Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST CYBER NEWS
01
/
16
:
11:03 am
:
International agierende Internetbetrüger geschnappt – Source: www.csoonline.com
01
/
16
:
11:03 am
:
Neuer EU-Plan für mehr Cybersicherheit im Gesundheitswesen – Source: www.csoonline.com
01
/
16
:
11:03 am
:
FTC orders GoDaddy to fix its infosec practices – Source: www.csoonline.com
01
/
16
:
11:03 am
:
Cybersecurity hiring is deeply flawed, demoralizing, and needs to be fixed – Source: www.csoonline.com
01
/
16
:
11:03 am
:
SIEM buyer’s guide: Top 15 security information and event management tools — and how to choose – Source: www.csoonline.com
01
/
16
:
11:03 am
:
CISA warns second BeyondTrust vulnerability also exploited in the wild – Source: www.csoonline.com
01
/
16
:
9:03 am
:
6 Strategic Innovations Transforming the Fintech Industry – Source:hackread.com
01
/
16
:
9:03 am
:
Scammers Exploit California Wildfires, Posing as Fire Relief Services – Source:hackread.com
01
/
16
:
8:03 am
:
Your Ultimate Guide to NIS2 Compliance: Key Steps and Insights – Source: heimdalsecurity.com
01
/
16
:
7:03 am
:
Head of US Cybersecurity Agency Says She Hopes It Keeps up Election Work Under Trump – Source: www.securityweek.com
01
/
16
:
7:03 am
:
FBI Uses Malware’s Own ‘Self-Delete’ Trick to Erase Chinese PlugX From US Computers – Source: www.securityweek.com
01
/
16
:
7:03 am
:
DORA’s Deadline Looms: Navigating the EU’s Mandate for Threat Led Penetration Testing – Source: www.securityweek.com
01
/
16
:
7:03 am
:
Cyber Insights 2025: Open Source and Software Supply Chain Security – Source: www.securityweek.com
01
/
16
:
7:03 am
:
Google OAuth Flaw Leads to Account Takeover When Domain Ownership Changes – Source: www.securityweek.com
01
/
16
:
7:03 am
:
Chrome 132 Patches 16 Vulnerabilities – Source: www.securityweek.com
01
/
16
:
7:03 am
:
Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities – Source: www.securityweek.com
01
/
16
:
7:03 am
:
US, Japan, South Korea Blame North Korean Hackers for $660M Crypto Heists – Source: www.securityweek.com
01
/
16
:
7:03 am
:
5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025 – Source: www.techrepublic.com
01
/
16
:
7:03 am
:
UK Considers Banning Ransomware Payments – Source: www.techrepublic.com
01
/
16
:
7:03 am
:
Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks – Source: www.techrepublic.com
01
/
16
:
7:03 am
:
Enhancing Health Care Cybersecurity: Bridging HIPAA Gaps with Innovation – Source: www.techrepublic.com
01
/
16
:
7:03 am
:
CyberGhost VPN Review (2025): Features, Pricing, and Security – Source: www.techrepublic.com
01
/
16
:
5:03 am
:
Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices – Source: securityaffairs.com
01
/
16
:
5:03 am
:
Microsoft Patch Tuesday updates for January 2025 fixed three actively exploited flaws – Source: securityaffairs.com
01
/
16
:
5:03 am
:
U.S. CISA adds Fortinet FortiOS to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
01
/
16
:
5:03 am
:
Codefinger ransomware gang uses compromised AWS keys to encrypt S3 bucket – Source: securityaffairs.com
01
/
16
:
5:03 am
:
CVE-2024-44243 macOS flaw allows persistent malware installation – Source: securityaffairs.com
01
/
16
:
4:04 am
:
GoDaddy slapped with wet lettuce for years of lax security and ‘several major breaches’ – Source: go.theregister.com
01
/
16
:
4:04 am
:
DJI loosens flight restrictions, decides to trust operators to follow FAA rules – Source: go.theregister.com
01
/
16
:
4:04 am
:
China’s Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says – Source: go.theregister.com
01
/
16
:
4:04 am
:
Even modest makeup can thwart facial recognition – Source: go.theregister.com
01
/
16
:
4:04 am
:
Windows Patch Tuesday hits snag with Citrix software, workarounds published – Source: go.theregister.com
