Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
CISO Strategics
SOC OPERATIONS
THREAT INTEL
RED-BLUE-purple
DATA BREACH
vulnerabilities
cyber attacks
Ransomware
DDOS ATTACKS
HACKING
DEVSECOPS
IA CYBERSECURITY
ZERO TRUST
architecture
NETWORK SECURITY
CLOUD SECURITY
IOT - OT SECURITY
API SECURITY
RISK & COMPLIANCE
#RSAC 2023
CISO2CISO Editors' Picks
Marcos Jaimovich
Nuevo Firewall para IA , un Cacharro nuevo para nuestro SOC y los equipos de Ciberseguridad !
Vendict
The 2024 CISO Burnout Report by Vendict
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of Digital Threats ?
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
IZZMIER
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection in Your SOC by Logpoint
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR Is Dead, Long Live XDR by Allie Mellen – Forrester
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK: FIRST 100 DAYS Setting the CISO up for success
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Feedspot.com
146 Best Cyber Security Blogs and Websites by Feedspot.com
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness – Global Survey of Cybersecurity Leaders by Delinea
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or Service. Software Quality must include Cybersecurity by Design Principle. Marcos Jaimovich
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original document in Spanish).
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK – Protecting The Crown Jewels by Cyber Leadership Institute – Building a cyber security strategy around high value digital assets
Marcos Jaimovich
Cyber Threat “Info Stealer” explained in Simple way: A mallware and set of techniques used by attackers to steal your confidential information !!! and much more that you should know By Marcos Jaimovich.
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
CISO2CISO Notepad Series
The sqreen DevSecOps Security Checklist
Apress
Jump-start Your SOC Analyst Career – A Roadmap to Cybersecurity Success by Apress
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos – malwareanalysis #reverseengineering
CISO2CISO Notepad Series
How Can We Structure Cybersecurity Teams To Better Integrate Security In Agile At Scale?
OCCUPYTHEWEB
Linux Basics for Hackers by Occupytheweb
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT) by NIST – Eran Salfati and Michael Pease
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
Practical DevSecOps
API Security Fundamentals – Your Handy Guide to Building an Unhackable System by practical-devsecops.com
ACSC Australia
Personal Cyber Security First Steps by Australian Government – ACSC
help net security
Compliance does not equal security !!
Chris Davis
Blue Team Cheat Sheets by Chris Davis
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by – University of Foreign Military and Cultural Studies (UFMCS).
SentinelOne
90 DAYS A CISO´s Journey to Impact define your role !!
Codrut Andrei
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI) Metrics – Incident Response (IR) Metrics for CISOs by SCYTHE
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP – AZURE by Joas Antonio
SANS
SANS Faculty Cybersecurity Free Tools – SANS Instructors have built more than 150 open source tools that support your work and help you implement better security.
Ciso Council
CISO Security Officer Handbook
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals by Cybertalk.org
Unbound Security
The Cybersecurity Acronym Book
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
FIRE EYE
The Cyber Risk Playbook – What boards of directors and executives should know about Cyber Risk by FireEye.
HADESS
Introduction to Doxing- OSINT methods for information gathering by HADESS
IBM Security
How much does a data breach cost in 2022? IBM Cost of a Data Breach 2022 Report by IBM Security
Codrut Andrei
Secure Software Development Lifecycle Fundamentals by Codrut Andrei
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined largely by your first 100 days in the role.
Latest News
The Hacker News
The Hidden Weaknesses in AI SOC Tools that No One Talks About – Source:thehackernews.com
03/07/2025
The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms – Source:thehackernews.com
03/07/2025
The Hacker News
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials – Source:thehackernews.com
03/07/2025
CSO - Online
Third-party risk management: How to avoid compliance disaster – Source: www.csoonline.com
03/07/2025
CSO - Online
Russland nutzt Medienplattform für Desinformation – Source: www.csoonline.com
03/07/2025
CSO - Online
5 multicloud security challenges — and how to address them – Source: www.csoonline.com
03/07/2025
CSO - Online
North Korean crypto thieves deploy custom Mac backdoor – Source: www.csoonline.com
03/07/2025
CSO - Online
Sixfold surge of ClickFix attacks threatens corporate defenses – Source: www.csoonline.com
03/07/2025
CSO - Online
Auf der Suche nach Alternativen zum CVE-Programm – Source: www.csoonline.com
03/07/2025
CSO - Online
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems – Source: www.csoonline.com
03/07/2025
CSO - Online
Critical RCE flaw in Anthropic’s MCP inspector exposes developer machines to remote attacks – Source: www.csoonline.com
03/07/2025
CSO - Online
Securing the next wave of workload identities in the cloud – Source: www.csoonline.com
03/07/2025
The Register Security
Cisco scores a perfect 10 – sadly for a critical flaw in its...
