Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO Strategics
SOC OPERATIONS
THREAT INTEL
RED-BLUE-purple
DATA BREACH
vulnerabilities
cyber attacks
Ransomware
DDOS ATTACKS
HACKING
DEVSECOPS
IA CYBERSECURITY
ZERO TRUST
architecture
NETWORK SECURITY
CLOUD SECURITY
IOT - OT SECURITY
API SECURITY
RISK & COMPLIANCE
#RSAC 2023
CISO2CISO Editors' Picks
Marcos Jaimovich
Nuevo Firewall para IA , un Cacharro nuevo para nuestro SOC y los equipos de Ciberseguridad !
Vendict
The 2024 CISO Burnout Report by Vendict
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of Digital Threats ?
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
IZZMIER
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection in Your SOC by Logpoint
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR Is Dead, Long Live XDR by Allie Mellen – Forrester
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK: FIRST 100 DAYS Setting the CISO up for success
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Feedspot.com
146 Best Cyber Security Blogs and Websites by Feedspot.com
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness – Global Survey of Cybersecurity Leaders by Delinea
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or Service. Software Quality must include Cybersecurity by Design Principle. Marcos Jaimovich
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original document in Spanish).
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK – Protecting The Crown Jewels by Cyber Leadership Institute – Building a cyber security strategy around high value digital assets
Marcos Jaimovich
Cyber Threat “Info Stealer” explained in Simple way: A mallware and set of techniques used by attackers to steal your confidential information !!! and much more that you should know By Marcos Jaimovich.
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
CISO2CISO Notepad Series
The sqreen DevSecOps Security Checklist
Apress
Jump-start Your SOC Analyst Career – A Roadmap to Cybersecurity Success by Apress
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos – malwareanalysis #reverseengineering
CISO2CISO Notepad Series
How Can We Structure Cybersecurity Teams To Better Integrate Security In Agile At Scale?
OCCUPYTHEWEB
Linux Basics for Hackers by Occupytheweb
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT) by NIST – Eran Salfati and Michael Pease
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
Practical DevSecOps
API Security Fundamentals – Your Handy Guide to Building an Unhackable System by practical-devsecops.com
ACSC Australia
Personal Cyber Security First Steps by Australian Government – ACSC
help net security
Compliance does not equal security !!
Chris Davis
Blue Team Cheat Sheets by Chris Davis
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by – University of Foreign Military and Cultural Studies (UFMCS).
SentinelOne
90 DAYS A CISO´s Journey to Impact define your role !!
Codrut Andrei
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI) Metrics – Incident Response (IR) Metrics for CISOs by SCYTHE
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP – AZURE by Joas Antonio
SANS
SANS Faculty Cybersecurity Free Tools – SANS Instructors have built more than 150 open source tools that support your work and help you implement better security.
Ciso Council
CISO Security Officer Handbook
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals by Cybertalk.org
Unbound Security
The Cybersecurity Acronym Book
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
FIRE EYE
The Cyber Risk Playbook – What boards of directors and executives should know about Cyber Risk by FireEye.
HADESS
Introduction to Doxing- OSINT methods for information gathering by HADESS
IBM Security
How much does a data breach cost in 2022? IBM Cost of a Data Breach 2022 Report by IBM Security
Codrut Andrei
Secure Software Development Lifecycle Fundamentals by Codrut Andrei
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined largely by your first 100 days in the role.
