CISO2CISO.COM & CYBER SECURITY GROUP
Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO.COM
The Most Complete Reference & News Site For The Global Cyber Community.
Twitter
Linkedin-in
Youtube
Rss
Cyber Security Stories & News
HOT & DAILY UPDATED
Cyber Security Stories & News
CISO´s Notepad & Pappers
MOST POPULAR
Attacks
Cyber Attacks
Data Breaches
Vulnerabilities
Malware
About US
Account Login
Register
Login
Password Reset
CISO2CISO Last Published Stories
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat...
27/03/2023
creative commons
OWASP API Security Top 10 – The Ten Most Critical API Security Risks...
26/03/2023
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version...
25/03/2023
hackercombat
10 Cyber Security Myths You Need To Stop Believing by HACKER COMBAT COMMUNITY
25/03/2023
HADESS
Red Team Guides 2023 by HADESS
25/03/2023
Practical DevSecOps
API Security Fundamentals – Your Handy Guide to Building an Unhackable System by...
25/03/2023
Ninjio´s
Ninjio´s Cyber Hygiene Checklist – Level Up Your Cybersecurity
25/03/2023
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT...
24/03/2023
Dinesh Shetty - Security Innovation
Hacking iOS Applications – A detailed testing guide by Dinesh Shetty – Security...
24/03/2023
naked security
In Memoriam – Gordon Moore, who put the more in “Moore’s Law”
27/03/2023
csonline
Cybersecurity startups to watch for in 2023
27/03/2023
csonline
The CSO guide to top security conferences
27/03/2023
The Guardian UK
TechScape: Why Twitter ending free access to its APIs should be a ‘wake-up...
27/03/2023
The Guardian UK
Medibank class action launched after massive hack put private information of millions on...
27/03/2023
The Guardian UK
Labor plan to beef up government’s cyber powers faces Senate block
27/03/2023
The Guardian UK
Latitude Financial cyber-attack worse than first thought with 14m customer records stolen
27/03/2023
Data Breach Today
ChatGPT Exposed Payment Card Data of Subscribers
27/03/2023
Malware Analysis Techniques – Tricks for the triage of adversarial software by Dylan...
24/03/2023
NIST
Artificial Intelligence Risk Management Framework – AI RMF 1.0 By NIST
24/03/2023
Packt
Windows Ransomware Detection and Protection – Securing Windows endpoints , the cloud and...
21/03/2023
Microsoft Security
Data Loss Prevention from on-premises to cloud by Microsoft Security
21/03/2023
MANDIANT
MANDIANT APT1 – Exposing One of Chinas Cyber Espionage Units
19/03/2023
MIT Technology Review
The Cyber Defense Index 2022-23 – A benchmark of the digital security preparedness...
12/03/2023
PICUS
The RED REPORT 2023 – The Top 10 Most Prevalent MITRE ATT&ACK Techniques...
12/03/2023
Chainalysis
The 2023 Crypto Crime Report by Chainalysis – Everithing you need to know...
12/03/2023
Stanton House
Cybersecurity Salary for US market and Recruiting Trends Guide 2023 by Stanton House
12/03/2023
The Guardian UK
Yes, it’s crazy to have TikTok on official phones. But it’s not good...
26/03/2023
The Hacker News
Hackers Steal Over $1.6 Million in Crypto from General Bytes Bitcoin ATMs Using...
26/03/2023
The Hacker News
From Ransomware to Cyber Espionage: 55 Zero-Day Vulnerabilities Weaponized in 2022
26/03/2023
The Hacker News
The Best Defense Against Cyber Threats for Lean Security Teams
26/03/2023
The Hacker News
New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers
26/03/2023
The Hacker News
New ‘Bad Magic’ Cyber Threat Disrupts Ukraine’s Key Sectors Amid War
26/03/2023
The Hacker News
BreachForums Administrator Baphomet Shuts Down Infamous Hacking Forum
26/03/2023
The Hacker News
NAPLISTENER: New Malware in REF2924 Group’s Arsenal for Bypassing Detection
26/03/2023
Stanton House
CYBERSECURITY The Ultimate Hiring Guide by Stanton house
12/03/2023
FBI - Federal Bureau of Investigation
Internet Crime Report 2022 by FBI Internet Crime Compliance Center
12/03/2023
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT) by NIST...
12/03/2023
World Economic Forum
Global Cybersecurity Outlook 2023 Insight Report by WEF – World Economic Forum in...
12/03/2023
State service of Ukraine
Russia´s Cyber Tactics – Lessons Learnead 2022 by Information Protection of Ukraine
12/03/2023
SANSInstituteSecurity
SANS Institute – Incident Handler´s Handbook by Patrick Kral
12/03/2023
RiskLens
Cybersecurity Risk Report 2023 by RiskLens
12/03/2023
ENISA-EUROPA
A Governance Framework for National Cybersecurity Strategies by European Union Agency for Cybersecurity...
06/03/2023
MS Security & Mohamed Mokhtar
Microsoft Entra – The Comprensive Guide to Secure Azure AD & User Identities...