03/07/2025
Latest Published Posts
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by bugcrowd
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Lacework
CISO’s Playbookto Cloud Security by Lacework
MITRE - Carson Zimmerman
Ten Strategies of a World-Class Cybersecurity Operations Center by MITRE
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
CYZEA.IO
Enterprise Information Security
IGNITE Technologies
ENCRYPTED REVERSE
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Microsoft
GDPR & Generative AI
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
FS.ISAC
Navigating Cyber
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
Incibe
Ciberseguridad en Smart Toys
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
Gary Hinson
Getting started withsecurity metrics
EDPS
Generative AI and the EUDPR.
Bright
2024 Guide to Application Security Testing Tools
HADESS
Hacker Culture
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
Hacker Combat
How Are Passwords Cracked?
CIS - Center for Internet Security
How to Plan a Cybersecurity Roadmap in Four Steps
ACSC Australia
Information Security Manual
Kaspersky
Incident Response Playbook: Dark Web Breaches
ninjaOne
Endpoint Hardening Checklist
HADESS
Important Active Directory Attribute
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
Rajneesh Gupta
IAM Security CHECKLIST
sqrrl
Hunt Evil
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
IGNITE Technologies
A Detailed Guide on Covenant
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
YL VENTURES
CISO Reporting Landscape 2024
CISO Edition
Reporting Cyber Risk to Boards
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
INCIBE & SPAIN GOVERNMENT
Nuevas normativas de 2024 de ciberseguridad para vehículos
INNOVERY
RESILIENCIA
CEH
Certifications Preparation Guide
Sandhya Kaushik
Checklist for Securing Your Android Apps
aDvens
May Cyber Threat Intelligence monthly report
Insikt Group
Caught in the Net
IGNITE Technologies
BURP SUITE FOR PENTESTER TURBO INTRUDER
SYED ABUTHAHIR
BUG BOUNTY AUTOMATION WITH PYTHON
Foresiet
Brand Impersonation Attacks
Google Cloud
Board of Directors Handbook for Cloud Risk Governance
ISACA
Blueprint for Ransomware Defense
Shaurya Rawal
Blockchain Security
RISK academy
BEST RISK MANAGEMENT PROMPTS FOR CHATGPT
IGNITE Technologies
Best Alternative of Netcat
aws
AWS Security Incident Response Guide
DevSecOps Guide
Attacking Rust
DevSecOps Guide
Attacking Pipeline
DevSecOps Guide
Attacking Golang
HADESS
Assembly for Hackers
BIONIC
Application Security Posture Management
Wallarm
API ThreatStatsTM Report
Wallarm
API Security Checklist
DevSecOps Guide
ANSIBLE PLAYBOOKS
Cyber Topics
CISO Strategics & Leadership
FIRST.Org CVSS V4.0 Releasead – Navigation the Evolution – Dive into CVSS 4.0 Unveiled by Marcos Jaimovich
Azure Defenses for Ransomware Attack by Microsoft Security
Risk Mitigation , Prevention and Cutting the Kill Chain – Minimize the impact of ransomware with Akamai Guardicore Segmentation
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
The Global Risks Report 2023 – Insight Report – 18th Edition by World Economic Forum (WEF). Economics, Environmental, Geopolitical, Societal, Technological & Cyber Risks Included in the report.
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR Is Dead, Long Live XDR by Allie Mellen – Forrester
Advancing Cyber Resilience Principles and Tools for Boards by World Economic Forum (WEF)
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by BlackBerry Cybersecurity.
What is Cyber Resilience and Why Your Business Needs It by Federico Hansen ?