Latest News
securityweek.com
In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research – Source: www.securityweek.com
13/09/2025
CSO - Online
VoidProxy phishing-as-a-service operation steals Microsoft, Google login credentials – Source: www.csoonline.com
12/09/2025
CSO - Online
VMScape Spectre BTI attack breaks VM isolation on AMD and Intel CPUs – Source: www.csoonline.com
12/09/2025
CSO - Online
How Wesco cut through the noise and reimagined risk management – Source: www.csoonline.com
12/09/2025
CSO - Online
2025 CSO Hall of Fame: Laura Deaner on AI, quantum threats, and cyber leadership – Source: www.csoonline.com
12/09/2025
CSO - Online
Stealthy AsyncRAT flees the disk for a fileless infection – Source: www.csoonline.com
12/09/2025
CSO - Online
Why domain-based attacks will continue to wreak havoc – Source: www.csoonline.com
12/09/2025
CSO - Online
12 digital forensics certifications to accelerate your cyber career – Source: www.csoonline.com
12/09/2025
CSO - Online
Fünf KI-Use-Cases für CISOs – Source: www.csoonline.com
12/09/2025
CSO - Online
So rechtfertigen Sie Ihre Security-Investitionen – Source: www.csoonline.com
12/09/2025
CSO - Online
Ransomware gang going after improperly patched SonicWall firewalls – Source: www.csoonline.com
12/09/2025
Krebs On Security
Bulletproof Host Stark Industries Evades EU Sanctions – Source: krebsonsecurity.com
12/09/2025
securityweek.com
Critical Chrome Vulnerability Earns Researcher $43,000 – Source: www.securityweek.com
12/09/2025
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by bugcrowd
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Lacework
CISO’s Playbookto Cloud Security by Lacework
MITRE - Carson Zimmerman
Ten Strategies of a World-Class Cybersecurity Operations Center by MITRE
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
CYZEA.IO
Enterprise Information Security
IGNITE Technologies
ENCRYPTED REVERSE
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Microsoft
GDPR & Generative AI
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
FS.ISAC
Navigating Cyber
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
Incibe
Ciberseguridad en Smart Toys
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
Gary Hinson
Getting started withsecurity metrics
EDPS
Generative AI and the EUDPR.
Bright
2024 Guide to Application Security Testing Tools
HADESS
Hacker Culture
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
Hacker Combat
How Are Passwords Cracked?
CIS - Center for Internet Security
How to Plan a Cybersecurity Roadmap in Four Steps
ACSC Australia
Information Security Manual
Kaspersky
Incident Response Playbook: Dark Web Breaches
ninjaOne
Endpoint Hardening Checklist
HADESS
Important Active Directory Attribute
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
Rajneesh Gupta
IAM Security CHECKLIST
sqrrl
Hunt Evil
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
IGNITE Technologies
A Detailed Guide on Covenant
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
YL VENTURES
CISO Reporting Landscape 2024
CISO Edition
Reporting Cyber Risk to Boards
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
INCIBE & SPAIN GOVERNMENT
Nuevas normativas de 2024 de ciberseguridad para vehículos
INNOVERY
RESILIENCIA
CEH
Certifications Preparation Guide
Sandhya Kaushik
Checklist for Securing Your Android Apps
aDvens
May Cyber Threat Intelligence monthly report
Insikt Group
Caught in the Net
IGNITE Technologies
BURP SUITE FOR PENTESTER TURBO INTRUDER
SYED ABUTHAHIR
BUG BOUNTY AUTOMATION WITH PYTHON
Foresiet
Brand Impersonation Attacks
Google Cloud
Board of Directors Handbook for Cloud Risk Governance
ISACA
Blueprint for Ransomware Defense
Shaurya Rawal
Blockchain Security
RISK academy
BEST RISK MANAGEMENT PROMPTS FOR CHATGPT
IGNITE Technologies
Best Alternative of Netcat
aws
AWS Security Incident Response Guide
DevSecOps Guide
Attacking Rust
DevSecOps Guide
Attacking Pipeline
DevSecOps Guide
Attacking Golang
HADESS
Assembly for Hackers
BIONIC
Application Security Posture Management
Wallarm
API ThreatStatsTM Report
Wallarm
API Security Checklist
DevSecOps Guide
ANSIBLE PLAYBOOKS
Cyber Topics
CISO Strategics & Leadership
FIRST.Org CVSS V4.0 Releasead – Navigation the Evolution – Dive into CVSS 4.0 Unveiled by Marcos Jaimovich
Azure Defenses for Ransomware Attack by Microsoft Security
Risk Mitigation , Prevention and Cutting the Kill Chain – Minimize the impact of ransomware with Akamai Guardicore Segmentation
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
The Global Risks Report 2023 – Insight Report – 18th Edition by World Economic Forum (WEF). Economics, Environmental, Geopolitical, Societal, Technological & Cyber Risks Included in the report.
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR Is Dead, Long Live XDR by Allie Mellen – Forrester
Advancing Cyber Resilience Principles and Tools for Boards by World Economic Forum (WEF)
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by BlackBerry Cybersecurity.
What is Cyber Resilience and Why Your Business Needs It by Federico Hansen ?