06/03/2023
The Hacker News
Rogue NuGet Packages Infect .NET Developers with Crypto-Stealing Malware
26/03/2023
The Hacker News
Preventing Insider Threats in Your Active Directory
26/03/2023
The Hacker News
ScarCruft’s Evolving Arsenal: Researchers Reveal New Malware Distribution Techniques
26/03/2023
The Hacker News
CISA Alerts on Critical Security Vulnerabilities in Industrial Control Systems
26/03/2023
The Hacker News
German and South Korean Agencies Warn of Kimsuky’s Expanding Cyber Attack Tactics
26/03/2023
The Hacker News
Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers
26/03/2023
The Hacker News
2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks
26/03/2023
The Hacker News
Nexus: A New Rising Android Banking Trojan Targeting 450 Financial Apps
26/03/2023
SANS
SANS DFIR – CHEAT SHEETS & NOTEBOOKS – The most complete reference !!!
05/03/2023
Bruce Schneier
The Coming AI Hackers – Council for the responsible use of AI by...
05/03/2023
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos – malwareanalysis #reverseengineering
05/03/2023
United Nations - ONU
Digest of Cyber Organized Crime by UNODC – United Nations Office on Drugs...
05/03/2023
McKinsey
Cybersecurity in a Digital Era by McKinsey. Digital McKinsey and Global Risk Practice.
02/03/2023
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
01/03/2023
CROWDSTRIKE
CROWDSTRIKE 2023 GLOBAL THREAT REPORT
01/03/2023
OEA - CIC - CISCO
Reporte sobre el desarrollo de la FUERZA LABORAL DE CIBERSEGURIDAD 2023 by OEA,...
01/03/2023
Bipartisan Policy Center
Top Risk in Cybersecurity 2023 by Bipartisan Policy Center
01/03/2023
CISO2CISO Most Viewed & Popular Stories
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
17/11/2022
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips...
09/11/2022
Codrut Andrei
Secure Software Development Lifecycle Fundamentals by Codrut Andrei
29/08/2022
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
26/08/2022
Jon Radoff
The Metaverse Value Chain – The Seven Layers of the Metaverse by Jon Radoff
09/08/2022
Americn Public Power A.
Public Power Cyber Incident Response Playbook by American Public Power Association
09/08/2022
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
09/08/2022
ALLIANZ
Allianz 2022 Risk Barometer – The most important business risks for the next...
07/08/2022
CHECKPOINT RESEARCH
Checkpoint Cyber Attack Trend 2022 Mid Year Report by Check Point Research
06/08/2022
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP – AZURE by Joas Antonio
05/08/2022
Codrut Andrei
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
03/08/2022
Cyber Rescue Alliance
The Best Cyber Insights of 2022 by The Cyber Rescue Alliance
02/08/2022
Chris Davis
Blue Team Cheat Sheets by Chris Davis
02/08/2022
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
01/08/2022
OCCUPYTHEWEB
Linux Basics for Hackers by Occupytheweb
31/07/2022
Apress
Jump-start Your SOC Analyst Career – A Roadmap to Cybersecurity Success by Apress
31/07/2022
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
31/07/2022
Microsoft
Microsoft Zero Trust Maturity Model
31/07/2022
Nathalie Cole
How Much 10 Companies Paid Their Virtual CISO Service in 2022 Benchmark by...
30/07/2022
WILEY
Cybercrime Investigators Handbook by WILEY
30/07/2022
NSA
NSA Network Infrastructure Security Guidance V1.0 March 2022
30/07/2022
ENISA
TELECOM SECURITY INCIDENTS REPORT 2021 BY ENISA
30/07/2022
RedHat
State of Kubernetes Security Report 2022 by RedHat
29/07/2022
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
29/07/2022
IBM Security
How much does a data breach cost in 2022? IBM Cost of a...
27/07/2022
FIRE EYE
The Cyber Risk Playbook – What boards of directors and executives should know...
25/07/2022
Unbound Security
The Cybersecurity Acronym Book
20/07/2022
Ciso Council
CISO Security Officer Handbook
17/07/2022
Splunk
Top 50 Security Threats by Splunk
17/07/2022
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
12/07/2022
iSMG
RSA Conference 2022 Compendium: 150+ Interviews and More by SMG
11/07/2022
Verizon
Verizon 2022 DBIR Data Breach Investigations Report
10/07/2022
Gartner
Gartner Unveils the Top Eight Cybersecurity Predictions for 2022-23
28/06/2022
SentinelOne
90 DAYS A CISO´s Journey to Impact define your role !!
21/06/2022
help net security
Compliance does not equal security !!
21/10/2021
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
05/09/2021
Last Cyber Security News
The Hacker News
Fake ChatGPT Chrome Browser Extension Caught Hijacking Facebook Accounts
26/03/2023
The Hacker News
Critical WooCommerce Payments Plugin Flaw Patched for 500,000+ WordPress Sites
26/03/2023
The Hacker News
Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
26/03/2023
The Hacker News
GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
26/03/2023
The Hacker News
THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
26/03/2023
The Hacker News
Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
26/03/2023
The Hacker News
OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident
26/03/2023
The Hacker News
Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers
26/03/2023
The Hacker News
U.K. National Crime Agency Sets Up Fake DDoS-For-Hire Sites to Catch Cybercriminals
26/03/2023
naked security
Windows 11 also vulnerable to “aCropalypse” image data leakage
26/03/2023
naked security
Google Pixel phones had a serious data leakage bug – here’s what to...
