Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST CYBER NEWS
05
/
20
:
5:03 am
:
Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts – Source:thehackernews.com
05
/
20
:
5:03 am
:
Sophos Partners with Capsule on New Cyber Insurance Program – Source: news.sophos.com
05
/
20
:
4:03 am
:
Mozilla fixed zero-days recently demonstrated at Pwn2Own Berlin 2025 – Source: securityaffairs.com
05
/
20
:
4:03 am
:
Japan passed a law allowing preemptive offensive cyber actions – Source: securityaffairs.com
05
/
20
:
4:03 am
:
James Comey is under investigation by Secret Service for a seashell photo showing “8647” – Source: securityaffairs.com
05
/
20
:
4:03 am
:
Pwn2Own Berlin 2025: total prize money reached $1,078,750 – Source: securityaffairs.com
05
/
20
:
2:03 am
:
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak – Source: www.securityweek.com
05
/
20
:
2:03 am
:
Relaxing the Burden of Compliance with Automation – Source: securityboulevard.com
05
/
20
:
2:03 am
:
Feeling Relieved with Solid Secrets Management – Source: securityboulevard.com
05
/
20
:
2:03 am
:
Adapting to New Security Challenges in the Cloud – Source: securityboulevard.com
05
/
20
:
2:03 am
:
Getting Better at Preventing Identity Theft – Source: securityboulevard.com
05
/
20
:
2:03 am
:
10 SaaS Security Risks Most Organizations Miss | Grip – Source: securityboulevard.com
05
/
20
:
2:03 am
:
Revenue Risk Hidden in Fly by Night New eSkimming Tools – Source: securityboulevard.com
05
/
20
:
2:03 am
:
ADR Blocks Spike in Cyber Attacks and Sharp Rise in Path Traversal Attacks | April Attack Data | Contrast Security – Source: securityboulevard.com
05
/
20
:
2:03 am
:
Randall Munroe’s XKCD ‘Modern’ – Source: securityboulevard.com
05
/
20
:
2:03 am
:
Developing with Docker and Sonatype: Building secure software at scale – Source: securityboulevard.com
05
/
20
:
2:03 am
:
MY TAKE: Semantics aside, “agentic AI” is already reshaping how we work, think, envision what’s next – Source: securityboulevard.com
05
/
20
:
1:03 am
:
Serviceaide Leak Exposes Records of 500,000 Catholic Health Patients – Source:hackread.com
05
/
20
:
1:03 am
:
DDoSecrets Adds 410GB of TeleMessage Breach Data to Index – Source:hackread.com
05
/
20
:
1:03 am
:
UK Legal Aid Agency Hit by Cyberattack, Sensitive Data Stolen – Source:hackread.com
05
/
20
:
1:03 am
:
Man Behind SEC Bitcoin Hoax Tweet Sentenced in SIM Swap Hack – Source:hackread.com
05
/
20
:
1:03 am
:
CVE-2025-4427 and CVE-2025-4428 Detection: Ivanti EPMM Exploit Chain Leading to RCE – Source: socprime.com
05
/
20
:
1:03 am
:
New Malware on PyPI Poses Threat to Open-Source Developers – Source: www.infosecurity-magazine.com
05
/
20
:
1:03 am
:
RCE Vulnerability Found in RomethemeKit For Elementor Plugin – Source: www.infosecurity-magazine.com
05
/
20
:
12:04 am
:
What Is Generative AI? Business Guide & Security Tips – Source:levelblue.com
05
/
20
:
12:03 am
:
CISA has a new No. 2 … but still no official top dog – Source: go.theregister.com
05
/
20
:
12:03 am
:
SEC SIM-swapper who Googled ‘signs that the FBI is after you’ put behind bars – Source: go.theregister.com
05
/
20
:
12:03 am
:
Millions at risk after attackers steal UK legal aid data dating back 15 years – Source: go.theregister.com
05
/
20
:
12:03 am
:
IT chiefs of UK’s massive health service urge vendors to make public security pledge – Source: go.theregister.com
05
/
20
:
12:03 am
:
China launches an AI cloud into orbit. 12 sats for now, 2,800 in coming years – Source: go.theregister.com
05
/
19
:
10:03 pm
:
‘Operation RoundPress’ Targets Ukraine in XSS Webmail Attacks – Source: www.darkreading.com