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
TOP 10 Cybersecurity Posture Metrics every CISO should use – A CISO Executive Guide by Balbix
Security Operations & SOC
ISACA Ransomware Incident Management Quick Reference Guide
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection in Your SOC by Logpoint
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR Is Dead, Long Live XDR by Allie Mellen – Forrester
How to Avoid Party Chaos with the Right Application-Layer DDoS Platform whitepaper by Akamai
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Incident Response 2022 Report by Kaspersky
Network Segmentation and Microsegmentation in Moderm Enterprise Environments by Akamai
Next Generation Anti-Malware Testing for Dummies – Brought to you by Cylance
Red - Blue & Purple Teams
Red Teaming AI Systems: Why Traditional Security Testing Falls Short – Source: securityboulevard.com
Update: Dumping Entra Connect Sync Credentials – Source: securityboulevard.com
Bugcrowd Launches Red Team Service to Test Cybersecurity Defenses – Source: securityboulevard.com
The Renaissance of NTLM Relay Attacks: Everything You Need to Know – Source: securityboulevard.com
Offensive AI Startup Dreadnode Secures $14M to Stress-Test AI Systems – Source: www.securityweek.com
Forging a Better Operator Quality of Life – Source: securityboulevard.com
SlackPirate Set Sails Again! Or: How to Send the Entire “Bee Movie” Script to Your Friends in Slack – Source: securityboulevard.com
AI Won’t Take This Job: Microsoft Says Human Ingenuity Crucial to Red-Teaming – Source: www.securityweek.com
Ghostwriter v4.1: The Custom Fields Update – Source: securityboulevard.com
CVE-2024-23897: Assessing the Impact of the Jenkins Arbitrary File Leak Vulnerability – Source: securityboulevard.com
CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive – Source: securityboulevard.com
Calling Home, Get Your Callbacks Through RBI – Source: securityboulevard.com
ISACA Ransomware Incident Management Quick Reference Guide
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
Cloud Security
VMScape Spectre BTI attack breaks VM isolation on AMD and Intel CPUs – Source: www.csoonline.com
Microsoft’s ‘Gross Cybersecurity Negligence Threatens National Security’ – Source: securityboulevard.com
UNC6395 Hackers Accessed Systems via a GitHub Account, Salesloft Says – Source: securityboulevard.com
6 hot cybersecurity trends – Source: www.csoonline.com
Chinese Group Accused of Using Fake U.S. Rep. Email to Spy on Trade Talks – Source: securityboulevard.com
Google Says Claims of Mass Gmail Security Breach Are ‘Entirely False’ – Source: www.techrepublic.com
Salesloft Drift Breach Rolls Up Cloudflare, Palo Alto, Zscaler and Others – Source: securityboulevard.com
Innovator Spotlight: Skyhawk Security – Source: www.cyberdefensemagazine.com
Google Says Claims of Mass Gmail Security Breach Are “Entirely False” – Source: www.techrepublic.com
CCSP certification: Exam, cost, requirements, training, salary – Source: www.csoonline.com
Scammer Spoofs a City Supplier, Steals $1.5 Million from Baltimore – Source: securityboulevard.com
Russian-Linked ATP29 Makes Another Run at Microsoft Credentials – Source: securityboulevard.com
DevSecOps Discipline
Microsoft’s ‘Gross Cybersecurity Negligence Threatens National Security’ – Source: securityboulevard.com
UK Quietly Drops ‘Think of the Children’ Apple iCloud Crypto Crack Call – Source: securityboulevard.com
Act Surprised: Data Brokers Seem to Scoff at California Privacy Act – Source: securityboulevard.com
ANOTHER WinRAR 0-Day: Don’t Patch Now — Uninstall It! – Source: securityboulevard.com
How to Securely Access AWS from your EKS Cluster – Source: securityboulevard.com
Google Breached — What We Know, What They’re Saying – Source: securityboulevard.com
Ukraine Pwns Russian Drone Maker — Gaskar is ‘Paralyzed’ – Source: securityboulevard.com
4 Arrests in Dawn Raid of Scattered-Spider Suspects – Source: securityboulevard.com
Did This Retail Giant Pay a Ransom to Scattered Spider? – Source: securityboulevard.com
Yet More Stalkerware Leaks Secret Data: ‘Catwatchful’ is Latest Nasty App – Source: securityboulevard.com
Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025 – Source: securityboulevard.com
LinuxFest Northwest: Lightning Talks – Source: securityboulevard.com
THREAT INTELLIGENCE