26/03/2023
naked security
WooCommerce Payments plugin for WordPress has an admin-level hole – patch now!
26/03/2023
naked security
S3 Ep127: When you chop someone out of a photo, but there they...
26/03/2023
Data Breach Today
Clop GoAnywhere Attacks Have Now Hit 130 Organizations
26/03/2023
Data Breach Today
3-Year JS Injection Campaign Targets 51,000 Websites
26/03/2023
The Guardian UK
TikTok unveils European data security plan amid calls for US ban
25/03/2023
The Guardian UK
UK bans TikTok from government mobile phones
25/03/2023
The Guardian UK
UK expected to ban TikTok from government mobile phones
25/03/2023
The Guardian UK
The TikTok wars – why the US and China are feuding over the...
25/03/2023
The Guardian UK
MPs and peers ask information commissioner to investigate TikTok
25/03/2023
The Guardian UK
US threatens to ban TikTok unless Chinese owners divest
25/03/2023
The Guardian UK
TikTok to be banned from UK parliamentary devices
25/03/2023
The Guardian UK
BBC urges staff to delete TikTok from company mobile phones
25/03/2023
The Guardian UK
TikTok banned on London City Hall devices over security concerns
25/03/2023
csonline
Cyberpion rebrands as Ionix, offering new EASM visibility improvements
25/03/2023
csonline
Critical flaw in WooCommerce can be used to compromise WordPress websites
25/03/2023
The Guardian UK
Is it worth taking out personal cyber insurance in case you are caught...
25/03/2023
The Guardian UK
Medibank hackers announce ‘case closed’ and dump huge data file on dark web
25/03/2023
The Guardian UK
Password app LastPass hit by cybersecurity breach but says data remains safe
25/03/2023
The Guardian UK
I am a Medibank customer. Am I affected by the cyber-attack? What can...
25/03/2023
The Guardian UK
TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hack
25/03/2023
The Guardian UK
Telstra sorry for publishing up to 130,000 customers’ details online
25/03/2023
The Guardian UK
Clare O’Neil on national security amid cyber hacks and threats to democracy
25/03/2023
Data Breach Today
Corelight Pursues IR Partnerships, Smaller Enterprise Deals
25/03/2023
Data Breach Today
Device Maker Zoll Facing 7 Lawsuits in Wake of Breach
25/03/2023
Data Breach Today
US Sends Cyber Team to Aid Albania’s Cyber Defenses
25/03/2023
Data Breach Today
How BreachForums’ ‘Pompompurin’ Led the FBI to His Home
25/03/2023
csonline
UK parliament follows government by banning TikTok over cybersecurity concerns
24/03/2023
csonline
Critical flaw in AI testing framework MLflow can lead to server and data...
24/03/2023
csonline
Android-based banking Trojan Nexus now available as malware-as-a-service
24/03/2023
Data Breach Today
GitHub Replaces Private RSA SSH Key After Public Exposure
24/03/2023
Data Breach Today
ISMG Editors: What’s Next in Russia’s Cyber War?
24/03/2023
csonline
Russian hacktivists deploy new AresLoader malware via decoy installers
24/03/2023
Data Breach Today
Live Webinar | The Good, the Bad and the Truth About Password Managers
24/03/2023
Data Breach Today
Breach Roundup: Ferrari, Indian Health Ministry and the NBA
24/03/2023
Data Breach Today
Lawmakers Weigh New Regulations in U.S. Cyber Strategy
24/03/2023
Data Breach Today
Cryptohack Roundup: BitPay, Euler Finance Gala Games
24/03/2023
Data Breach Today
SideCopy APT Targets India’s Premier Defense Research Agency
24/03/2023
The Hacker News
Hackers Steal Over $1.6 Million in Crypto from General Bytes Bitcoin ATMs Using Zero-Day Flaw
From Ransomware to Cyber Espionage: 55 Zero-Day Vulnerabilities Weaponized in 2022
The Best Defense Against Cyber Threats for Lean Security Teams
New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers
New ‘Bad Magic’ Cyber Threat Disrupts Ukraine’s Key Sectors Amid War
BreachForums Administrator Baphomet Shuts Down Infamous Hacking Forum
Threatpost
Google Patches Chrome’s Fifth Zero-Day of the Year
iPhone Users Urged to Update to Patch 2 Zero-Days
Fake Reservation Links Prey on Weary Travelers
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Ransomware Attacks are on the Rise
Naked Security
In Memoriam – Gordon Moore, who put the more in “Moore’s Law”
Google Pixel phones had a serious data leakage bug – here’s what to do!
Windows 11 also vulnerable to “aCropalypse” image data leakage
WooCommerce Payments plugin for WordPress has an admin-level hole – patch now!
S3 Ep127: When you chop someone out of a photo, but there they are anyway…
Bitcoin ATM customers hacked by video upload that was actually an app
Cyber Security Hub
What is phishing?