01
/
16
:
4:04 am
:
Crypto klepto North Korea stole $659M over just 5 heists last year – Source: go.theregister.com
01
/
16
:
3:03 am
:
Attackers Hijack Google Advertiser Accounts to Spread Malware – Source: www.darkreading.com
01
/
16
:
3:03 am
:
CISA: Second BeyondTrust Vulnerability Added to KEV Catalog – Source: www.darkreading.com
01
/
16
:
3:03 am
:
Extension Poisoning Campaign Highlights Gaps in Browser Security – Source: www.darkreading.com
01
/
16
:
3:03 am
:
North Korea’s Lazarus APT Evolves Developer-Recruitment Attacks – Source: www.darkreading.com
01
/
16
:
3:03 am
:
OWASP’s New LLM Top 10 Shows Emerging AI Threats – Source: www.darkreading.com
01
/
16
:
3:03 am
:
1Password’s Trelica Buy Part of Broader Shadow IT Play – Source: www.darkreading.com
01
/
16
:
2:03 am
:
7 Essential Security Operations Center Tools for 2025 – Source: securityboulevard.com
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
DEVSECOPS
CISO2CISO Advisors recomended posts
Microsoft
Microsoft Zero Trust Maturity Model
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
Lacework
CISO’s Playbookto Cloud Security by Lacework
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
Marcos Jaimovich
Remember: Compliance is a checkbox, Real Cybersecurity is a journey.
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
CISO STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
CYBER ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
SOC CSIRT OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
CYBERSECURITY TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
CYBERSECURITY VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
CYBERSECURITY MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
CYBER ORGANIZATIONS
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
CISO2CISO STRATEGIC VALLEY
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
Anish Roy
Quality Assurance for Software Development Must Include Cybersecurity – Why Cybersecurity and Software Quality Assurance...
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
Lawrence C. Miller
Data Leakage for Dummies by Lawrence C. Miller
Apress
Zero Trust Security – An Enterprise Guide – Jason Garbis & Jerry Chapman – apress
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness – Global Survey of Cybersecurity Leaders by...
Harvard Business Review
Boards Are Having the Wrong Conversations About Cybersecurity – Board interactions with the CISO are...
NCSC
Cyber Security Toolkit for Boards by NCSC – Resources designed to help board members govern...
CISO2CISO SOC OPERATIONS VALLEY
PICUS
The Complete Active Directory Security Handbook – Exploitation – Detection and Migitation Strategies by PICUS
Purple Knight
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory...
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
Kaspersky
Incident Response 2022 Report by Kaspersky
Cyber Chief Magazine
Prevent Mallware with System Hardering – Strengthen Security by Cyber Chief Magazine
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
TIDAL CYBER
The Ultimate Guide to CYBER THREAT Profiling by TIDAL CYBER
IGNITE Technologies
Incident Response Cheatsheet Windows & Linux by Hackingarticles.in – Ignite Technologies
LATEST CYBER NEWS
CSO - Online
16/01/2025
International agierende Internetbetrüger geschnappt – Source: www.csoonline.com
CSO - Online
16/01/2025
Neuer EU-Plan für mehr Cybersicherheit im Gesundheitswesen – Source: www.csoonline.com
CSO - Online
16/01/2025
FTC orders GoDaddy to fix its infosec practices – Source: www.csoonline.com
CSO - Online
16/01/2025
Cybersecurity hiring is deeply flawed, demoralizing, and needs to be fixed – Source: www.csoonline.com
CSO - Online
16/01/2025
SIEM buyer’s guide: Top 15 security information and event management tools — and how to...