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
TOP 10 Cybersecurity Posture Metrics every CISO should use – A CISO Executive Guide by Balbix
Security Operations & SOC
ISACA Ransomware Incident Management Quick Reference Guide
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection in Your SOC by Logpoint
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR Is Dead, Long Live XDR by Allie Mellen – Forrester
How to Avoid Party Chaos with the Right Application-Layer DDoS Platform whitepaper by Akamai
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Incident Response 2022 Report by Kaspersky
Network Segmentation and Microsegmentation in Moderm Enterprise Environments by Akamai
Next Generation Anti-Malware Testing for Dummies – Brought to you by Cylance
Red - Blue & Purple Teams
Update: Dumping Entra Connect Sync Credentials – Source: securityboulevard.com
Bugcrowd Launches Red Team Service to Test Cybersecurity Defenses – Source: securityboulevard.com
The Renaissance of NTLM Relay Attacks: Everything You Need to Know – Source: securityboulevard.com
Offensive AI Startup Dreadnode Secures $14M to Stress-Test AI Systems – Source: www.securityweek.com
Forging a Better Operator Quality of Life – Source: securityboulevard.com
SlackPirate Set Sails Again! Or: How to Send the Entire “Bee Movie” Script to Your Friends in Slack – Source: securityboulevard.com
AI Won’t Take This Job: Microsoft Says Human Ingenuity Crucial to Red-Teaming – Source: www.securityweek.com
Ghostwriter v4.1: The Custom Fields Update – Source: securityboulevard.com
CVE-2024-23897: Assessing the Impact of the Jenkins Arbitrary File Leak Vulnerability – Source: securityboulevard.com
CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive – Source: securityboulevard.com
Calling Home, Get Your Callbacks Through RBI – Source: securityboulevard.com
ISACA Ransomware Incident Management Quick Reference Guide
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection in Your SOC by Logpoint
Cloud Security
5 multicloud security challenges — and how to address them – Source: www.csoonline.com
Securing the next wave of workload identities in the cloud – Source: www.csoonline.com
Silent Push, NordVPN Uncover Thousands of Brand-Spoofing Websites – Source: securityboulevard.com
U.S. Target North Korean IT Worker Scams with Raids, Indictments – Source: securityboulevard.com
Download the ‘AI-ready data centers’ spotlight report – Source: us.resources.csoonline.com
Three steps to boost Amazon S3 data security – Source: www.infoworld.com
Cato Networks Raises $359 Million to Expand SASE Business – Source: www.securityweek.com
Innovating NHIs Management for Better Security – Source: securityboulevard.com
NIST’s CURBy Uses Quantum to Verify Randomness of Numbers – Source: securityboulevard.com
Stay Ahead: Upgrading Your NHI Strategy for Cloud Security – Source: securityboulevard.com
‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches – Source: securityboulevard.com
How to make your multicloud security more effective – Source: www.csoonline.com
DevSecOps Discipline
Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025 – Source: securityboulevard.com
LinuxFest Northwest: Lightning Talks – Source: securityboulevard.com
LinuxFest Northwest: stillOS Launch Event – Source: securityboulevard.com
LinuxFest Northwest: CentOS Mythbusters – Source: securityboulevard.com
LinuxFest Northwest: Operating System Upgrades In A High Performance Computing Environment – Source: securityboulevard.com
LinuxFest Northwest: GNU/Linux Loves All – Source: securityboulevard.com
WhatsApp BANNED by House Security Goons — But Why? – Source: securityboulevard.com
LinuxFest Northwest: Project Caua: Start Your Own Business, Be Your Own Boss – Source: securityboulevard.com
LinuxFest Northwest: The First Black Software Engineer in America: Technology and Race – Source: securityboulevard.com
LinuxFest Northwest: The Geology of Open Source – Source: securityboulevard.com
LinuxFest Northwest: How To Linuxfest – Source: securityboulevard.com
LinuxFest Northwest: Your First Game In Godot – Source: securityboulevard.com
THREAT INTELLIGENCE
Silent Push, NordVPN Uncover Thousands of Brand-Spoofing Websites – Source: securityboulevard.com
Blumira Identifies 824 Iranian Cyber Incidents Over 21 Months – Source: securityboulevard.com
Report Finds LLMs Are Prone to Be Exploited by Phishing Campaigns – Source: securityboulevard.com
U.S. Target North Korean IT Worker Scams with Raids, Indictments – Source: securityboulevard.com
ICE’s Shiny New ‘AI’ Facial Recognition App: False Positives Ahoy! – Source: securityboulevard.com
NIST’s CURBy Uses Quantum to Verify Randomness of Numbers – Source: securityboulevard.com
‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches – Source: securityboulevard.com
Scattered Spider Targets Aflac, Other Insurance Companies – Source: securityboulevard.com
16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat – Source: securityboulevard.com
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency – Source: securityboulevard.com
AI Threat Intelligence – Source: socprime.com
Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks – Source: securityboulevard.com
Data Breaches & Leaks
Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025 – Source: securityboulevard.com
LinuxFest Northwest: Lightning Talks – Source: securityboulevard.com
LinuxFest Northwest: stillOS Launch Event – Source: securityboulevard.com
LinuxFest Northwest: CentOS Mythbusters – Source: securityboulevard.com
LinuxFest Northwest: Operating System Upgrades In A High Performance Computing Environment – Source: securityboulevard.com
LinuxFest Northwest: GNU/Linux Loves All – Source: securityboulevard.com
Latest News
The Register Security
CISA warns the Signal clone used by natsec staffers is being attacked, so...