CISA Lays Out Roadmap for CVE Program’s ‘Quality Era’ – Source: securityboulevard.com
UNC6395 Hackers Accessed Systems via a GitHub Account, Salesloft Says – Source: securityboulevard.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
Chinese Group Accused of Using Fake U.S. Rep. Email to Spy on Trade Talks – Source: securityboulevard.com
Salesloft Drift Breach Rolls Up Cloudflare, Palo Alto, Zscaler and Others – Source: securityboulevard.com
Scammer Spoofs a City Supplier, Steals $1.5 Million from Baltimore – Source: securityboulevard.com
Innovator Spotlight: StrikeReady – Source: www.cyberdefensemagazine.com
Russian-Linked ATP29 Makes Another Run at Microsoft Credentials – Source: securityboulevard.com
China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years – Source: www.securityweek.com
NSA, FBI, Others Say Chinese Tech Firms are Aiding Salt Typhoon Attacks – Source: securityboulevard.com
20-year-old Scattered Spider Member Sentenced to 10 Years in Prison – Source: securityboulevard.com
Federal Agency Makes Steampunk Appearance at Black Hat 2025 – Source: www.cyberdefensemagazine.com
Data Breaches & Leaks
Microsoft’s ‘Gross Cybersecurity Negligence Threatens National Security’ – Source: securityboulevard.com
UK Quietly Drops ‘Think of the Children’ Apple iCloud Crypto Crack Call – Source: securityboulevard.com
Act Surprised: Data Brokers Seem to Scoff at California Privacy Act – Source: securityboulevard.com
ANOTHER WinRAR 0-Day: Don’t Patch Now — Uninstall It! – Source: securityboulevard.com
How to Securely Access AWS from your EKS Cluster – Source: securityboulevard.com
Google Breached — What We Know, What They’re Saying – Source: securityboulevard.com
Latest News
securityweek.com
100,000 Impacted by Cornwell Quality Tools Data Breach – Source: www.securityweek.com
12/09/2025
CSO - Online
Microsoft under fire: Senator demands FTC investigation into ‘arsonist selling firefighting services’ –...
11/09/2025
CSO - Online
Docker malware breaks in through exposed APIs, then changes the locks – Source:...
11/09/2025
CSO - Online
OT security: Why it pays to look at open source – Source: www.csoonline.com
11/09/2025
CSO - Online
AI prompt injection gets real — with macros the latest hidden threat –...
11/09/2025
CSO - Online
Managed SOC für mehr Sicherheit – Source: www.csoonline.com
11/09/2025
CSO - Online
Menschenzentrierte Cybersicherheit gewinnt an Bedeutung – Source: www.csoonline.com
11/09/2025
securityweek.com
Highly Popular NPM Packages Poisoned in New Supply Chain Attack – Source: www.securityweek.com
11/09/2025
CSO - Online
California, two other states to come down hard on GPC violators – Source:...
10/09/2025
CSO - Online
Adobe Commerce and Magento users: Patch critical SessionReaper flaw now – Source: www.csoonline.com
10/09/2025
CSO - Online
Neues Phishing-Framework umgeht Multi-Faktor-Authentifizierung – Source: www.csoonline.com
10/09/2025
CSO - Online
Cursor’s autorun lets hackers execute arbitrary code – Source: www.csoonline.com
10/09/2025
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025
securityweek.com
Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion – Source: www.securityweek.com
10/09/2025
CSO - Online
Patch Tuesday priorities: Vulnerabilities in SAP NetWeaver and Microsoft NTLM and Hyper-V –...
10/09/2025
CSO - Online
Smart GPUGate malware exploits GitHub and Google Ads for evasive targeting – Source:...
10/09/2025
CSO - Online
Phishing kit Salty2FA washes away confidence in MFA – Source: www.csoonline.com
10/09/2025
CSO - Online
GitHub Actions missbraucht – Source: www.csoonline.com
10/09/2025
CSO - Online
Massive npm supply chain attack hits 18 popular packages with 2B weekly downloads...
10/09/2025
CSO - Online
When AI nukes your database: The dark side of vibe coding – Source:...
10/09/2025
More Latest Published Posts
Dr. Gemma GALDON CLAVELL
AI Auditing
RAND
Securing Al Model Weights
GDPR
CYBERSECURITY INCIDENT RESPONSE PLAN 1
KPMG
Cyber security guide for SMEs
ENISA-EUROPA
Cyber Resilience Act Requirements Standards Mapping
IGNITE Technologies
A Little Guide to SMB Enumeration
GMsectec
Adaptacióna PCI DSS 4.0
LogRhythm
A Guide to User and Entity Behavior Analytics (UEBA)
BONI YEAMIN
100 Offensive Linux Security Tools
SentinelOne
90 DAYS A CISO’S JOURNEY TO IMPACT
ChiefExecutive
Ciberseguridad: Prioridad Estratégica para los CEO.