05
/
19
:
10:03 pm
:
S. Dakota CIO Gottumukkala Signs on as CISA Deputy Director – Source: www.darkreading.com
05
/
19
:
10:03 pm
:
Legal Aid Agency Warns Lawyers, Defendants on Data Breach – Source: www.darkreading.com
05
/
19
:
10:03 pm
:
CVE Disruption Threatens Foundations of Defensive Security – Source: www.darkreading.com
05
/
19
:
6:03 pm
:
MY TAKE: Semantics aside, “agentic AI” is already reshaping how we work, think, envision what’s next – Source: www.lastwatchdog.com
05
/
19
:
6:03 pm
:
The NSA’s “Fifty Years of Mathematical Cryptanalysis (1937–1987)” – Source: www.schneier.com
05
/
19
:
5:03 pm
:
RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer – Source:thehackernews.com
05
/
19
:
5:03 pm
:
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access – Source:thehackernews.com
05
/
19
:
5:03 pm
:
Why CTEM is the Winning Bet for CISOs in 2025 – Source:thehackernews.com
05
/
19
:
5:03 pm
:
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards – Source:thehackernews.com
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
DEVSECOPS
CISO2CISO Advisors recomended posts
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined...
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
CISO STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
CYBER ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
SOC CSIRT OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
CYBERSECURITY TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
CYBERSECURITY VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
CYBERSECURITY MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
CYBER ORGANIZATIONS
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
CISO2CISO STRATEGIC VALLEY
Khoury-Avila-Brunelle-Mamadou
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
Marcos Jaimovich
Artificial intelligence was never a bad think – A self fulfilling Prophesy (My personal vision).
KATY ANTON - JIM MANICO - JIM BIRD
OWASP PRO Active Controls for Developers v. 3 – Securing Coding Best Practices – 10...
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
McKinsey
Cybersecurity in a Digital Era by McKinsey. Digital McKinsey and Global Risk Practice.
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
Republica de Chile
Construyendo la Ciberseguridad en Chile
Shawn Powers & Michael Jablonski
The Real Cyber War – The Political Economy of Internet Freedom by Shawn Powers &...
CISO2CISO SOC OPERATIONS VALLEY
MSSP ALERT
TOP 250 MSSPs 2022 edition by MSSP Alert – A CyberRisk Alliance Resource
not known
Threat Intelligence & Dark web Monitoring Tools
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
cybereason
Ransomware and the Modern SOC – How Ransomware is Driving the Requirements for SOC Modernization...
Purple Knight
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory...
Cyber Chief Magazine
Prevent Mallware with System Hardering – Strengthen Security by Cyber Chief Magazine
LATEST CYBER NEWS
The Hacker News
20/05/2025
Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts – Source:thehackernews.com
Capsule
20/05/2025
Sophos Partners with Capsule on New Cyber Insurance Program – Source: news.sophos.com
SecurityAffairs.com
20/05/2025
Mozilla fixed zero-days recently demonstrated at Pwn2Own Berlin 2025 – Source: securityaffairs.com
SecurityAffairs.com
20/05/2025
Japan passed a law allowing preemptive offensive cyber actions – Source: securityaffairs.com
SecurityAffairs.com
20/05/2025
James Comey is under investigation by Secret Service for a seashell photo showing “8647” –...