03/07/2025
The Register Security
23andMe’s new owner says your DNA is safe this time – Source: go.theregister.com
03/07/2025
The Register Security
US imposes sanctions on second Russian bulletproof hosting vehicle this year – Source:...
03/07/2025
The Register Security
Cl0p cybercrime gang’s data exfiltration tool found vulnerable to RCE attacks – Source:...
03/07/2025
The Register Security
UK eyes new laws as cable sabotage blurs line between war and peace...
03/07/2025
The Hacker News
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark...
02/07/2025
The Hacker News
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat...
02/07/2025
The Hacker News
Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns...
02/07/2025
CSO - Online
Scattered Spider shifts focus to airlines as strikes hit Hawaiian, WestJet — and...
02/07/2025
CSO - Online
Why every company needs a travel security program – Source: www.csoonline.com
02/07/2025
CSO - Online
Cyberangriff auf australische Fluggesellschaft Qantas – Source: www.csoonline.com
02/07/2025
CSO - Online
How cybersecurity leaders can defend against the spur of AI-driven NHI – Source:...
02/07/2025
CSO - Online
Ransomware-Attacke auf Welthungerhilfe – Source: www.csoonline.com
02/07/2025
CSO - Online
Chinesische Hacker haben über 1.000 SOHO-Geräte infiziert – Source: www.csoonline.com
02/07/2025
The Hacker News
U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware – Source:thehackernews.com
02/07/2025
The Hacker News
Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages...
02/07/2025
securityweek.com
Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ –...
02/07/2025
securityweek.com
LevelBlue to Acquire Trustwave to Create Major MSSP – Source: www.securityweek.com
02/07/2025
The Register Security
Australian airline Qantas reveals data theft impacting six million customers – Source: go.theregister.com
02/07/2025
The Register Security
Microsoft admits to Intune forgetfulness – Source: go.theregister.com
02/07/2025
The Register Security
International Criminal Court swats away ‘sophisticated and targeted’ cyberattack – Source: go.theregister.com
02/07/2025
The Register Security
Terrible tales of opsec oversights: How cybercrooks get themselves caught – Source: go.theregister.com
02/07/2025
The Hacker News
Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits – Source:thehackernews.com
01/07/2025
The Hacker News
TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns – Source:thehackernews.com
01/07/2025
The Hacker News
New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified...
01/07/2025
More Latest Published Posts
Dr. Gemma GALDON CLAVELL
AI Auditing
RAND
Securing Al Model Weights
GDPR
CYBERSECURITY INCIDENT RESPONSE PLAN 1
KPMG
Cyber security guide for SMEs
ENISA-EUROPA
Cyber Resilience Act Requirements Standards Mapping
IGNITE Technologies
A Little Guide to SMB Enumeration
GMsectec
Adaptacióna PCI DSS 4.0
LogRhythm
A Guide to User and Entity Behavior Analytics (UEBA)
BONI YEAMIN
100 Offensive Linux Security Tools
SentinelOne
90 DAYS A CISO’S JOURNEY TO IMPACT
ChiefExecutive
Ciberseguridad: Prioridad Estratégica para los CEO.