CYBER SECURITY COALITION
CYBER SECURITY INCIDENT MANAGEMENT GUIDE
INL/EXT
Cybersecurity for Distributed Wind
ARTIC WOLF
Cybersecurity Compliance Guide
ESRAA MOHAMAD
ELEARN SECURITY CERTIFIED INCIDENT RESPONSE
DRAGOS
Impact of FrostyGoop ICS Malware on Connected OT Systems
Victor Tong
Digital Operational Resilience Act – Control Mappings
ARMIS
DORA Resiliency Guide Strengthening Cybersecurity and Operational Resilience in the Financial Sector
IGNITE Technologies
Docker Penetration Testing
IGNITE Technologies
Disk Group Privilege Escalation
Hiral Patel
Data LossPrevention(DLP)
Polygon
Digital identity – Deutsche Bank Corporate Bank
CSA Cloud Security Alliance
The Six Pillars of DevSecOps:Collaboration andIntegration
ASPIRE SYSTEMS
A complete guide toImplementingDevSecOps in AWS
GAO
CYBERSECURITY PROGRAM AUDIT GUIDE
Apress
Demystifying Intelligent Multimode Security Systems An SystemsAn Edge-to-Cloud Cybersecurity Solutions Guide
PWC
Data Privacy Handbook
CERT-EU
DDoS Overview and Response Guide
IGNITE Technologies
Data Exfiltration Cheat Sheet
CRC Press
Data Privacy for the Smart Grid
New York State
Cybersecurity Program Template A resource to help individual licensees and individually owned businesses develop a cybersecurity program as required by New York State’s Cybersecurity Regulation 23 NYCRR Part 500
Apress
Cyber Security on Azure An IT Professional’s Guide to Microsoft Azure Security
CyberJA
ASSET IDENTIFICATION & CLASSIFICATION-A CRITICAL COMPONENT OF CYBER RISK MANAGEMENT
SOSAFE
CybercrimeTrends 2024 The latest threats and security best practices
Routledge
Cyber Security Politics Socio-Technological Transformations and Political Fragmentation
Cigref
Surviving a Massive cyber-attack by Cigref
Hidaia Mahmood Alassouli
Common Windows, Linux and Web Server SystemsHacking Techniques
Splunk
SPLUNK® AND THE CIS CRITICALSECURITY CONTROLS Mapping Splunk Software to the CIS 20 CSC Version 6.0
SOC SIEM Use Cases
safecode
Six Pillars of DevSecOps- Collaboration and Integration
SentineOne
WatchTower I ntelligence-Driven Threat Hunting
CNIL
Security of Personal Data
OPSWAP
Securing ICS SCADA updates OT Environments
Top 300 Azure Sentinel Used Cases KQL (Kusto Query Language) queries
WITH SECURE
Threat Landscape Update Report
ThreatRadar
Threat Intel Roundup
ThreatRadar
Threat Intel Roundup
ThreatRadar
Threat Intel Roundup
Mihaela Curcă
The Role of Cyber Espionage inInternational Relations
GLOBAL NETWORK OF DIRECTOR INSTITUTES
THE FUTURE OF BOARD GOVERNANCE
Deloitte
The CISO’s Guide to Generative AI
Capgemini
PROMPT THE FUTURE
Google
We’re All in this Together
CyberSN
U.S. Cybersecurity Job Posting Data Report
CISA | Cybersecurity and Infrastructure Security Agency
UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
McKinsey & Company
Transforming risk efficiency and effectiveness
Arnold Antoo
Zero Trust Security Model
Richea Perry
Your Cybersecurity Toolkit
IGNITE Technologies
Wireless Penetration Testing
Joas A Santos
Windows API for Red Team #101
Economic Research Working Paper
Artificial Intelligence and Intellectual Property
CASOS DE USO APLICABLES EN UN SIEM
IGNITE Technologies
Burp Suite for Pentester
The Institute of Internal auditors
Auditing Risk Culture
DevSecOps Guide
ATTACKING PHP APPLICATIONS
DevSecOps Guide
ATTACKING KUBERNETES WITH SECURITY BEST PRACTICE
CLTC WHITE PAPER SERIES
Guidance for the Development of AI Risk and Impact Assessments
Active Directory
Active Directory IT AuditChecklist
A guide to business continuity planning
LOG RHYTHM
Using MITRE ATT&CK™ in Threat Huntingand Detection
Kaspersky
