Skip to content
Home
About Us
Authors
Contact Us
Submit News
Register
Sitemap
Twitter
Linkedin-in
Youtube
Rss
CISO Notepad Series
Cybersecurity Latest Stories & News
Cyber Security Attacks & Incidents
Vulnerabilities & Zero Days
Account Login
Home
0 – CT – SOC – CSIRT Operations – Red – Blue & Purple Teams Operations
0 – CT – SOC – CSIRT Operations – Red – Blue & Purple Teams Operations
IGNITE Technologies
A Detailed Guide on Log4J Penetration Testing
IGNITE Technologies
A Detailed Guide on Evil Winrm
IGNITE Technologies
A Detailed Guide on Chisel
Hacking with Go
Pentest Cheat Sheets
Cyber Security & Artificial Inteligence Services
A Pentester’s Diary
Quick Start Guide to Penetration Testing
SYBEX
PENETRATION TESTING ESSENTIALS
purple hackademy
Building a SOC Honeynet in Azure
Maik Ro
Becoming a SOC analyst V1
JOES
New Tool exploits Microsoft Teams in the wild Advisory
ThreatRadar
Threat Intel Roundup: XWiki, cl0p, HTML Sumggling
Red Teaming Toolkit
Packt
Practical Web Penetration Testing
Mc Graw Hill
Gray Hat Hacking: The Ethical Hacker’s Handbook, Second Edition
EDR Bypassing via Memory Manipulation Techniques
BlueTeam-Tools
LetsDefend
Investigate FakeGPT web extension
Cyberyami
Brute Force Attack Explained
HADESS
TACFAM DB-120WL
Threat Intelligence and Darkweb Monitoring
HUGO WOFFMAN
Ethical Hacking With Kali Linux
TLP:WITHE
Cyber Security Incident Vulnerability Response Playbooks
Johnny Long
Google Hacking for Penetration Testers
HADESS
RED TEAM GETTING TO KNOW ABOUT ADVANTAGES DISADVANTAGES
CRR Resource Guide series
VulnerabilIty Management Guide
Penetration Testing Guide
JULIEN DANJOU
Hacker Guide to Python
safecode
Tactical Threat Modeling
Practical DevSecOps
MISCONCEPTIONS ABOUT DREAD THREAT MODELING
Posts navigation
1
2
…
5
Latest Cyber News
securityweek.com
New ‘Turtle’ macOS Ransomware Analyzed – Source: www.securityweek.com
01/12/2023
securityweek.com
US Sanctions North Korean Cyberespionage Group Kimsuky – Source: www.securityweek.com
01/12/2023
securityweek.com
Simple Attack Allowed Extraction of ChatGPT Training Data – Source: www.securityweek.com
01/12/2023
The Hacker News
New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia – Source:thehackernews.com
01/12/2023
securelist.com
IT threat evolution in Q3 2023. Mobile statistics – Source: securelist.com
01/12/2023
securelist.com
IT threat evolution Q3 2023 – Source: securelist.com
01/12/2023
securelist.com
IT threat evolution in Q3 2023. Non-mobile statistics – Source: securelist.com
01/12/2023
The Register Security
Regulator says stranger entered hospital, treated a patient, took a document … then vanished – Source: go.theregister.com
01/12/2023
The Register Security
Interpol makes first border arrest using Biometric Hub to ID suspect – Source: go.theregister.com
01/12/2023