CYBER SECURITY COALITION
CYBER SECURITY INCIDENT MANAGEMENT GUIDE
INL/EXT
Cybersecurity for Distributed Wind
ARTIC WOLF
Cybersecurity Compliance Guide
ESRAA MOHAMAD
ELEARN SECURITY CERTIFIED INCIDENT RESPONSE
DRAGOS
Impact of FrostyGoop ICS Malware on Connected OT Systems
Victor Tong
Digital Operational Resilience Act – Control Mappings
ARMIS
DORA Resiliency Guide Strengthening Cybersecurity and Operational Resilience in the Financial Sector
IGNITE Technologies
Docker Penetration Testing
IGNITE Technologies
Disk Group Privilege Escalation
Hiral Patel
Data LossPrevention(DLP)
Polygon
Digital identity – Deutsche Bank Corporate Bank
CSA Cloud Security Alliance
The Six Pillars of DevSecOps:Collaboration andIntegration
ASPIRE SYSTEMS
A complete guide toImplementingDevSecOps in AWS
GAO
CYBERSECURITY PROGRAM AUDIT GUIDE
Apress
Demystifying Intelligent Multimode Security Systems An SystemsAn Edge-to-Cloud Cybersecurity Solutions Guide
PWC
Data Privacy Handbook
CERT-EU
DDoS Overview and Response Guide
IGNITE Technologies
Data Exfiltration Cheat Sheet
CRC Press
Data Privacy for the Smart Grid
New York State
Cybersecurity Program Template A resource to help individual licensees and individually owned businesses develop a cybersecurity program as required by New York State’s Cybersecurity Regulation 23 NYCRR Part 500
Apress
Cyber Security on Azure An IT Professional’s Guide to Microsoft Azure Security
CyberJA
ASSET IDENTIFICATION & CLASSIFICATION-A CRITICAL COMPONENT OF CYBER RISK MANAGEMENT
SOSAFE
CybercrimeTrends 2024 The latest threats and security best practices
Routledge
Cyber Security Politics Socio-Technological Transformations and Political Fragmentation
Cigref
Surviving a Massive cyber-attack by Cigref
Hidaia Mahmood Alassouli
Common Windows, Linux and Web Server SystemsHacking Techniques
Splunk
SPLUNK® AND THE CIS CRITICALSECURITY CONTROLS Mapping Splunk Software to the CIS 20 CSC Version 6.0
SOC SIEM Use Cases
safecode
Six Pillars of DevSecOps- Collaboration and Integration
SentineOne
WatchTower I ntelligence-Driven Threat Hunting
CNIL
Security of Personal Data
OPSWAP
Securing ICS SCADA updates OT Environments
Top 300 Azure Sentinel Used Cases KQL (Kusto Query Language) queries
WITH SECURE
Threat Landscape Update Report
ThreatRadar
Threat Intel Roundup
ThreatRadar
Threat Intel Roundup
ThreatRadar
Threat Intel Roundup
Mihaela Curcă
The Role of Cyber Espionage inInternational Relations
GLOBAL NETWORK OF DIRECTOR INSTITUTES
THE FUTURE OF BOARD GOVERNANCE
Deloitte
The CISO’s Guide to Generative AI
Capgemini
PROMPT THE FUTURE
Google
We’re All in this Together
CyberSN
U.S. Cybersecurity Job Posting Data Report
CISA | Cybersecurity and Infrastructure Security Agency
UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
McKinsey & Company
Transforming risk efficiency and effectiveness
Arnold Antoo
Zero Trust Security Model
Richea Perry
Your Cybersecurity Toolkit
IGNITE Technologies
Wireless Penetration Testing
Joas A Santos
Windows API for Red Team #101
Economic Research Working Paper
Artificial Intelligence and Intellectual Property
CASOS DE USO APLICABLES EN UN SIEM
IGNITE Technologies
Burp Suite for Pentester
The Institute of Internal auditors
Auditing Risk Culture
DevSecOps Guide
ATTACKING PHP APPLICATIONS
DevSecOps Guide
ATTACKING KUBERNETES WITH SECURITY BEST PRACTICE
CLTC WHITE PAPER SERIES
Guidance for the Development of AI Risk and Impact Assessments
Active Directory
Active Directory IT AuditChecklist
A guide to business continuity planning
LOG RHYTHM
Using MITRE ATT&CK™ in Threat Huntingand Detection
Kaspersky
H2 2023 – A brief overviewof main incidentsin industrial cybersecurity
Andrey Prozorov