H2 2023 – A brief overviewof main incidentsin industrial cybersecurity
Andrey Prozorov
24 Great Cybersecurity Frameworks
ENISA-EUROPA
SEGURIDAD DE TELECOMUNICACIONES
Project Management Institute
Building Resilience Through Strategic Risk Management
DATA LOSS PREVENTION (DLP)
AICSSolutions
Cybersecurity Red Team
cisco
Cyber Incident Response
CSR Cyber Security Council
EVERY BUSINESS HAS DUTIES OF CARE IN THE FIELD OF CYBER SECURITY
SYBEX
Cybersecurity ESSENTIALS
Agency for Digital Government
Cyber security in supplier relation ships
RINKU
Curso de introducción KALI LINUX PARA HACKERS ÉTICOS
CNIL
PRACTICE GUIDE GDPR
FERMA
THE ROADMAP TO STRATEGIC RISK MANAGEMENT
ENISA-EUROPA
Cyber Resilience Act Requirements Standards Mapping
CYTAD
Essential Data Privacy Checklist
SF-ISAC
Digital Operational Resilience Act
SYNGRESS
DIGITAL FORENSICS WITH Open Source TOOLS
IT REVOLUTION DEVOPS ENTERPRISE FORUM
DevOps Automated Governance Reference Architecture
SANS GIAC CERTIFICATIONS
Detecting Attacks on Web Applications from Log Files
EUROPEAN DATA PROTECTION SUPERVISOR
ANNUAL REPORT 2023
TechTarget
IT Disaster Recovery Plan Template
Opstune
IOC Scan Framework v2.0
Federal Office for Information Security
Indirect Prompt Injections
the Department of the Environment Climate and Communications
Guidelines on CyberSecurity Specifications
Security METRICS
Security Metrics Guide to PCI DSS Compliance
Edelman
INCIDENT RESPONSE REFERENCE GUIDE
SOC TIPS Cybersecurity
Guia de Resposta a Incidentes de Segurança para LGPD
CDCP
FIREWALL Audit CHECKLIST
GitGuardian
Secrets Management Maturity Model
MegaCorp One
Sample Penetration Test Report
FORTINET
Routing in FortiGate
FUTURE OF PRIVACY FORUM
Risk Framework Body Related Data (PD) Immersive Tech
ENISA
Remote ID Proofing Good Practices
Google
Why Red TeamsPlay a Central Rolein Helping OrganizationsSecure AI Systems
Red Canary
Threat Detection Report 2024
HADESS
Pwning the Domain Persistence
Australian Goverment
PROTECTIVE SECURITYPOLICY FRAMEWORKSecuring government business:Protective security guidance for executive
CISC (Comité Internacional Sobre Ciberseguridad)
Política Nacional de Ciberseguridad 2023-2028
Google
Perspectiveson Securityfor the Board
HADESS
OSINT Method for Map Investigations
CCN-CERT
Observatorio Riesgos Ciberseguridad 2024
CYBERTHEORY
The ISMG Cybersecurity Pulse Report 2024 is a treasure trove of insights from the RSA Conference, revealing the dynamic landscape of cybersecurity. From AI to Zero Trust: A comprosive guide to the key themes and expert opinions from RSA CONFERENCE 2024 – #RSAC2024
FORTINET
Bloking Malware Through Antivirus Security Profile in FortiGate
ENISA
Best Practices for Cyber Crisis Management
viehgroup
AWS Cloud Security Checklist
DevSecOps Guide
Attacking .NET
IGNITE Technologies
Advance Burp Suite Pentester Training (Online)
LogRhythm
Using MITRE ATT&CK™in Threat Huntingand Detection
INCIDENT RESPONSE PLAN
NIST CSF 2.0
Incident Response Recommendations and Considerations for Cybersecurity Risk Management
GmFaruk
Identity and Access Management Policy
UK HM Government
National Cyber Strategy 2022
NSA
NSA Network Infrastructure Security Guide
NIST
NIST Policy Template Guide
Thecyphere
Malware prevention tips for businesses
ministry of security
MERGERS AND ACQUISITIONS
THE LINUX FUNDATION
Linux Privilege Escalation
LogRhythm
How to build a SOC with limited resources
Kubernetes
Kubernetes and Cloud Native Associate (KCNA) Study Guide
Australian Government
Management structures and responsibilities
Hacker Combat
How are Passwords Cracked ? by Hacker Combat.
