Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: CISO2CISO Cyber Security Resources – RED – BLUE & PURPLE TEAMS
RED - BLUE - PURPLE TEAMS Notepads & resources
Security Boulevard
Ghostwriter v4.1: The Custom Fields Update – Source: securityboulevard.com
Security Boulevard
CVE-2024-23897: Assessing the Impact of the Jenkins Arbitrary File Leak Vulnerability – Source: securityboulevard.com
Security Boulevard
CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive – Source: securityboulevard.com
Security Boulevard
Calling Home, Get Your Callbacks Through RBI – Source: securityboulevard.com
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
IZZMIER
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
Cyborg Security
Threat Hunting Framework by Cyborg Security
Kaspersky
Incident Response 2022 Report by Kaspersky
Lawrence C. Miller
Next Generation Anti-Malware Testing for Dummies – Brought to you by Cylance
Hugo Hoffman
Ethical Hacking with Kali Linux – Learn fast how to hack like a pro by...
Apress
Quick Start Guide to Penetration Testing with NMAP , OpenVAS & Metaexploit by Sagar Rahalkar...
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
osint - Open Source Intelligence
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and...
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
Recorded Future
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
CISSPWOMEN.COM
Introducing to Pueple Teaming – Some Attacks and Detects Methods by Saeedeh Zeinali
BHInfoSecurity
Blue Team Perspective & Red Team Tools by Black Hills Information Security – BHinfoSecurity
@ANHKWAR
The Most Complete RED TEAM & PENTEST Reference and Resources Guide by @ANHKWAR
SANS
SANS Offensive Operations – ChatGPT for Offensive Security – What is ChatGPT and how can...
HADESS
Red Team Guides 2023 by HADESS
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by...
Packt
Cybersecurity Blue Team Strategies – Uncover the secrets of blue teams to combat cyber threats...
Logan Simpson
So You Want To Be a Hacker – A story guide by Logan Simpson
Maddie Stone - Google
0-days Detected in-the-Wild in 2022 – Year in Review – Maddie Stone – Zer0Con 2023...
aws
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
WILEY
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech and non-tech...
Security Boulevard
SaaS Attacks: Compromising an Organization without Touching the Network – Source: securityboulevard.com
Cyber Talk
What is a ‘purple team’ in cyber security? (2023) – Source: www.cybertalk.org
Security Boulevard
Lexmark Command Injection Vulnerability ZDI-CAN-19470 Pwn2Own Toronto 2022 – Source: securityboulevard.com
Security Boulevard
Challenges In Post-Exploitation Workflows – Source: securityboulevard.com
Security Boulevard
Google Launches Red Team to Secure AI Systems Against Attacks – Source: securityboulevard.com
securityweek.com
Google Creates Red Team to Test Attacks Against AI Systems – Source: www.securityweek.com
Security Boulevard
Sowing Chaos and Reaping Rewards in Confluence and Jira – Source: securityboulevard.com
ChatGPT & Haci Dasgin
Malware Analisys 101 – created by ChatGPT in 20 minutes
Herve Debar
Security Operations & Incident Management Knowledge Area by Herve Debar – Telecom SudParis
Lester Chng
How to Define Objetives for Cybersecurity Tabletop Exercises by Lester Chng
not known
Threat Intelligence & Dark web Monitoring Tools
TIDAL CYBER
The Ultimate Guide to CYBER THREAT Profiling by TIDAL CYBER
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
Security Boulevard
COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT – Source: securityboulevard.com
Purple Knight
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory...
exabean
The Ultimate Guide to Insider Threats eBook by exabeam
Apress
Wireshark for Network Forensics – An Essential Guide for IT and Cloud Professionals by Nagendra...
GFCE
Introduction to Tabletop Exercises (TTX) – A practical Guidebook for Organizations by Capgemini for GFCE...
IGNITE Technologies
Incident Response Cheatsheet Windows & Linux by Hackingarticles.in – Ignite Technologies
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
Views: 0