SecurityAffairs.com
20/05/2025
Pwn2Own Berlin 2025: total prize money reached $1,078,750 – Source: securityaffairs.com
securityweek.com
20/05/2025
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak – Source: www.securityweek.com
Security Boulevard
20/05/2025
Relaxing the Burden of Compliance with Automation – Source: securityboulevard.com
Security Boulevard
20/05/2025
Feeling Relieved with Solid Secrets Management – Source: securityboulevard.com
Security Boulevard
20/05/2025
Adapting to New Security Challenges in the Cloud – Source: securityboulevard.com
Security Boulevard
20/05/2025
Getting Better at Preventing Identity Theft – Source: securityboulevard.com
Security Boulevard
20/05/2025
10 SaaS Security Risks Most Organizations Miss | Grip – Source: securityboulevard.com
Security Boulevard
20/05/2025
Revenue Risk Hidden in Fly by Night New eSkimming Tools – Source: securityboulevard.com
Security Boulevard
20/05/2025
ADR Blocks Spike in Cyber Attacks and Sharp Rise in Path Traversal Attacks | April...
Security Boulevard
20/05/2025
Randall Munroe’s XKCD ‘Modern’ – Source: securityboulevard.com
Security Boulevard
20/05/2025
Developing with Docker and Sonatype: Building secure software at scale – Source: securityboulevard.com
Security Boulevard
20/05/2025
MY TAKE: Semantics aside, “agentic AI” is already reshaping how we work, think, envision what’s...
Hackread
20/05/2025
Serviceaide Leak Exposes Records of 500,000 Catholic Health Patients – Source:hackread.com
Hackread
20/05/2025
DDoSecrets Adds 410GB of TeleMessage Breach Data to Index – Source:hackread.com
Hackread
20/05/2025
UK Legal Aid Agency Hit by Cyberattack, Sensitive Data Stolen – Source:hackread.com
Hackread
20/05/2025
Man Behind SEC Bitcoin Hoax Tweet Sentenced in SIM Swap Hack – Source:hackread.com
socprime.com
20/05/2025
CVE-2025-4427 and CVE-2025-4428 Detection: Ivanti EPMM Exploit Chain Leading to RCE – Source: socprime.com
Infosecurity Magazine
20/05/2025
New Malware on PyPI Poses Threat to Open-Source Developers – Source: www.infosecurity-magazine.com
Infosecurity Magazine
20/05/2025
RCE Vulnerability Found in RomethemeKit For Elementor Plugin – Source: www.infosecurity-magazine.com
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by...
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Lacework
CISO’s Playbookto Cloud Security by Lacework
MITRE - Carson Zimmerman
Ten Strategies of a World-Class Cybersecurity Operations Center by MITRE
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
The Claroty Research Team
EVIL PLC ATTACK
EU AI Act – EU 2024/1689
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
CISO STRATEGICS
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Privacy
Risk & Compliance
Resilience
Social Engineering
Osint - Humint
CYBER ARCHITECTURE
IOT Security
MAC-OS Security
Metaverse Security
Mitre Att&ck
Mobile & 5G Security
Network Security
NIST Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT OPERATIONS
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Mallware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY TOOLS
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY VENDORS
Fortinet
Guardicore
IBM
Mcafee - Trellix
Mandiant
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY MSSP
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CYBER REGULATIONS
PCI - DSS
ISO 27001
SOX
CYBER ORGANIZATIONS
NSA
NIST
SANS
WEF
EVENTS & CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
USERS MOST VOTED POST
Vendict
The 2024 CISO Burnout Report by Vendict
TENABLE RESEARCH
THE RANSOMWARE ECOSYSTEM BY TENABLE RESEARCH
WILEY
Modern Malware for Dummies
HADESS
Attacked From Behind Application using RCE for Exploit Public-Facing Application case study
RANK
Threat Hunting Playbook – Learn how to embrace a proactive security posture by Rank.