N/A
Security Metrics & KPIs for Measuring SOC Success – Measure Up: How SOC Metrics Elevate Your Security Posture.
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat Research Lab Initiative.
ISA SECURE
The Case for ISA/IEC 62443Security Level 2 as a Minimumfor COTS Components
Huntress
2024 Cyber Threat Report
NACD - Intenet Security Alliance
2023 Director’s Handbook on Cyber-risk Oversight
Devoteam
14 Cybersecurity Trends for 2024
IGNITE Technologies
MEMORY FORENSICS VOLATILITY
CAREER UP
7 Steps to your SOC Analyst Career
National Cyber Security Centrum
Managing Insider Threats
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of Digital Threats ?
National Security Agency
CSI Cloud Top10 Key Management
CSA Cloud Security Alliance
Defining the Zero TrustProtect Surface
HANIM EKEN
CONTAINER SECURITY INTERVIEW QUESTIONS ANSWERS
CNIL
PRACTICE GUIDE GDPR – SECURITY OF PERSONAL DATA Version 2024
PWNED LABS
Cloud Security Engineer Roadmap
tutorialspoint.com
Cloud Computing Tutorial Simply Easy Learning
SMITHA SRIHARSHA
CISSP Preparation Notes
CISSP Mind Map: All Domains
Lansweeper
CIS 18 CRITICAL SECURITY CONTROLS CHECKLIST
Semaphore
CI-CD with Docker and Kubernetes
EC-MSP
BUSINESS CONTINUITY PLAN & DISASTER RECOVERY PLAN TEMPLATE
PWC
Building a risk-resilient organisation
Accenture
THE NEXT-GENERATION Building a Digital Central Bankfor a Digital Age
Thecyphere
Microsoft EntraID (Azure)ConditionalAccess
aws
AWS Security Incident Response Guide
Government of South Australian
South Australian Cyber Security Framework
NAO -National Audit Office
Audit and Risk Assurance Committee Effectiveness Tool
WWW. D E V S E COP S G U I D E S . CO M
Attacking Docker
W W W . D E V S E C O P S G U I D E S . C O M
Attacking AWS – Offensive Security Aproach
ENISA
Artificial Intelligence and Cybersecurity Research 2023
Green Circle
All about Security Operations Center
DAZZ
A Guide to Building a Secure SDLC – Which Scanning Tools Should I look at, and where do they go?
zimperium
2023 Mobile Banking Heists Report
40 under 40
40 under 40 in CyberSecurity 2024
HADESS
40 Days in DeepDark Web About Crypto Scam
Everbridge
8 Principles of Supply Chain Risk Management
CHAOSSEARCH
Threat Hunter’s Handbook – Using Log Analytics to Find and Neutralize Hidden Threats in Your Environment
ENDGAME
The Hunters Handbook Endgame’s Guide to Adversary Hunting
THE EU’S MOST THREATENING by EUROPOL
National Cyber Security Centre
Responding to a cyber incident – a guide for CEOs
IGNITE Technologies
CREDENTIAL DUMPING
HADESS
Pwning the Domain Lateral Movement
Jorgen Lanesskog
PING Basic IP Network Troubleshooting
TELESOFT
Layer 7 Visibility What are the Benefits?
TIGERA
Introduction to Kubernetes Networking and Security
Department of Defense's (DoD)
Defense Industrial Base Cybersecurity Strategy 2024
Dummies
Zero Trust Access for Dummies Fortinet
Homeland Security
Zero Trust Implementation Strategy
National Australia Bank Limited
Your Business and Cyber Security
CYFIRMA
Xeno RAT- A New Remote Access Trojan
IGNITE Technologies
Windows Persistence COM Hijacking MITRE T1546 015
IGNITE Technologies
Windows Exploitation Rundll32
IGNITE Technologies
Windows Exploitation Msbuild
HADESS
Web LLM Attacks
HADESS
Trended Protocols for Security Stuff
Red Iberoamericana de Protección de Datos
Transferencia Internacional de Datos Personales – Guia de Implementación
CYFIRMA
TRACKING RANSOMWARE January 2024
https://www.linkedin.com/in/harunseker/
TOP Cyber Attacks Detected by SIEM Solutions
TRAVARSA
Top 100 Cyber Threats and Solutions 2024
Top 50 Cybersecurity Threats
OWASP
Top 10 Considerations for Incident Response
EXECWEB
Tips for Cybersecurity Vendors to Connect with CISOs
WITH SECURE
Threat Landscape Report 2024
ThreatRadar
Threat Intel Roundup Phar SEO Poisoning ScreenConnect
ThreatRadar
Threat Intel Roundup Outlook, QNAP, Okta
ThreatRadar
Threat Intel Roundup Outlook SmartScreen Lockbit
ThreatRadar
Threat Intel Roundup FortiOS Super Bowl Chrome APT15
INFOSECTRAIN
Third Party Information Security Assessment Checklist
INFOSECTRAIN
THE ULTIMATE SOC – CAREER GUIDE FOR BEGINNERS
Waterfall Security Solutions LTD.