What are DDoS attacks?
Top seven hacks and cyber security threats in APAC
Why do hackers target cryptocurrencies?
Have your say: the global state of cyber security
The dangerous vulnerabilities caused by weak email security
CISO2CISO Last Published Stories
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
20/12/2022
CISA
Insider Threat Mitigation Guide by Cybersecurity Insfrastructure Security Agency
20/12/2022
ACFE
ANTI-FRAUD PLAYBOOK – THE BEST DEFENSES IS A GOOD OFFENSE BY ACFE –...
19/12/2022
OECD Publishing
ROUTING SECURITY – BGP INCIDENTS, MITIGATION, TECHNIQUES AND POLICY ACTIONS BY OECD
19/12/2022
NSA
NSA CYBERSECURITY – YEAR IN REVIEW REPORT 2022. You must read IT !
19/12/2022
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
16/12/2022
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats 2022 by Tushar Subhra...
02/12/2022
National Cyber Crime Agencie
Manual on Social Media Intelligence (SOCMINT) for Law Enforcement Agencies by National Cyber...
20/11/2022
Wallarm
DevOps Tools and Insfrastructure Under Attack by Wallarm
18/11/2022
IST
MAPPING THE RANSOMWARE PAYMENT ECOSYSTEM BY ZOE BRAMMER – IST Institute of Security...
18/11/2022
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
17/11/2022
esset
ESSET THREAT REPORT T2 2022
17/11/2022
OECD Publishing
SECURITY OF THE DOMAIN NAME SYSTEM (DNS) – AN INTRODUCTION FOR POLICY MAKERS
17/11/2022
SecurityGen
Telecom Cybersecurity – 5G Protection Use Cases by SecurityGen
17/11/2022
HornetSecurity
THE 2022 HORNETSECURITY RANSOMWARE ATTACKS ANALYSIS
17/11/2022
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
17/11/2022
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips...
09/11/2022
Ankit Pangasa
Security Protocols – SSL vs TLS – ALL YOU NEED TO KNOW.
06/11/2022
EKOPARTY SECURITY CONFERENCE
#EKOPARTY2022 – Ekoparty is a technical security conference born in 2001. +3000 guests, single...
04/11/2022
CISO2CISO ToolBox Series
CISO2CISO Toolbox Series – Cyber Security Blogs / Cyber Security RSS Feeds List...
03/11/2022
Canadian Centre for CyberSecurity
BASELINE CYBER SECURITY CONTROLS FOR SMALL AND MEDIUM ORGANIZATIONS V1.2 by Canadian Centre...
27/10/2022
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures –...
27/10/2022
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by...
27/10/2022
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security...
25/10/2022
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader...
25/10/2022
ANSSI & CCA France
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest...
25/10/2022
PICUS
ILLUMINATING DARKSIDE – TTPs, Tools, and the Trend Towards Defense Evasion by PICUS
25/10/2022
BONI YEAMIN
OPEN SOURCE SOC TOOLS BY BONI YEAMIN
25/10/2022
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced...
25/10/2022
varonis
Pentesting Active Directory Environments by VARONIS
25/10/2022
WILEY
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech...
25/10/2022
iapp
2022 PRIVACY TECH VENDOR REPORT by IAPP
25/10/2022
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
25/10/2022
Microsoft Security
Microsoft Implements Brute Force Attack Protection for All Windows Versions – As of...
12/10/2022
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies...
10/10/2022
ENDGAME
KERNEL MODE THREATS AND PRACTICAL DEFENSES BY Joe Desimone and Ganriel Landau –...
09/10/2022
CISO2CISO Most Viewed & Popular Stories
NHTSA
Cybersecurity Best Practices for the Safety of Modern Vehicles – Updatd 2022 by...
09/10/2022
CLOUDFLARE
Simplifying the way we protect SaaS applications – How to protect users and...
09/10/2022
Virusbulletin.com
LAZARUS AND BYOVD – EVIL TO THE WINDOWS CORE By Peter Kalnai –...
09/10/2022
Alejandro Corletti - Darfe.es
Libro Ciberseguridad – Una estrategia Informatica-Militar by Alejandro Corletti Estrada – darfE.es
09/10/2022
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
08/10/2022
HADESS
TALE OF PHIHING – Some Phishing Techniques & Awareness by HADESS.IO
08/10/2022
Cobalt
The Estate of Pentesting 2022 by Cobalt
08/10/2022
CheckPoint
KEEPING YOUR EMAIL SECURE – WHO DOES IT BEST ? A Especial analysis...
07/10/2022
Cybersecurity Top Youtube Channels
Cybersecurity 85 Top Youtube Channels on Github.com
06/10/2022
Salman Abdulkarim
AWS Cloud Security – The AWS Shared Responsibility Model by Salman Abdulkarim
05/10/2022
Cynalytica
5 Targets Hackers Look for When Attacking an OT Network by Cynalytica
04/10/2022
rpi
THE IoT LANDSCAPE – The next decade of the Internet of Things by...
04/10/2022
FORTINET
A Solution Guide to Operational Technology (OT) Cybersecurity by Fortinet – The “air...
