Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
0 – CT – CISO Strategics – Cybercrime Ecosystem
0 – CT – CISO Strategics – Cybercrime Ecosystem
Phishing Email Analysis
SEKTOR CERT
The attack against Danish, CLEAR critical infrastructure
NCSC & NCA
Ransomware, extorsion and the cyber crime ecosystem by NCSC & NCA
FATF
Countering Ransomware Financing – FATF Report March 2023
FBI - Federal Bureau of Investigation
Infamous Chisel
AIC Reports
Cybercrime in Australia 2023
ECCRI
The Cyber Dimensions of the Russia-Ukraine War by European Cyber Conflict Research Initiative (ECCRI).
Marcos Jaimovich
Cyber Threat “Info Stealer” explained in Simple way: A mallware and set of techniques used...
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
James Smith
TOR AND THE DARKNET – Remain Anonymous and Evade NSA Spying by James Smith
CLOUDSEK
Increased Cyber Attacks on the Global Health Sector by CloudSEK
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency...
Victoria Beckman - Microsoft
Ransomware as a service (RaaS) – An explainer guide to cybercrime´s newest business model
Microsoft
Microsoft Cyber Signal Report August 2022 edition – Extortion Economics – Ransomware´s new business model...
esset
ESSET THREAT REPORT T2 2022
cybereason
Ransomware The True Cost to Business 2022 – A Global Study on Ransomware Business Impact...
IST
MAPPING THE RANSOMWARE PAYMENT ECOSYSTEM BY ZOE BRAMMER – IST Institute of Security and Technology
trendmicro
A global study EVERYTHING IS CONNECTED – Uncovering the ransomware threat from global supply chains...
United Nations - ONU
Digest of Cyber Organized Crime by UNODC – United Nations Office on Drugs and Crime
Predrag Stipanovic
The Financial Impact of Malware
State service of Ukraine
Russia´s Cyber Tactics – Lessons Learnead 2022 by Information Protection of Ukraine
MANDIANT
M-TRENDS 2022 Mandiant Special Report
MIT Technology Review
The Cyber Defense Index 2022-23 – A benchmark of the digital security preparedness of enterprises...
Verizon Cyber Security
PSR 2022 – Payment Security Report 2022 by Verizon Cyber Security Consulting
Flashpoint
State of Cyber Threat Intelligence 2023 – A deep dive into perpetual cycles of cybercrime...
Europol
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by EUROPOL
Shawn Powers & Michael Jablonski
The Real Cyber War – The Political Economy of Internet Freedom by Shawn Powers &...
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
Virusbulletin.com
LAZARUS AND BYOVD – EVIL TO THE WINDOWS CORE By Peter Kalnai – Matej Havranek...
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats 2022 by Tushar Subhra Dutta –...
Posts navigation
1
2
Latest Cyber News
Data Breach Today
Ransomware Victims Who Pay a Ransom Drops to Record Low – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Lowest-Rung Attackers Challenging Ransomware-as-a-Service – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
From $8.3B to $200M: Why Lacework Is Examining a Sale to Wiz – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Why Health Firms Struggle with Cybersecurity Frameworks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Breach Roundup: LabHost Goes Down – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | CybeRx – How to Automatically Protect Rockwell OT Customers from Today’s Cyber-Attacks...
19/04/2024
Data Breach Today
Live Webinar | Human Detection & Response: Exploring Three Security Awareness Realities – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Dark Web Sales Driving Major Rise in Credential Attacks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Hacking the Floodgates: U.S. Dams Face Growing Cyber Threats – Source: www.databreachtoday.com
19/04/2024