THE TOP 20 CYBERATTACKS on Industrial Control Systems
CSA Cloud Security Alliance
The State of SecurityRemediation 2024
THE LINUX FUNDATION
The Open Source Software Security Mobilization Plan by OpenSSF
HITRUST
The HITRUST Approach to NIST CSF 2.0
Gavin Phillips
The Deep and Dark Web Guide
The Computer and Information Security
Deloitte
The CISOs guide to Generative AI
Ahmed Medhat
Suspicious Traffic Detection and Analysis
KPMG
Supply Chain Risk Management – A data driven approach to protecting your organization
Latest News
CSO - Online
Neues Phishing-Framework umgeht Multi-Faktor-Authentifizierung – Source: www.csoonline.com
10/09/2025
CSO - Online
Cursor’s autorun lets hackers execute arbitrary code – Source: www.csoonline.com
10/09/2025
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025
securityweek.com
Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion – Source: www.securityweek.com
10/09/2025
CSO - Online
Patch Tuesday priorities: Vulnerabilities in SAP NetWeaver and Microsoft NTLM and Hyper-V – Source: www.csoonline.com
10/09/2025
CSO - Online
Smart GPUGate malware exploits GitHub and Google Ads for evasive targeting – Source: www.csoonline.com
10/09/2025
CSO - Online
Phishing kit Salty2FA washes away confidence in MFA – Source: www.csoonline.com
10/09/2025
CSO - Online
GitHub Actions missbraucht – Source: www.csoonline.com
10/09/2025
CSO - Online
Massive npm supply chain attack hits 18 popular packages with 2B weekly downloads – Source: www.csoonline.com
10/09/2025
CSO - Online
When AI nukes your database: The dark side of vibe coding – Source: www.csoonline.com
10/09/2025
CSO - Online
71% of CISOs hit with third-party security incident this year – Source: www.csoonline.com
10/09/2025
CSO - Online
Hacker übernehmen Youtube-Kanäle von Arte – Source: www.csoonline.com
10/09/2025
CSO - Online
5 ways CISOs are experimenting with AI – Source: www.csoonline.com
10/09/2025
Krebs On Security
Microsoft Patch Tuesday, September 2025 Edition – Source: krebsonsecurity.com
09/09/2025
Krebs On Security
18 Popular Code Packages Hacked, Rigged to Steal Crypto – Source: krebsonsecurity.com
09/09/2025
securityweek.com
Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack – Source: www.securityweek.com
09/09/2025
securityweek.com
Cybersecurity M&A Roundup: 27 Deals Announced in August 2025 – Source: www.securityweek.com
09/09/2025
CSO - Online
AI powered autonomous ransomware campaigns are coming, say experts – Source: www.csoonline.com
09/09/2025
CSO - Online
Hackerangriff treibt Wehrle-Werk in Insolvenz – Source: www.csoonline.com
09/09/2025
CSO - Online
GhostAction campaign steals 3325 secrets in GitHub supply chain attack – Source: www.csoonline.com
09/09/2025
CSO - Online
Is the CISO role broken? – Source: www.csoonline.com
09/09/2025
securityweek.com
How to Close the AI Governance Gap in Software Development – Source: www.securityweek.com
08/09/2025
securityweek.com
North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks – Source: www.securityweek.com
08/09/2025
securityweek.com
Apple Seeks Researchers for 2026 iPhone Security Program – Source: www.securityweek.com
08/09/2025
CSO - Online
The importance of reviewing AI data centers’ policies – Source: www.csoonline.com
08/09/2025
Views: 2