04/10/2022
Victoria Beckman - Microsoft
Ransomware as a service (RaaS) – An explainer guide to cybercrime´s newest business...
04/10/2022
SCF
Secure & Privacy by Design Principles Framework & Security & Privacy Capability Maturity...
04/10/2022
APPLIED INCIDENT RESPONSE
Windows Event Security Log Analysis
04/10/2022
CAREER UP
7 Steps to your Cybersecurity Career – How to begin your career in...
02/10/2022
Aristeidis Michail
Security Operations Center – A Business Perspective by Aristeidis Michail
01/10/2022
IGNITE Technologies
RDP Penetration Testing by IGNITE Technologies
01/10/2022
Joas Antonio
Windows Persistence Techniques by Joas Antonio
01/10/2022
ALEX SIDORENKO & ELENA DEMIDENKO
GUIDE TO EFFECTIVE RISK MANAGEMENT 3.0 – ALEX SIDORENKO – ELENA DEMIDENKO
01/10/2022
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG...
01/10/2022
CSA Cloud Security Alliance
SaaS Governance Best Practices Cloud by CSA Cloud Security Alliance
01/10/2022
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY...
01/10/2022
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server
30/09/2022
PWC
2022 Global Digital Trust Insights – The C-suite guide to simplifyng for cyber...
30/09/2022
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
29/09/2022
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for...
28/09/2022
odaseva
The State of SaaS Ransomware Attack Preparedness – A survey of cloud data...
28/09/2022
CIS
CIS Critical Security Controls Version 8 – Mapping to PCI Data Security Standar...
28/09/2022
Microsoft
Windows 11 Security Book – Powerful security from chip to cloud – Built...
27/09/2022
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and...
27/09/2022
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect,...
26/09/2022
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark...
26/09/2022
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment ,...
26/09/2022
ECIIA
2023 RISK IN FOCUS – Hot topics for internal auditors by ECIIA –...
26/09/2022
Last Cyber Security News
csonline
9 attack surface discovery and management tools
23/03/2023
csonline
Developed countries lag emerging markets in cybersecurity readiness
23/03/2023
csonline
BrandPost: Stop the Sprawl: How Vendor Consolidation Can Reduce Security Risks in the...
23/03/2023
csonline
As critical Microsoft vulnerabilities drop, attackers may adopt new techniques
23/03/2023
csonline
Ping Identity debuts decentralized access management system in early access
23/03/2023
csonline
Sharing sensitive business data with ChatGPT could be risky
23/03/2023
csonline
Backslash AppSec solution targets toxic code flows, threat model automation
23/03/2023
csonline
Average enterprise storage/backup device has 14 vulnerabilities, three high or critical risks
23/03/2023
csonline
Landmark UK-Israeli agreement to boost mutual cybersecurity development, tackle shared threats
23/03/2023
csonline
55 zero-day flaws exploited last year show the importance of security risk management
23/03/2023
csonline
Splunk adds new security and observability features
23/03/2023
csonline
How training and recognition can reduce cybersecurity stress and burnout
23/03/2023
csonline
New vulnerabilities found in industrial control systems of major vendors
23/03/2023
csonline
Security at the core of Intel’s new vPro platform
23/03/2023
Data Breach Today
Splashtop Buys Foxpass to Bring Enterprise IAM to the Masses
23/03/2023
Data Breach Today
Russians Can Use Crypto to Evade Sanctions, Researchers Warn
23/03/2023
Krebs on Security
Google Suspends Chinese E-Commerce App Pinduoduo Over Malware
23/03/2023
Data Breach Today
Stung by Free Decryptor, Ransomware Group Embraces Extortion
23/03/2023
Data Breach Today
Hackers Are Actively Exploiting Unpatched Adobe ColdFusion
23/03/2023
Data Breach Today
Orca Promotes CPO Gil Geron to CEO to Drive Efficient Growth
23/03/2023
Data Breach Today
DC Health Link Facing Lawsuits in Hack Affecting Congress
23/03/2023
Data Breach Today
US FTC Seeks Information on Cloud Provider Cybersecurity
22/03/2023
Data Breach Today
Webinar | Why Your SASE Deployment Should Start With ZTNA 2.0
22/03/2023
Data Breach Today
BreachForums Closes Amid Worries Over Law Enforcement Access
22/03/2023
Data Breach Today
US Charges Bulgarian Woman in $4B OneCoin Fraud Case
22/03/2023
Data Breach Today
NYC Special Needs Student’s Records Found Exposed on Web
22/03/2023
Data Breach Today
Google Suspends Chinese App Following Malware Discovery
22/03/2023
Data Breach Today
(Fireside Chat) Policing the Shadows: Uncovering the Darkweb
21/03/2023
Data Breach Today
(Panel) Skill Gap in Cybersecurity: Innovative Methods CISOs Are Deploying
21/03/2023
Data Breach Today
CERT-In Directives – The Status Check
21/03/2023
Data Breach Today
Ransomware Will Target Transport Sector OT, Says ENISA – European Cybersecurity Agency Warns...