CSO - Online
16/01/2025
CISA warns second BeyondTrust vulnerability also exploited in the wild – Source: www.csoonline.com
Hackread
16/01/2025
6 Strategic Innovations Transforming the Fintech Industry – Source:hackread.com
Hackread
16/01/2025
Scammers Exploit California Wildfires, Posing as Fire Relief Services – Source:hackread.com
HeimdalSecurity.com
16/01/2025
Your Ultimate Guide to NIS2 Compliance: Key Steps and Insights – Source: heimdalsecurity.com
securityweek.com
16/01/2025
Head of US Cybersecurity Agency Says She Hopes It Keeps up Election Work Under Trump...
securityweek.com
16/01/2025
FBI Uses Malware’s Own ‘Self-Delete’ Trick to Erase Chinese PlugX From US Computers – Source:...
securityweek.com
16/01/2025
DORA’s Deadline Looms: Navigating the EU’s Mandate for Threat Led Penetration Testing – Source: www.securityweek.com
securityweek.com
16/01/2025
Cyber Insights 2025: Open Source and Software Supply Chain Security – Source: www.securityweek.com
securityweek.com
16/01/2025
Google OAuth Flaw Leads to Account Takeover When Domain Ownership Changes – Source: www.securityweek.com
securityweek.com
16/01/2025
Chrome 132 Patches 16 Vulnerabilities – Source: www.securityweek.com
securityweek.com
16/01/2025
Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities – Source: www.securityweek.com
securityweek.com
16/01/2025
US, Japan, South Korea Blame North Korean Hackers for $660M Crypto Heists – Source: www.securityweek.com
Security TechRepublic
16/01/2025
5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025 – Source: www.techrepublic.com
Security TechRepublic
16/01/2025
UK Considers Banning Ransomware Payments – Source: www.techrepublic.com
Security TechRepublic
16/01/2025
Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks – Source: www.techrepublic.com
Security TechRepublic
16/01/2025
Enhancing Health Care Cybersecurity: Bridging HIPAA Gaps with Innovation – Source: www.techrepublic.com
Security TechRepublic
16/01/2025
CyberGhost VPN Review (2025): Features, Pricing, and Security – Source: www.techrepublic.com
SecurityAffairs.com
16/01/2025
Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices – Source:...
SecurityAffairs.com
16/01/2025
Microsoft Patch Tuesday updates for January 2025 fixed three actively exploited flaws – Source: securityaffairs.com
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by...
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Lacework
CISO’s Playbookto Cloud Security by Lacework
MITRE - Carson Zimmerman
Ten Strategies of a World-Class Cybersecurity Operations Center by MITRE
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
The Claroty Research Team
EVIL PLC ATTACK
EU AI Act – EU 2024/1689
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
CISO STRATEGICS
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Privacy
Risk & Compliance
Resilience
Social Engineering
Osint - Humint
CYBER ARCHITECTURE
IOT Security
MAC-OS Security
Metaverse Security
Mitre Att&ck
Mobile & 5G Security
Network Security
NIST Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT OPERATIONS
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Mallware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY TOOLS
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY VENDORS
Fortinet
Guardicore
IBM
Mcafee - Trellix
Mandiant
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY MSSP
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CYBER REGULATIONS
PCI - DSS
ISO 27001
SOX
CYBER ORGANIZATIONS
NSA
NIST
SANS
WEF
EVENTS & CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
USERS MOST VOTED POST
Vendict
The 2024 CISO Burnout Report by Vendict
SANS
Sleeping with the enemy – A best practice guide for attacker engagement by Nick Klein.
NIST
Guide for Developing Security Plans by NIST
OFFENSIVE SECURITY
Offensive Security OSCP Exam with AD Preparation by Michael Mancao
LMNTRIX
How to Become a CISO by LMNTRIX
Bastian Ballman - Springer
Undestanding Networks Hacks – Attack and Defense with Python 2nd Edition by Bastian Ballman –...
