Source: www.cyberdefensemagazine.com – Author: News team By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future...
Month: March 2024
What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering? – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Anna Drescher, Freelance Writer and Mental Health Specialist A few years ago, I received an email from Apple stating...
MICROSOFT 365 SECURITY CHECKLIST
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
METASPLOIT ESSENTIALS
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Windows Privilege Escalation
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Lock Your Doors
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cybersecurity Alphabet
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
John The Ripper A Pentester Guide
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Caught in the Crossfire
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
English Vocab for TECH
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
DISRUPTING MSP CYBERSECURITY
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
DIGITAL FORENSICS – AN INTRODUCTION
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
THE BASICS OF WEB HACKING
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
NPC PRIVACY TOOLKIT
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
CYBER THREAT INTELLIGENCE ADVISORY REPORT
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
USENIX Security ’23 – Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Authors/Presenters: Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez Many thanks to USENIX for...
INTELLIGENT APPROACHES TO CYBER SECURITY
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
GDPR: a culture of non-compliance?
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Friday Squid Blogging: New Extinct Species of Vampire Squid Discovered – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Paleontologists have discovered a 183-million-year-old species of vampire squid. Prior research suggests that the vampyromorph lived in the shallows off...
NIST Cybersecurity Framework 2.0 – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier NIST has released version 2.0 of the Cybersecurity Framework: The CSF 2.0, which supports implementation of the National Cybersecurity Strategy,...
How the “Frontier” Became the Slogan of Uncontrolled AI – Source: www.schneier.com
Source: www.schneier.com – Author: B. Schneier Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration will drive...
News farm impersonates 60+ major outlets: BBC, CNN, CNBC, Guardian… – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Ax Sharma BleepingComputer has discovered a content farm operating some 60+ domains named after popular media outlets, including the BBC, CNBC, CNN,...
Hackers target FCC, crypto firms in advanced Okta phishing attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A new phishing kit named CryptoChameleon is being used to target Federal Communications Commission (FCC) employees, using specially crafted single sign-on...
Windows Kernel bug fixed last month exploited as zero-day since August – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was...
CISA warns of Microsoft Streaming bug exploited in malware attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan CISA ordered U.S. Federal Civilian Executive Branch (FCEB) agencies to secure their Windows systems against a high-severity vulnerability in the...
Germany takes down cybercrime market with over 180,000 users – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Düsseldorf Police in Germany have seized Crimemarket, a massive German-speaking illicit trading platform with over 180,000 users, arresting six...
Microsoft fixes Outlook clients not syncing over Exchange ActiveSync – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft has fixed an issue causing some Microsoft 365 users’ Outlook desktop clients to stop connecting to email servers via...
Microsoft pulls Edge update causing ‘Out of Memory’ crashes – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Microsoft has pulled the Microsoft Edge 122.0.2365.63 update after users reported receiving “Out of memory” errors when browsing the web...
U.S. charges Iranian for hacks on defense orgs, offers $10M for info – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The U.S. Department of Justice (DoJ) has unveiled an indictment against Alireza Shafie Nasab, a 39-year-old Iranian national, for his...
CISO Corner: Operationalizing NIST CSF 2.0; AI Models Run Amok – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Welcome to CISO Corner, Dark Reading’s weekly digest of articles tailored specifically to security operations...





