21/03/2023
csonline
Security Recruiter Directory
21/03/2023
csonline
ForgeRock, Secret Double Octopus offer passwordless authentication for enterprises
21/03/2023
Data Breach Today
How Russia’s Ukraine War Disrupted the Cybercrime Ecosystem
21/03/2023
Data Breach Today
Fresh Vishing Campaign Targeting South Korean Users
21/03/2023
Data Breach Today
Lawsuit Against Clinic Seeks Long List of Cyber Improvements
21/03/2023
Data Breach Today
Hacker Exploits Months-Old Bug to Steal Crypto From ATMs
21/03/2023
The Hacker News
Emotet Rises Again: Evades Macro Security via OneNote Attachments
20/03/2023
The Hacker News
Researchers Shed Light on CatB Ransomware’s Evasion Techniques
20/03/2023
The Hacker News
New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply...
20/03/2023
The Hacker News
Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen
20/03/2023
The Hacker News
New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads
20/03/2023
The Register
Putin to staffers: Throw out your iPhones, or ‘give it to the kids’
Ex-Meta security staffer accuses Greece of spying on her phone
You just gonna take that AWS? Let Microsoft school your users on cloud security?
BreachForums shuts down … but the RaidForums cybercrime universe will likely spawn a trilogy
Xi, Putin declare intent to rule the world of AI, infosec
India’s absurd infosec reporting rules get just 15 followers
Graham Cluley
Fake GPT Chrome extension steals Facebook session cookies, breaks into accounts
Europe’s transport sector terrorised by ransomware, data theft, and denial-of-service attacks
Danger USB! Journalists sent exploding flash drives
aCropalypse now! Cropped and redacted images suffer privacy fail on Google Pixel smartphones
The hidden danger to zero trust: Excessive cloud permissions
Smashing Security podcast #314: Photo cropping bombshell, TikTok debates, and real estate scams
Data Breach Today
ChatGPT Exposed Payment Card Data of Subscribers
Clop GoAnywhere Attacks Have Now Hit 130 Organizations
3-Year JS Injection Campaign Targets 51,000 Websites
Corelight Pursues IR Partnerships, Smaller Enterprise Deals
Device Maker Zoll Facing 7 Lawsuits in Wake of Breach
US Sends Cyber Team to Aid Albania’s Cyber Defenses
SOC Prime
Ferrari Data Breach Disclosed: Attackers Gain Access to the Company’s Network While Demanding Ransom to...
SOC Prime Threat Bounty — February 2023 Results
Detect CVE-2023-23397 Exploits: Critical Elevation of Privilege Vulnerability in Microsoft Outlook Leveraged in the Wild...
BlackLotus UEFI Bootkit Detection: Exploits CVE-2022-21894 to Bypass UEFI Secure Boot and Disables OS Security...
ScrubCrypt Attack Detection: 8220 Gang Applies Novel Malware in Cryptojacking Operations Exploiting Oracle WebLogic Servers
On the Frontline of the Global Cyber War: Overview of Major russia-backed APT Groups Targeting...
CISO2CISO Last Published Stories
Dr. Erdal Ozkaya
Hiring a CISO – Super Guide for startups by Erdal Ozkaya
26/09/2022
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and...
26/09/2022
Argentina
Propuesta de Anteproyecto de Ley de Proteccion de Datos Personales – Ley 25326...
26/09/2022
NSA and NISA
Control System Defense – Know the Opponent by NSA and NISA
26/09/2022
Cencys
2022 State of the internet report by cencys
25/09/2022
O´REILLY
10 Steps Every CISO Should Take to Secure Next-Gen Software by Cindy Blake...
25/09/2022
TRIMARC
10 WAYS TO IMPROVE AD SECURITY QUICKLY – list of widely applicable “easy”...
25/09/2022
Packt
Guia de Implementacion y Estrategia de Azure cuarta edicion by Packt
25/09/2022
Practical DevSecOps
You are probably doing DevSecOps Wrong by Practical DevSecOps – DevSecOps can seem...
25/09/2022
TACTICX
Offensive Microsoft Active Directory 101 – Security Holes Everywere by TACTICX – Active...
24/09/2022
BARRACUDA
The State of Industrial Security in 2022 by Barracuda – Insecure remote access,...
23/09/2022
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security –...
23/09/2022
Europol
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by...
22/09/2022
SecurityGen
5G Cybersecurity – Telecom Cybersecurity – Decoding the ecosystem and its vulnerabilities by...
21/09/2022
BCG Global Cybersecurity Forum
Why Children Are Unsafe in Cyberspace ? Any effort to protect children in...
21/09/2022
European Commission
CYBER RESILIENCE ACT – New EU cybersecurity rules ensure more secure hardware and...
21/09/2022
Joas Antonio
Game Hacking 1 – Anti Cheat Bypass by Joas Antonio
21/09/2022
NIST
National Initiative for Cybersecurity Education (NICE) – Cybersecurity Workforce Framework – NIST Special...
20/09/2022
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk...
20/09/2022
ENISA-EUROPA
European Cybersecurity Skills Framework by ENISA & European Union Agency for Cybersecurity. Note:...
20/09/2022
SIMPLILEARN
Cloud Computing In 6 Minutes | What Is Cloud Computing? | Cloud Computing...