WILEY
Anomaly Detection in Cybersecurity for Dummies by Ram Vaidyanathan
VIRUSTOTAL
Ransomware in a Global Context Report 2021 by Virustotal
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
SentinelOne
4 ways to Drive a Cybersecurity Centric Culture in Your Organization by SentinelOne
Nozomi Networks
Nozomi OT IoT Security Report – Cyber War Insights, Threats and Trends, Recommendations
Joas Antonio
Cybersecurity for Kids 1 by Joas Antonio
International Energy Agency
Enhancing Cyber Resilience in Electricy Systems by International Energy Agency
Dutch Blockchain Coalition
Blockchain Security – A Framework for Trust and Adoption by Dutch Blockchain Coalition
Claudio Benavente
Attack Surface Management by Claudio Benavente Cyber Security Advisor
SLOWMIST
Blockchain Security and AML Analysis Report 2022 Mid-Year by SLOWMIST
trendmicro
A global study EVERYTHING IS CONNECTED – Uncovering the ransomware threat from global supply chains...
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by Dmitry Janushkevich...
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk Alliance Resource...
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
ALEX SIDORENKO & ELENA DEMIDENKO
GUIDE TO EFFECTIVE RISK MANAGEMENT 3.0 – ALEX SIDORENKO – ELENA DEMIDENKO
LATEST CYBER NEWS
SecurityAffairs.com
16/01/2025
U.S. CISA adds Fortinet FortiOS to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
SecurityAffairs.com
16/01/2025
Codefinger ransomware gang uses compromised AWS keys to encrypt S3 bucket – Source: securityaffairs.com
SecurityAffairs.com
16/01/2025
CVE-2024-44243 macOS flaw allows persistent malware installation – Source: securityaffairs.com
The Register Security
16/01/2025
GoDaddy slapped with wet lettuce for years of lax security and ‘several major breaches’ –...
The Register Security
16/01/2025
DJI loosens flight restrictions, decides to trust operators to follow FAA rules – Source: go.theregister.com
The Register Security
16/01/2025
China’s Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says –...
The Register Security
16/01/2025
Even modest makeup can thwart facial recognition – Source: go.theregister.com
The Register Security
16/01/2025
Windows Patch Tuesday hits snag with Citrix software, workarounds published – Source: go.theregister.com
The Register Security
16/01/2025
Crypto klepto North Korea stole $659M over just 5 heists last year – Source: go.theregister.com
Dark Reading Security
16/01/2025
Attackers Hijack Google Advertiser Accounts to Spread Malware – Source: www.darkreading.com
Dark Reading Security
16/01/2025
CISA: Second BeyondTrust Vulnerability Added to KEV Catalog – Source: www.darkreading.com
Dark Reading Security
16/01/2025
Extension Poisoning Campaign Highlights Gaps in Browser Security – Source: www.darkreading.com
Dark Reading Security
16/01/2025
North Korea’s Lazarus APT Evolves Developer-Recruitment Attacks – Source: www.darkreading.com
Dark Reading Security
16/01/2025
OWASP’s New LLM Top 10 Shows Emerging AI Threats – Source: www.darkreading.com
Dark Reading Security
16/01/2025
1Password’s Trelica Buy Part of Broader Shadow IT Play – Source: www.darkreading.com
Security Boulevard
16/01/2025
7 Essential Security Operations Center Tools for 2025 – Source: securityboulevard.com
Security Boulevard
16/01/2025
News alert: Aembit announces speakers for NHIcon event, highlighting non-human identity security – Source: securityboulevard.com
Security Boulevard
16/01/2025
News alert: Sweet Security’s LLM-powered detection engine reduces cloud noise to 0.04% – Source: securityboulevard.com
Security Boulevard
16/01/2025
News alert: Wultra secures €3M funding to help financial firms mitigate coming quantum threats –...