LetsDefend
SIEM FOR BEGINNERS PREPARED FOR SOC TEAMS BY LETSDEFEND
eForensics Magazine
Open Source Forensic Tools by eForensics Magazine
ISACA
COBIT ISACA 5 – A Business Framework for the Governance and Management of Enterprise IT
SYSDIG
Kubernetes Security Guide by Sysdig
Marcus P Zillman
Open Source Intelligence OSINT mini guide 2022 by Marcus P. Zillman
HUY KHA
Microsoft Active Directory – Security Self Assesment Guide 2022 by Huy Kha
CYBERUP
Legitimate Cyber Security Activities in the 21st Century by CyberUP
OAS & GLOBAL PARTNERS
National Cybersecurity Strategies – Lessons Learned and Reflections from the Americas and Other Regions by...
ONAPSIS
Four Best Practices to Align Your SAP Applications With the NIST Framework by ONAPSIS
Practical DevSecOps
The 4 Pillards of DevSecOps – CAMS: 1.Culture, 2.Automation, 3.Measurement and 4.Sharing) By Practical DevSecOps
SANS DFIR
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
SOPHOS
The State of Ransomware in Retail 2022 by SOPHOS –
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
TACTICX
Offensive Microsoft Active Directory 101 – Security Holes Everywere by TACTICX – Active Directory Attack.
CIS
CIS Critical Security Controls Version 8 – Mapping to PCI Data Security Standar (PCI DSS)...
HADESS
TALE OF PHIHING – Some Phishing Techniques & Awareness by HADESS.IO
LATEST CYBER NEWS
AT&T Cybersecurity
20/05/2025
What Is Generative AI? Business Guide & Security Tips – Source:levelblue.com
The Register Security
20/05/2025
CISA has a new No. 2 … but still no official top dog – Source:...
The Register Security
20/05/2025
SEC SIM-swapper who Googled ‘signs that the FBI is after you’ put behind bars –...
The Register Security
20/05/2025
Millions at risk after attackers steal UK legal aid data dating back 15 years –...
The Register Security
20/05/2025
IT chiefs of UK’s massive health service urge vendors to make public security pledge –...
The Register Security
20/05/2025
China launches an AI cloud into orbit. 12 sats for now, 2,800 in coming years...
Dark Reading Security
19/05/2025
‘Operation RoundPress’ Targets Ukraine in XSS Webmail Attacks – Source: www.darkreading.com
Dark Reading Security
19/05/2025
S. Dakota CIO Gottumukkala Signs on as CISA Deputy Director – Source: www.darkreading.com
Dark Reading Security
19/05/2025
Legal Aid Agency Warns Lawyers, Defendants on Data Breach – Source: www.darkreading.com
Dark Reading Security
19/05/2025
CVE Disruption Threatens Foundations of Defensive Security – Source: www.darkreading.com
The Last Watchdog
19/05/2025
MY TAKE: Semantics aside, “agentic AI” is already reshaping how we work, think, envision what’s...
Schneier on Security
19/05/2025
The NSA’s “Fifty Years of Mathematical Cryptanalysis (1937–1987)” – Source: www.schneier.com
The Hacker News
19/05/2025
RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer – Source:thehackernews.com
The Hacker News
19/05/2025
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access – Source:thehackernews.com
The Hacker News
19/05/2025
Why CTEM is the Winning Bet for CISOs in 2025 – Source:thehackernews.com
The Hacker News
19/05/2025
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards – Source:thehackernews.com
The Hacker News
19/05/2025
⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More – Source:thehackernews.com
grahamcluley.com
19/05/2025
The AI Fix nominated for top podcast award. Vote now! – Source: grahamcluley.com
Hackread
19/05/2025
Over 40,000 iOS Apps Found Exploiting Private Entitlements, Zimperium – Source:hackread.com
Hackread
19/05/2025
Firefox Tests AI-Powered Perplexity Search Engine Directly in Browser – Source:hackread.com
Hackread
19/05/2025
Coordinated Intelligence: The Next Frontier for Onchain AI Agents – Source:hackread.com
Infosecurity Magazine
19/05/2025
GDPR Changes Risk Undermining its Principles, Civil Society Groups Warn – Source: www.infosecurity-magazine.com
Infosecurity Magazine
19/05/2025
SEC SIM Swapper Gets 14 Months for X Account Hijack – Source: www.infosecurity-magazine.com
Infosecurity Magazine
19/05/2025
Legal Aid Agency Admits Major Breach of Applicant Data – Source: www.infosecurity-magazine.com
Latest Published Posts
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Bird&Bird
General Data Protection Regulation (GDPR) Guide
Microsoft
GDPR & Generative AI
GDPR
GDPR for Third-party Risk Management
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
FS.ISAC
Navigating Cyber
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Thecyphere
How to Manage Cyber Incidents?