24 Great Cybersecurity Frameworks
ENISA-EUROPA
SEGURIDAD DE TELECOMUNICACIONES
Project Management Institute
Building Resilience Through Strategic Risk Management
DATA LOSS PREVENTION (DLP)
AICSSolutions
Cybersecurity Red Team
cisco
Cyber Incident Response
CSR Cyber Security Council
EVERY BUSINESS HAS DUTIES OF CARE IN THE FIELD OF CYBER SECURITY
SYBEX
Cybersecurity ESSENTIALS
Agency for Digital Government
Cyber security in supplier relation ships
RINKU
Curso de introducción KALI LINUX PARA HACKERS ÉTICOS
CNIL
PRACTICE GUIDE GDPR
FERMA
THE ROADMAP TO STRATEGIC RISK MANAGEMENT
ENISA-EUROPA
Cyber Resilience Act Requirements Standards Mapping
CYTAD
Essential Data Privacy Checklist
SF-ISAC
Digital Operational Resilience Act
SYNGRESS
DIGITAL FORENSICS WITH Open Source TOOLS
IT REVOLUTION DEVOPS ENTERPRISE FORUM
DevOps Automated Governance Reference Architecture
SANS GIAC CERTIFICATIONS
Detecting Attacks on Web Applications from Log Files
EUROPEAN DATA PROTECTION SUPERVISOR
ANNUAL REPORT 2023
TechTarget
IT Disaster Recovery Plan Template
Opstune
IOC Scan Framework v2.0
Federal Office for Information Security
Indirect Prompt Injections
the Department of the Environment Climate and Communications
Guidelines on CyberSecurity Specifications
Security METRICS
Security Metrics Guide to PCI DSS Compliance
Edelman
INCIDENT RESPONSE REFERENCE GUIDE
SOC TIPS Cybersecurity
Guia de Resposta a Incidentes de Segurança para LGPD
CDCP
FIREWALL Audit CHECKLIST
GitGuardian
Secrets Management Maturity Model
MegaCorp One
Sample Penetration Test Report
FORTINET
Routing in FortiGate
FUTURE OF PRIVACY FORUM
Risk Framework Body Related Data (PD) Immersive Tech
ENISA
Remote ID Proofing Good Practices
Google
Why Red TeamsPlay a Central Rolein Helping OrganizationsSecure AI Systems
Red Canary
Threat Detection Report 2024
HADESS
Pwning the Domain Persistence
Australian Goverment
PROTECTIVE SECURITYPOLICY FRAMEWORKSecuring government business:Protective security guidance for executive
CISC (Comité Internacional Sobre Ciberseguridad)
Política Nacional de Ciberseguridad 2023-2028
Google
Perspectiveson Securityfor the Board
HADESS
OSINT Method for Map Investigations
CCN-CERT
Observatorio Riesgos Ciberseguridad 2024
CYBERTHEORY
The ISMG Cybersecurity Pulse Report 2024 is a treasure trove of insights from the RSA Conference, revealing the dynamic landscape of cybersecurity. From AI to Zero Trust: A comprosive guide to the key themes and expert opinions from RSA CONFERENCE 2024 – #RSAC2024
FORTINET
Bloking Malware Through Antivirus Security Profile in FortiGate
ENISA
Best Practices for Cyber Crisis Management
viehgroup
AWS Cloud Security Checklist
DevSecOps Guide
Attacking .NET
IGNITE Technologies
Advance Burp Suite Pentester Training (Online)
LogRhythm
Using MITRE ATT&CK™in Threat Huntingand Detection
INCIDENT RESPONSE PLAN
NIST CSF 2.0
Incident Response Recommendations and Considerations for Cybersecurity Risk Management
GmFaruk
Identity and Access Management Policy
UK HM Government
National Cyber Strategy 2022
NSA
NSA Network Infrastructure Security Guide
NIST
NIST Policy Template Guide
Thecyphere
Malware prevention tips for businesses
ministry of security
MERGERS AND ACQUISITIONS
THE LINUX FUNDATION
Linux Privilege Escalation
LogRhythm
How to build a SOC with limited resources
Kubernetes
Kubernetes and Cloud Native Associate (KCNA) Study Guide
Australian Government
Management structures and responsibilities
Hacker Combat
How are Passwords Cracked ? by Hacker Combat.
N/A
Security Metrics & KPIs for Measuring SOC Success – Measure Up: How SOC Metrics Elevate Your Security Posture.
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat Research Lab Initiative.