Security Boulevard
16/01/2025
DEF CON 32 – Small Satellite Modeling and Defender Software – Source: securityboulevard.com
Security Boulevard
16/01/2025
FBI Deletes PlugX Malware From Computers Infected by China Group – Source: securityboulevard.com
Security Boulevard
16/01/2025
Protecting the software supply chain: Insights from our expert panel – Source: securityboulevard.com
Security Boulevard
16/01/2025
Randall Munroe’s XKCD ‘Chess Zoo’ – Source: securityboulevard.com
Security Boulevard
16/01/2025
Allstate Violates Drivers’ Privacy, Texas AG Alleges – Source: securityboulevard.com
Latest Published Posts
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Bird&Bird
General Data Protection Regulation (GDPR) Guide
Microsoft
GDPR & Generative AI
GDPR
GDPR for Third-party Risk Management
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
FS.ISAC
Navigating Cyber
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Thecyphere
How to Manage Cyber Incidents?
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
UpGuard
A Complete Guide to Data Breaches
Incibe
Ciberseguridad en Smart Toys
INCIBE & SPAIN GOVERNMENT
Defensa de endpoints en sistemas de control industrial
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
ThreatMon
GLOBAL CYBER THREAT REPORT
LATEST CYBER NEWS
Security Boulevard
16/01/2025
Intune Attack Paths — Part 1 – Source: securityboulevard.com
The Hacker News
16/01/2025
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes – Source:thehackernews.com
The Hacker News
16/01/2025
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99 – Source:thehackernews.com
grahamcluley.com
16/01/2025
The AI Fix #33: AI’s deliberate deceptions, and Elon’s “unhinged” mode – Source: grahamcluley.com
Schneier on Security
15/01/2025
Phishing False Alarm – Source: www.schneier.com
Hackread
15/01/2025
Black Basta-Style Cyberattack Hits Inboxes with 1,165 Emails in 90 Minutes – Source:hackread.com
Hackread
15/01/2025
Aembit Announces Speaker Lineup for the Inaugural NHIcon – Source:hackread.com
Hackread
15/01/2025
Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04% – Source:hackread.com
Hackread
15/01/2025
Microsoft Discovers macOS Flaw CVE-2024-44243, Bypassing SIP – Source:hackread.com
Hackread
15/01/2025
Wultra Secures €3M to Protect Financial Institutions from Quantum Threats – Source:hackread.com
Hackread
15/01/2025
Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers – Source:hackread.com
Krebs On Security
15/01/2025
Microsoft: Happy 2025. Here’s 161 Security Updates – Source: krebsonsecurity.com
Infosecurity Magazine
15/01/2025
CISA Launches Playbook to Boost AI Cybersecurity Collaboration – Source: www.infosecurity-magazine.com
Infosecurity Magazine
15/01/2025
Chinese PlugX Malware Deleted in Global Law Enforcement Operation – Source: www.infosecurity-magazine.com
Infosecurity Magazine
15/01/2025
Multi-Cloud Adoption Surges Amid Rising Security Concerns – Source: www.infosecurity-magazine.com
Infosecurity Magazine
15/01/2025
Illicit Crypto-Inflows Set to Top $51bn in a Year – Source: www.infosecurity-magazine.com
Infosecurity Magazine
15/01/2025
Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls – Source: www.infosecurity-magazine.com
Infosecurity Magazine
15/01/2025
Secureworks Exposes North Korean Links to Fraudulent Crowdfunding – Source: www.infosecurity-magazine.com
Infosecurity Magazine
15/01/2025
Microsoft Patches Eight Zero-Days to Start the Year – Source: www.infosecurity-magazine.com
Cyble Blog
15/01/2025
Fortinet’s Authentication Bypass Zero-Day: Mitigation Strategies and IoCs for Enhanced Security – Source:cyble.com
Cyble Blog
15/01/2025
Australia Launches ‘Countering Foreign Interference’ Initiative to Safeguard Sovereignty and Democracy – Source:cyble.com
CVE-2025-21298
15/01/2025
159-CVE January Patch Tuesday smashes single-month record – Source: news.sophos.com
The Hacker News
15/01/2025
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains – Source:thehackernews.com
The Hacker News
15/01/2025