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
UpGuard
A Complete Guide to Data Breaches
Incibe
Ciberseguridad en Smart Toys
INCIBE & SPAIN GOVERNMENT
Defensa de endpoints en sistemas de control industrial
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
ThreatMon
GLOBAL CYBER THREAT REPORT
LATEST CYBER NEWS
Infosecurity Magazine
19/05/2025
#Infosec2025: How CISOs Can Stay Ahead of Evolving Cloud Threats – Source: www.infosecurity-magazine.com
CSO - Online
19/05/2025
8 security risks overlooked in the rush to implement AI – Source: www.csoonline.com
CSO - Online
19/05/2025
Passwortfreie Authentifizierung: So gelingt der Umstieg auf PKI – Source: www.csoonline.com
securityweek.com
19/05/2025
Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data – Source: www.securityweek.com
SecurityAffairs.com
19/05/2025
Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION – Source: securityaffairs.com
SecurityAffairs.com
19/05/2025
Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide –...
The Register Security
19/05/2025
Eeek! p0wned Alabama hit by unspecified ‘cybersecurity event’ – Source: go.theregister.com
The Register Security
19/05/2025
China launches an AI cloud into orbit -12 sats for now, 2,800 in coming years...
The Register Security
19/05/2025
Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’ –...
Security Boulevard
19/05/2025
Achieving Operational Freedom with Advanced IAM – Source: securityboulevard.com
Security Boulevard
19/05/2025
Smart Strategies for Comprehensive Data Protection – Source: securityboulevard.com
Security Boulevard
19/05/2025
Leveraging Powerful Tools for Risk Management – Source: securityboulevard.com
Security Boulevard
19/05/2025
Securing Cloud Infrastructure to Handle Business Needs – Source: securityboulevard.com
Security Boulevard
19/05/2025
BSidesLV24 – GroundFloor – Discover The Hidden Vulnerability Intelligence Within CISA’s KEV Catalog – Source:...
Security Boulevard
19/05/2025
Fairfax County, Va., CISO Michael Dent on Leadership – Source: securityboulevard.com
Hackread
18/05/2025
Russia-Linked SpyPress Malware Exploits Webmails to Spy on Ukraine – Source:hackread.com
Hackread
18/05/2025
FBI Warns of AI Voice Scams Impersonating US Govt Officials – Source:hackread.com
securityweek.com
18/05/2025
Russian APT Exploiting Mail Servers Against Government, Defense Organizations – Source: www.securityweek.com
The Register Security
18/05/2025
Boffins devise technique that lets users prove location without giving it away – Source: go.theregister.com
Google Security Blog
18/05/2025
Advanced Protection: Google’s Strongest Security for Mobile Devices – Source:security.googleblog.com
Google Security Blog
18/05/2025
What’s New in Android Security and Privacy in 2025 – Source:security.googleblog.com
SecurityAffairs.com
18/05/2025
US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials...
SecurityAffairs.com
18/05/2025
Shields up US retailers. Scattered Spider threat actors can target them – Source: securityaffairs.com
SecurityAffairs.com
18/05/2025
U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited...