15/09/2022
KROLL
Cyber Risk and CFOs – Over-Confidence is Costly – 2022 Edition by KROLL
14/09/2022
Ministerio del Interior España
Guía sobre controles de seguridad en sistemas OT – Ministerio del Interior de...
14/09/2022
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
14/09/2022
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
14/09/2022
snyk
The State of Cloud Security Report 2022 – A report on the cloud...
14/09/2022
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun...
13/09/2022
CROWDSTRIKE
2022 Falcon OverWatch Threat Hunting Report – NOWHERE TO HIDE by CROWDSTRIKE
13/09/2022
ConversationalGeek Series
ConversationalGeek Series – Cyber Insurance by Joseph Brunsman – Delinea
13/09/2022
Microsoft
Microsoft_Azure_Active_Directory_Data_Security_Considerations by Microsoft
13/09/2022
CSBS.ORG
Cybersecurity 101 – A Resource Guide for BANK EXECUTIVES – Executive Leadership of...
13/09/2022
sysdig snyk
Checklist Container Security from Code to Runtime by sysdig snyk
13/09/2022
Google Cybersecurity Action Team
Modern Data Security – A path to autonomic data security by Dr. Anton...
12/09/2022
DNSSENSE
DNS LAYER SECURITY from the MITRE ATT&CK Perspective whitepapper by DNSSense
12/09/2022
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by...
10/09/2022
Verizon Cyber Security
PSR 2022 – Payment Security Report 2022 by Verizon Cyber Security Consulting
10/09/2022
CISO2CISO Most Viewed & Popular Stories
Mastercard RiskRecon
THIRD-PARTY SECURITY – RISK MANAGEMENT PLAYBOOK – A study of common , emerging,...
10/09/2022
RELIAQUEST
Threat Hunting 101 – A Framework for Building and Maturing a Proactive Threat...
10/09/2022
MANDIANT
M-TRENDS 2022 Mandiant Special Report
09/09/2022
Andreessen Horowitz
State of Crypto & the Web3 An overview report
09/09/2022
Andreessen Horowitz
Web3 Defined – An overview report by Brainsy
09/09/2022
Telefonica Tech & Nozomi Networks
Cybersecurity in OT Environments – Case Study in the Oil & Gas Sector...
09/09/2022
SOPHOS
The State of Ransomware in Retail 2022 by SOPHOS –
09/09/2022
FORGEROCK
2022 Consumer Identity Breach Report by ForgeRock – Eve Maler.
08/09/2022
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group –...
08/09/2022
MALTEGO
Maltego handbook for Incident Response
08/09/2022
Recorded Future
Malware and Vulnerability Trends Report H1 2022 by Recorded Future
08/09/2022
Renee Tarun y Susan Burg
CIBER SEGURO – Una guía perruna sobre seguridad en Internet para niños y...
07/09/2022
offs.ec
PEN-200 and the OSCP prep book by offs.ec
07/09/2022
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky...
07/09/2022
trendmicro
A global study EVERYTHING IS CONNECTED – Uncovering the ransomware threat from global...
07/09/2022
KPMG
Adopting secure DevOps – An introduction to transforming your organization by KPMG
07/09/2022
Cider Security
Top 10 CI/CD Security Risks by Cider Security
07/09/2022
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
06/09/2022
CLOUDFLARE
5 Ways to Maximize the Security, Performance and Reliability of Your Online Business...
06/09/2022
ONAPSIS
Five Ways to Secure SAP S/4 HANA Migrations by ONAPSIS
06/09/2022
VIRUSTOTAL
Deception at Scale – How Malware Abuses Trust by VIRUSTOTAL
06/09/2022
Ministry of Digital - Greece
CYBERSECURITY HANDBOOK – Best practices for the protection and resilience of network and...
06/09/2022
SANS DFIR
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
06/09/2022
IT Governance
Cyber Security and Business Resilience – Thinking strategically by IT Governance
06/09/2022
VINOD KUMAR
Telecom Threat Detection via Stride Mapping Case Study
05/09/2022
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
05/09/2022
RIT
Guide to Risk Assessment and Response by RIT
05/09/2022
ThreatLabz Team
2022 ThreatLabz Research Team – State of Ransomware Report by Zscaler
05/09/2022
McKinsey & Company
Value creation in the metaverse – The Real business of the virtual world...
05/09/2022
CRS Report Services
The Metaverse – Concepts and Issues for Congress by Congressional Research Service
05/09/2022
SLOWMIST
Blockchain Security and AML Analysis Report 2022 Mid-Year by SLOWMIST
05/09/2022
HADESS
GITHUB IN THE WILD – Some examples of offensive security used github by...
