Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: CISO2CISO Cyber Security Resources – THREAT INTELLIGENCE
THREAT INTELLIGENCE Notepads & resources
NCSC & NCA
Ransomware, extorsion and the cyber crime ecosystem by NCSC & NCA
FATF
Countering Ransomware Financing – FATF Report March 2023
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
SHADOW DRAGON
A Practical Guide for OSINT Investigators to Combat Disinformation and Fake Reviews Driven by AI...
BlackBerry CyberSecurity
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by...
Cyborg Security
Threat Hunting Framework by Cyborg Security
Perception Point
2023 Annual Report – Cybersecurity Trends & Insights by Perception Point
CSO - AKAMAI
From Bad Bots to Malcious Scripts – The Effectiveness of Specialized Defense by CSO –...
BlackBerry CyberSecurity
BlackBerry Cybersecurity Global Threat Intelligence Report April-2023 Edition
SONICWALL
2023 SONICWALL CYBER THREAT REPORT – Charting Cybercrime´s Shifting Frontlines
State service of Ukraine
Russia´s Cyber Tactics – Lessons Learnead 2022 by Information Protection of Ukraine
Joas Antonio
Ransomware Investigation (OSINT & HUNTING) Overview PT1 by Joas Antonio
MANDIANT
MANDIANT APT1 – Exposing One of Chinas Cyber Espionage Units
Red Canary
2023 THREAT DETECTION REPORT – TECHNIQUES, TRENDS AND TAKEAWAYS BY Red Canary
Recorded Future
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
SANS
SANS Offensive Operations – ChatGPT for Offensive Security – What is ChatGPT and how can...
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
RELIAQUEST
Threat Hunting 101 – A Framework for Building and Maturing a Proactive Threat Hunting Program...
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group – Threat Intelligence...
Flashpoint
State of Cyber Threat Intelligence 2023 – A deep dive into perpetual cycles of cybercrime...
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by Dmitry Janushkevich...
MANDIANT
M-TRENDS 2022 Mandiant Special Report
National Cyber Crime Agencie
Manual on Social Media Intelligence (SOCMINT) for Law Enforcement Agencies by National Cyber Crume Research...
OPEN RESEARCH SOCIETY
The Cyber Intelligence Analyst’s Cookbook by The OPEN RESEARCH SOCIETY
State service of Ukraine
Russia´s Cyber Tactics – Lessons Learnead 2022 by Information Protection of Ukraine
Joas Antonio
Ransomware Investigation (OSINT & HUNTING) Overview PT1 by Joas Antonio
MANDIANT
MANDIANT APT1 – Exposing One of Chinas Cyber Espionage Units
Red Canary
2023 THREAT DETECTION REPORT – TECHNIQUES, TRENDS AND TAKEAWAYS BY Red Canary
Recorded Future
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
SANS
SANS Offensive Operations – ChatGPT for Offensive Security – What is ChatGPT and how can...
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
RELIAQUEST
Threat Hunting 101 – A Framework for Building and Maturing a Proactive Threat Hunting Program...
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group – Threat Intelligence...
Flashpoint
State of Cyber Threat Intelligence 2023 – A deep dive into perpetual cycles of cybercrime...
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by Dmitry Janushkevich...
MANDIANT
M-TRENDS 2022 Mandiant Special Report
osint - Open Source Intelligence
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and...
Microsoft
Microsoft Cyber Signal Report August 2022 edition – Extortion Economics – Ransomware´s new business model...
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect, deter, and...
PRASANNAKUMAR MUNDAS
Threat Hunting Playbooks for MITRE Tactics – Starting your first threat hunting today by PRASANNAKUMAR...
Cencys
2022 State of the internet report by cencys
Virusbulletin.com
LAZARUS AND BYOVD – EVIL TO THE WINDOWS CORE By Peter Kalnai – Matej Havranek...
Joas Antonio
ChatGPT for Cybersecurity 1 by Joas Dos Santos
not known
Threat Intelligence & Dark web Monitoring Tools
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
exabean
The Ultimate Guide to Insider Threats eBook by exabeam
Apress
Wireshark for Network Forensics – An Essential Guide for IT and Cloud Professionals by Nagendra...
HeimdalSecurity.com
SECURITY ALERT: Danish Customers Targeted by Active PostNord DK Phishing Campaign – Source: heimdalsecurity.com
KELA INTELLIGENCE
Telegram – How a Messenger Turned into a Cybercrime Ecosystem by 2023 by Kela Cybercrime...
HeimdalSecurity.com
Companies Affected by Ransomware [2022-2023]
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
Views: 0