ISA SECURE
The Case for ISA/IEC 62443Security Level 2 as a Minimumfor COTS Components
Huntress
2024 Cyber Threat Report
NACD - Intenet Security Alliance
2023 Director’s Handbook on Cyber-risk Oversight
Devoteam
14 Cybersecurity Trends for 2024
IGNITE Technologies
MEMORY FORENSICS VOLATILITY
CAREER UP
7 Steps to your SOC Analyst Career
National Cyber Security Centrum
Managing Insider Threats
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of Digital Threats ?
National Security Agency
CSI Cloud Top10 Key Management
CSA Cloud Security Alliance
Defining the Zero TrustProtect Surface
HANIM EKEN
CONTAINER SECURITY INTERVIEW QUESTIONS ANSWERS
CNIL
PRACTICE GUIDE GDPR – SECURITY OF PERSONAL DATA Version 2024
PWNED LABS
Cloud Security Engineer Roadmap
tutorialspoint.com
Cloud Computing Tutorial Simply Easy Learning
SMITHA SRIHARSHA
CISSP Preparation Notes
CISSP Mind Map: All Domains
Lansweeper
CIS 18 CRITICAL SECURITY CONTROLS CHECKLIST
Semaphore
CI-CD with Docker and Kubernetes
EC-MSP
BUSINESS CONTINUITY PLAN & DISASTER RECOVERY PLAN TEMPLATE
PWC
Building a risk-resilient organisation
Accenture
THE NEXT-GENERATION Building a Digital Central Bankfor a Digital Age
Thecyphere
Microsoft EntraID (Azure)ConditionalAccess
aws
AWS Security Incident Response Guide
Government of South Australian
South Australian Cyber Security Framework
NAO -National Audit Office
Audit and Risk Assurance Committee Effectiveness Tool
WWW. D E V S E COP S G U I D E S . CO M
Attacking Docker
W W W . D E V S E C O P S G U I D E S . C O M
Attacking AWS – Offensive Security Aproach
ENISA
Artificial Intelligence and Cybersecurity Research 2023
Green Circle
All about Security Operations Center
DAZZ
A Guide to Building a Secure SDLC – Which Scanning Tools Should I look at, and where do they go?
zimperium
2023 Mobile Banking Heists Report
40 under 40
40 under 40 in CyberSecurity 2024
HADESS
40 Days in DeepDark Web About Crypto Scam
Everbridge
8 Principles of Supply Chain Risk Management
CHAOSSEARCH
Threat Hunter’s Handbook – Using Log Analytics to Find and Neutralize Hidden Threats in Your Environment
ENDGAME
The Hunters Handbook Endgame’s Guide to Adversary Hunting
THE EU’S MOST THREATENING by EUROPOL
National Cyber Security Centre
Responding to a cyber incident – a guide for CEOs
IGNITE Technologies
CREDENTIAL DUMPING
HADESS
Pwning the Domain Lateral Movement
Jorgen Lanesskog
PING Basic IP Network Troubleshooting
TELESOFT
Layer 7 Visibility What are the Benefits?
TIGERA
Introduction to Kubernetes Networking and Security
Department of Defense's (DoD)
Defense Industrial Base Cybersecurity Strategy 2024
Dummies
Zero Trust Access for Dummies Fortinet
Homeland Security
Zero Trust Implementation Strategy
National Australia Bank Limited
Your Business and Cyber Security
CYFIRMA
Xeno RAT- A New Remote Access Trojan
IGNITE Technologies
Windows Persistence COM Hijacking MITRE T1546 015
IGNITE Technologies
Windows Exploitation Rundll32
IGNITE Technologies
Windows Exploitation Msbuild
HADESS
Web LLM Attacks
HADESS
Trended Protocols for Security Stuff
Red Iberoamericana de Protección de Datos
Transferencia Internacional de Datos Personales – Guia de Implementación
CYFIRMA
TRACKING RANSOMWARE January 2024
https://www.linkedin.com/in/harunseker/
TOP Cyber Attacks Detected by SIEM Solutions
TRAVARSA
Top 100 Cyber Threats and Solutions 2024
Top 50 Cybersecurity Threats
OWASP
Top 10 Considerations for Incident Response
EXECWEB
Tips for Cybersecurity Vendors to Connect with CISOs
WITH SECURE
Threat Landscape Report 2024
ThreatRadar
Threat Intel Roundup Phar SEO Poisoning ScreenConnect
ThreatRadar
Threat Intel Roundup Outlook, QNAP, Okta
ThreatRadar
Threat Intel Roundup Outlook SmartScreen Lockbit
ThreatRadar
Threat Intel Roundup FortiOS Super Bowl Chrome APT15
INFOSECTRAIN
Third Party Information Security Assessment Checklist
INFOSECTRAIN
THE ULTIMATE SOC – CAREER GUIDE FOR BEGINNERS
Waterfall Security Solutions LTD.