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool – Source:thehackernews.com
The Hacker News
15/01/2025
The High-Stakes Disconnect For ICS/OT Security – Source:thehackernews.com
The Hacker News
15/01/2025
FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation – Source:thehackernews.com
The Hacker News
15/01/2025
3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update – Source:thehackernews.com
The Hacker News
15/01/2025
Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks – Source:thehackernews.com
The Hacker News
15/01/2025
Fortinet Warns of New Zero-Day Used in Attacks on Firewalls with Exposed Interfaces – Source:thehackernews.com
CSO - Online
15/01/2025
Die Top 10 Geschäftsrisiken in Deutschland 2025 – Source: www.csoonline.com
CSO - Online
15/01/2025
Perfide Ransomware-Attacke gegen AWS-Nutzer – Source: www.csoonline.com
CSO - Online
15/01/2025
Cisco’s homegrown AI to help enterprises navigate AI adoption – Source: www.csoonline.com
CSO - Online
15/01/2025
CISA unveils ‘Secure by Demand’ guidelines to bolster OT security – Source: www.csoonline.com
CSO - Online
15/01/2025
The CFO may be the CISO’s most important business ally – Source: www.csoonline.com
CSO - Online
15/01/2025
Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid – Source: www.csoonline.com
CSO - Online
15/01/2025
International effort erases PlugX malware from thousands of Windows computers – Source: www.csoonline.com
CSO - Online
15/01/2025
Fortinet confirms zero-day flaw used in attacks against its firewalls – Source: www.csoonline.com
cyberdefense magazine
15/01/2025
The Advent of Quantum Cryptography and Zero Trust: A New Era In The World Of...
cyberdefense magazine
15/01/2025
RSA Conference: 20th annual RSAC Innovation Sandbox and fifth annual Launch Pad contests are now...
cyberdefense magazine
15/01/2025
Exposure Management: A Strategic Approach to Cyber Security Resource Constraint – Source: www.cyberdefensemagazine.com
Latest Published Posts
HADESS
Hacker Culture
Open Sec
HACKING API
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
ALPEREN UGURLU
Hospital Security is at Risk Penetration Tests
Hacker Combat
How Are Passwords Cracked?
PURPLESEC
How To Plan & Develop An Effective Cyber Security Strategy
CIS - Center for Internet Security
How to Plan a Cybersecurity Roadmap in Four Steps
Ministry of MOS Security
INFOSEC AWARENESS POSTERS
ACSC Australia
Information Security Manual
Kaspersky
Incident Response Playbook: Dark Web Breaches
Incident Handling Process (HTB)
ninjaOne
Endpoint Hardening Checklist
OWASP
Firmware Security Testing Methodology
HADESS
Important Active Directory Attribute
TALLIN UNIVERSITY OF TECHNOLOGY
Implementing a SOAR Solution in a Security Operations Center on the Example of Cybers
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
CheatSheet
Communication Protocols inIndustrial Control System/Operational Technology
Rajneesh Gupta
IAM Security CHECKLIST
BIS
Generative artificial intelligence and cyber securityin central banking
sqrrl
Hunt Evil
Centre for Cyber Security Belgium
HOW TO RESPOND TO A RANSOMWARE ATTACK IN 12 STEPS
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
DOYENSEC
Exploiting Client-Side Path Traversal
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
Azhar Ghafoor
Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform
IGNITE Technologies
A Detailed Guide on Covenant
CIS - Center for Internet Security
CIS Critical Security Controls
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
COMPREHENSIVE GUIDE ON SSH TUNNELING
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
DAN ELLIOTT
Crack the Code
YL VENTURES
CISO Reporting Landscape 2024
CYBER LEADERSHIP INSTITUTE
CISO PLAY BOOK
CISO Edition
Reporting Cyber Risk to Boards
certnz
MODERN APPROACHES TO NETWORK ACCESS SECURITY
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
LABCIBE
ESTADO DE LA CIBERSEGURIDAD EN COSTA RICA 2023
INCIBE & SPAIN GOVERNMENT
Nuevas normativas de 2024 de ciberseguridad para vehículos
Views: 15371