022
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
31/08/2022
DRAGOS
10 WAYS ASSET VISIBILITY BUILDS THE FOUNDATION FOR OT CYBERSECURITY – KNOWING THE...
31/08/2022
LUMU
The SOC of the Future by Jeffrey Wheat (Lumu`s CTO)
30/08/2022
World Economic Forum
The Zero Trust Model in Cybersecurity – Towards undesstanding and deployment – Community...
30/08/2022
CISA
CYBER ESSENTIALS STARTER KIT – The Basics for Building a Culture of Cyber...
30/08/2022
cybereason
Ransomware The True Cost to Business 2022 – A Global Study on Ransomware...
30/08/2022
ONAPSIS
Four Best Practices to Align Your SAP Applications With the NIST Framework by...
30/08/2022
NIST
Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP) – NIST...
29/08/2022
CISA
CISA INSIGHTS – Preparing Critical Infrastructure for Post-Quantum Cryptography
29/08/2022
Codrut Andrei
Secure Software Development Lifecycle Fundamentals by Codrut Andrei
29/08/2022
Sittikorn Sangrattanapitak
Indicator of Attack (IoAs) and Activities – SOC-SIEM – A Detailed Explanation by...
28/08/2022
Practical DevSecOps
5 Books on Container Security you Must Read by Practical DevSecOps
27/08/2022
SEC ESPAÑA
INFORME SOBRE LA CIBERCRIMINALIDAD EN ESPAÑA POR SISTEMA ESTADISTICO DE CRIMINALIDAD SEC
27/08/2022
IGNITE Technologies
Linux Privilege Escalation on Docker by Ignite Technologies
27/08/2022
Dutch Blockchain Coalition
Blockchain Security – A Framework for Trust and Adoption by Dutch Blockchain Coalition
27/08/2022
OPEN RESEARCH SOCIETY
The Cyber Intelligence Analyst’s Cookbook by The OPEN RESEARCH SOCIETY
27/08/2022
vmware
Global Incident Response Threat Report 2022 by vmware
27/08/2022
HADESS
Introduction to Doxing- OSINT methods for information gathering by HADESS
27/08/2022
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
26/08/2022
GOLDPHISH
FIVE COMMON TYPES OF PHISHING – EMAIL PHISHING , CLONE PHISHING , WHALING,...
26/08/2022
CLOUDFLARE
Common browser isolation challenges, and how to overcome them – The intersection of...
26/08/2022
National Cyber Security Centre
Joint Ventures in the Construction Sector – Information Security Best Practice Guidance by...
26/08/2022
OAS & GLOBAL PARTNERS
National Cybersecurity Strategies – Lessons Learned and Reflections from the Americas and Other...
26/08/2022
Microsoft
Microsoft Cyber Signal Report August 2022 edition – Extortion Economics – Ransomware´s new...
24/08/2022
Last Cyber Security News
csonline
Perception Point launches Advanced Threat Protection for Zendesk
26/01/2023
csonline
Trustwave relaunches Advanced Continual Threat Hunting with human-led methodology
26/01/2023
csonline
QuSecure launches quantum-computing based security for endpoints
26/01/2023
Krebs on Security
New T-Mobile Breach Affects 37 Million Accounts
26/01/2023
csonline
How CISOs can manage the cybersecurity of high-level executives
26/01/2023
Krebs on Security
Administrator of RSOCKS Proxy Botnet Pleads Guilty
26/01/2023
csonline
Chinese hackers targeted Iranian government entities for months: Report
26/01/2023
Krebs on Security
Experian Glitch Exposing Credit Files Lasted 47 Days
26/01/2023
csonline
Many ICS flaws remain unpatched as attacks against critical infrastructure rise
26/01/2023
csonline
T-Mobile suffers 8th data breach in less than 5 years
26/01/2023
csonline
Wallarm touts API leak protection with new scanning feature
26/01/2023
csonline
The metaverse brings a new breed of threats to challenge privacy and security...
26/01/2023
csonline
US Supreme Court leak investigation highlights weak and ineffective risk management strategy
26/01/2023
csonline
Attackers exploiting critical flaw in many Zoho ManageEngine products
26/01/2023
csonline
Nvidia targets insider attacks with digital fingerprinting technology
26/01/2023
csonline
Australia fronts International Counter Ransomware Taskforce
26/01/2023
The Hacker News
Guide: How MSSPs and vCISOs can extend their services into compliance readiness without...
26/01/2023
The Hacker News
Iranian Government Entities Under Attack by New Wave of BackdoorDiplomacy Attacks
26/01/2023
csonline
How passkeys are changing authentication
26/01/2023
The Hacker News
Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North Africa
26/01/2023
The Hacker News
Mailchimp Suffers Another Security Breach Compromising Some Customers’ Information
26/01/2023
csonline
Skyhawk launches platform to provide threat detection and response across multi-cloud environments
26/01/2023
The Hacker News
Bitzlato Crypto Exchange Founder Arrested for Aiding Cybercriminals
26/01/2023
The Hacker News
6 Types of Risk Assessment Methodologies + How to Choose
26/01/2023
csonline
ServiceNow to detect open source security vulnerabilities with Snyk integration
26/01/2023
The Hacker News
New Research Delves into the World of Malicious LNK Files and Hackers Behind...
26/01/2023
csonline
P-to-P fraud most concerning cyber threat in 2023: CSI
26/01/2023
The Hacker News
Android Users Beware: New Hook Malware with RAT Capabilities Emerges
26/01/2023
csonline
CYGNVS exits stealth, trumpeting its cyberattack recovery platform
26/01/2023
csonline
Veterans bring high-value, real-life experience as potential cybersecurity employees
26/01/2023
The Hacker News
New Microsoft Azure Vulnerability Uncovered — EmojiDeploy for RCE Attacks
26/01/2023
The Hacker News
Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware
26/01/2023
The Hacker News
WhatsApp Hit with €5.5 Million Fine for Violating Data Protection Laws
26/01/2023
csonline
Chinese threat actor DragonSpark targets East Asian businesses
26/01/2023
The Hacker News
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
26/01/2023
The Hacker News
Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers’ DNS Settings
26/01/2023
csonline
Attackers move away from Office macros to LNK files for malware delivery
26/01/2023
The Hacker News
Massive Ad Fraud Scheme Targeted Over 11 Million Devices with 1,700 Spoofed Apps
26/01/2023
csonline
Recent legal developments bode well for security researchers, but challenges remain
26/01/2023
csonline
9 API security tools on the frontlines of cybersecurity
26/01/2023
The Hacker News
Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks
26/01/2023
naked security
Multi-million investment scammers busted in four-country Europol raid
26/01/2023
We LIve Security
Why your data is more valuable than you may realize
SwiftSlicer: New destructive wiper malware strikes Ukraine
Are you in control of your personal data? – Week in security with Tony Anscombe
Why your data is more valuable than you may realize
APT group trojanizes Telegram app – Week in security with Tony Anscombe
Hybrid commerce: Blurring the lines between business and pleasure
Krebs on Security
Happy 13th Birthday, KrebsOnSecurity!
Identity Thieves Bypassed Experian Security to View Credit Reports