THE TOP 20 CYBERATTACKS on Industrial Control Systems
CSA Cloud Security Alliance
The State of SecurityRemediation 2024
THE LINUX FUNDATION
The Open Source Software Security Mobilization Plan by OpenSSF
HITRUST
The HITRUST Approach to NIST CSF 2.0
Gavin Phillips
The Deep and Dark Web Guide
The Computer and Information Security
Deloitte
The CISOs guide to Generative AI
Ahmed Medhat
Suspicious Traffic Detection and Analysis
KPMG
Supply Chain Risk Management – A data driven approach to protecting your organization
Latest News
CSO - Online
Cyberangriff auf australische Fluggesellschaft Qantas – Source: www.csoonline.com
02/07/2025
CSO - Online
How cybersecurity leaders can defend against the spur of AI-driven NHI – Source: www.csoonline.com
02/07/2025
CSO - Online
Ransomware-Attacke auf Welthungerhilfe – Source: www.csoonline.com
02/07/2025
CSO - Online
Chinesische Hacker haben über 1.000 SOHO-Geräte infiziert – Source: www.csoonline.com
02/07/2025
The Hacker News
U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware – Source:thehackernews.com
02/07/2025
The Hacker News
Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale – Source:thehackernews.com
02/07/2025
securityweek.com
Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ – Source: www.securityweek.com
02/07/2025
securityweek.com
LevelBlue to Acquire Trustwave to Create Major MSSP – Source: www.securityweek.com
02/07/2025
The Register Security
Australian airline Qantas reveals data theft impacting six million customers – Source: go.theregister.com
02/07/2025
The Register Security
Microsoft admits to Intune forgetfulness – Source: go.theregister.com
02/07/2025
The Register Security
International Criminal Court swats away ‘sophisticated and targeted’ cyberattack – Source: go.theregister.com
02/07/2025
The Register Security
Terrible tales of opsec oversights: How cybercrooks get themselves caught – Source: go.theregister.com
02/07/2025
The Hacker News
Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits – Source:thehackernews.com
01/07/2025
The Hacker News
TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns – Source:thehackernews.com
01/07/2025
The Hacker News
New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status – Source:thehackernews.com
01/07/2025
The Hacker News
A New Maturity Model for Browser Security: Closing the Last-Mile Risk – Source:thehackernews.com
01/07/2025
The Hacker News
Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update – Source:thehackernews.com
01/07/2025
The Hacker News
U.S. Agencies Warn of Rising Iranian Cyber Attacks on Defense, OT Networks, and Critical Infrastructure – Source:thehackernews.com
01/07/2025
CSO - Online
LLMs are guessing login URLs, and it’s a cybersecurity time bomb – Source: www.csoonline.com
01/07/2025
CSO - Online
Download the ‘AI-ready data centers’ spotlight report – Source: us.resources.csoonline.com
01/07/2025
CSO - Online
AI supply chain threats loom — as security practices lag – Source: www.csoonline.com
01/07/2025
CSO - Online
CISOs must rethink defense playbooks as cybercriminals move faster, smarter – Source: www.csoonline.com
01/07/2025
CSO - Online
PowerShell überwachen – so geht‘s – Source: www.csoonline.com
01/07/2025
CSO - Online
US DOJ makes progress combatting North Korean remote IT worker schemes – Source: www.csoonline.com
01/07/2025
CSO - Online
Three steps to boost Amazon S3 data security – Source: www.infoworld.com
01/07/2025
The Hacker News
Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation – Source:thehackernews.com
01/07/2025
The Hacker News
U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms – Source:thehackernews.com
01/07/2025
The Hacker News
Microsoft Removes Password Management from Authenticator App Starting August 2025 – Source:thehackernews.com
01/07/2025
The Hacker News
OneClik Red Team Campaign Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors – Source:thehackernews.com
01/07/2025
securityweek.com
Cato Networks Raises $359 Million to Expand SASE Business – Source: www.securityweek.com
01/07/2025
Views: 2