Security Boulevard
18/05/2025
Ensuring Satisfaction in Managing Non-Human Identities – Source: securityboulevard.com
Security Boulevard
18/05/2025
Are You Capable of Securing Your Digital Assets? – Source: securityboulevard.com
Security Boulevard
18/05/2025
OAuth 2.0 Overview – Source: securityboulevard.com
Security Boulevard
18/05/2025
Cyber! Take your dadgum Medicine! – Source: securityboulevard.com
Security Boulevard
18/05/2025
The Coinbase Data Breach: A Breakdown of What Went Wrong – Source: securityboulevard.com
Security Boulevard
18/05/2025
BSidesLV24 – GroundFloor – Adversaries Also Lift & Shift: Cloud Threats Through The Eyes Of...
Security Boulevard
18/05/2025
Beware! A threat actor could steal the titles of your private (and draft) WordPress posts!...
Security Boulevard
18/05/2025
Are Your Security Measures Scalable for Growth? – Source: securityboulevard.com
Security Boulevard
18/05/2025
Empowering Teams with Efficient Identity Management – Source: securityboulevard.com
Schneier on Security
17/05/2025
Friday Squid Blogging: Pet Squid Simulation – Source: www.schneier.com
Schneier on Security
17/05/2025
Communications Backdoor in Chinese Power Inverters – Source: www.schneier.com
grahamcluley.com
17/05/2025
Prescription for disaster: Sensitive patient data leaked in Ascension breach – Source: www.fortra.com
Troyhunt.com
17/05/2025
Weekly Update 452 – Source: www.troyhunt.com
Hackread
17/05/2025
HubSpot vs Salesforce: Which CRM Fits Your Business? – Source:hackread.com
The Register Security
17/05/2025
Fired US govt workers, Uncle Xi wants you! – to apply for this fake consulting...
The Register Security
17/05/2025
America’s consumer watchdog drops leash on proposed data broker crackdown – Source: go.theregister.com
Latest Published Posts
HADESS
Hacker Culture
Open Sec
HACKING API
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
ALPEREN UGURLU
Hospital Security is at Risk Penetration Tests
Hacker Combat
How Are Passwords Cracked?
PURPLESEC
How To Plan & Develop An Effective Cyber Security Strategy
CIS - Center for Internet Security
How to Plan a Cybersecurity Roadmap in Four Steps
Ministry of MOS Security
INFOSEC AWARENESS POSTERS
ACSC Australia
Information Security Manual
Kaspersky
Incident Response Playbook: Dark Web Breaches
Incident Handling Process (HTB)
ninjaOne
Endpoint Hardening Checklist
OWASP
Firmware Security Testing Methodology
HADESS
Important Active Directory Attribute
TALLIN UNIVERSITY OF TECHNOLOGY
Implementing a SOAR Solution in a Security Operations Center on the Example of Cybers
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
CheatSheet
Communication Protocols inIndustrial Control System/Operational Technology
Rajneesh Gupta
IAM Security CHECKLIST
BIS
Generative artificial intelligence and cyber securityin central banking
sqrrl
Hunt Evil
Centre for Cyber Security Belgium
HOW TO RESPOND TO A RANSOMWARE ATTACK IN 12 STEPS
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
DOYENSEC
Exploiting Client-Side Path Traversal
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
Azhar Ghafoor
Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform
IGNITE Technologies
A Detailed Guide on Covenant
CIS - Center for Internet Security
CIS Critical Security Controls
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
COMPREHENSIVE GUIDE ON SSH TUNNELING
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
DAN ELLIOTT
Crack the Code
YL VENTURES
CISO Reporting Landscape 2024
CYBER LEADERSHIP INSTITUTE
CISO PLAY BOOK
CISO Edition
Reporting Cyber Risk to Boards
certnz
MODERN APPROACHES TO NETWORK ACCESS SECURITY
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
LABCIBE
ESTADO DE LA CIBERSEGURIDAD EN COSTA RICA 2023
INCIBE & SPAIN GOVERNMENT
Nuevas normativas de 2024 de ciberseguridad para vehículos
Views: 17621