04/09/2022
Interpol
GUIDELINES FOR DIGITAL FORENSICS FIRST RESPONDERS BY INTERPOL
04/09/2022
Joas Antonio
Ransomware Investigation (OSINT & HUNTING) Overview PT1 by Joas Antonio
03/09/2022
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
03/09/2022
Cryptomeria Capital
The Metaverse Overview by Cryptomeria Capital – Vadim Krekotin
03/09/2022
Last Cyber Security News
naked security
Bitcoin ATM customers hacked by video upload that was actually an app
20/03/2023
csonline
7 guidelines for identifying and mitigating AI-enabled phishing campaigns
20/03/2023
csonline
BianLian ransomware group shifts focus to extortion
20/03/2023
csonline
CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flaws
20/03/2023
Krebs on Security
Why You Should Opt Out of Sharing Data With Your Mobile Provider
20/03/2023
The Guardian UK
How an AI voice clone fooled Centrelink – video
20/03/2023
Data Breach Today
Is Your Identity Management Comprehensive Enough? Are You Just Tipping Your Toes?
20/03/2023
Data Breach Today
Impact of Technology Deployments on Privacy: Striking the Right Balance
20/03/2023
Data Breach Today
Future of Cybersecurity: Threats and Opportunities
20/03/2023
Data Breach Today
It’s Raining Zero-Days in Cyberspace
20/03/2023
The Guardian UK
Cybersecurity funds should go towards beefing up Centrelink voice authentication, Greens say
20/03/2023
Data Breach Today
Hitachi Energy Latest Victim of Clop GoAnywhere Attacks
19/03/2023
The Hacker News
Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York
18/03/2023
The Hacker News
Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage Attack
18/03/2023
Data Breach Today
FBI Says It Arrested BreachForums Mastermind “Pompompurin”
18/03/2023
The Hacker News
BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads
18/03/2023
The Hacker News
FakeCalls Vishing Malware Targets South Korean Users via Popular Financial Apps
18/03/2023
The Hacker News
LockBit 3.0 Ransomware: Inside the Cyberthreat That’s Costing Millions
18/03/2023
Krebs on Security
Feds Charge NY Man as BreachForums Boss “Pompompurin”
18/03/2023
Data Breach Today
Webinar | Reducing Risk with a Zero Trust Architecture
18/03/2023
Data Breach Today
TikTok Says US Threatens Ban Unless Chinese Owners Divest
18/03/2023
Data Breach Today
What the FTC Is Signaling in Recent Data Privacy Cases
18/03/2023
Data Breach Today
Chinese Hackers Targeting Security and Network Appliances
18/03/2023
Data Breach Today
European Digital Identity Bill Heads to Final Negotiations
18/03/2023
The Hacker News
Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips
17/03/2023
The Hacker News
Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials
17/03/2023
The Hacker News
Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware
17/03/2023
The Hacker News
A New Security Category Addresses Web-borne Threats
17/03/2023
The Hacker News
New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
17/03/2023
The Hacker News
THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
17/03/2023
naked security
Dangerous Android phone 0-day bugs revealed – patch or work around them now!
17/03/2023
csonline
Two Patch Tuesday flaws you should fix right now
17/03/2023
The Guardian UK
Why is TikTok banned from government phones – and should rest of us...
17/03/2023
Data Breach Today
Webinar | Open Source License Compliance and M&A Activity: What You Don’t Know...
17/03/2023
Data Breach Today
SVB Parent Company Seeks Bankruptcy Amid Asset Sale Process
17/03/2023
Data Breach Today
ISMG Editors: Will SVB Crash Kill Cybersecurity Innovation?
17/03/2023
csonline
BrandPost: 1Password integrates with Okta SSO
17/03/2023
CSH CYBER SECURITY HUB
What is phishing?
17/03/2023
Data Breach Today
Microsoft, CrowdStrike Lead Endpoint Protection Gartner MQ
17/03/2023
Data Breach Today
Healthcare Leaders Call for Cybersecurity Standards
17/03/2023
Data Breach Today
Breach Roundup: Med Devices, Hospitals and a Death Registry
17/03/2023
Data Breach Today
Magniber Ransomware Group Exploiting Microsoft Zero Day
17/03/2023
We LIve Security
What TikTok knows about you – and what you should know about TikTok
Highlights from TikTok CEO’s Congress grilling – Week in security with Tony Anscombe
Understanding Managed Detection and Response – and what to look for in an MDR solution
Twitter ends free SMS 2FA: Here’s how you can protect your account now
Banking turmoil opens opportunities for fraud – Week in security with Tony Anscombe
SVB collapse is a scammer’s dream: Don’t get caught out
Krebs on Security
Google Suspends Chinese E-Commerce App Pinduoduo Over Malware
Why You Should Opt Out of Sharing Data With Your Mobile Provider
Feds Charge NY Man as BreachForums Boss “Pompompurin”
Microsoft Patch Tuesday, March 2023 Edition
Two U.S. Men Charged in 2022 Hacking of DEA Portal
Who’s Behind the NetWire Remote Access Trojan?
Info Security Magazine
Security Flaws Cost Fifth of Execs Business
UK Parliament Bans TikTok from its Network and Devices
IRS Phishing Emails Used to Distribute Emotet
GitHub Updates Security Protocol For Operations Over SSH
WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
CISA Unveils Ransomware Notification Initiative
Cyber Talk
How one CEO founded a successful cyber security company
How AI is helping companies fight document fraud
What is reverse tabnabbing and how can you stop it?
Improving security velocity with agentless workloads
How to invest in ChatGPT (and should you?)