Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Red Team
Red Team
IZZMIER
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
Cyborg Security
Threat Hunting Framework by Cyborg Security
Kaspersky
Incident Response 2022 Report by Kaspersky
Lawrence C. Miller
Next Generation Anti-Malware Testing for Dummies – Brought to you by Cylance
Apress
Quick Start Guide to Penetration Testing with NMAP , OpenVAS & Metaexploit by Sagar Rahalkar...
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
Maddie Stone - Google
0-days Detected in-the-Wild in 2022 – Year in Review – Maddie Stone – Zer0Con 2023...
aws
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
@ANHKWAR
The Most Complete RED TEAM & PENTEST Reference and Resources Guide by @ANHKWAR
HADESS
Red Team Guides 2023 by HADESS
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by...
Packt
Cybersecurity Blue Team Strategies – Uncover the secrets of blue teams to combat cyber threats...
BHInfoSecurity
Blue Team Perspective & Red Team Tools by Black Hills Information Security – BHinfoSecurity
Logan Simpson
So You Want To Be a Hacker – A story guide by Logan Simpson
ChatGPT & Haci Dasgin
Malware Analisys 101 – created by ChatGPT in 20 minutes
Lester Chng
How to Define Objetives for Cybersecurity Tabletop Exercises by Lester Chng
not known
Threat Intelligence & Dark web Monitoring Tools
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
Purple Knight
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory...
exabean
The Ultimate Guide to Insider Threats eBook by exabeam
Apress
Wireshark for Network Forensics – An Essential Guide for IT and Cloud Professionals by Nagendra...
GFCE
Introduction to Tabletop Exercises (TTX) – A practical Guidebook for Organizations by Capgemini for GFCE...
IGNITE Technologies
Incident Response Cheatsheet Windows & Linux by Hackingarticles.in – Ignite Technologies
Latest Cyber News
Data Breach Today
Meta and YouTube Update Their AI Content Policies – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Evolve Ransomware Hack Affects Affirm and Fintech Companies – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Rapid7 Purchases Noetic for Better Attack Surface Management – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
How Top Cybersecurity Leaders Predict Threats and Navigate Risk – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
How Top Cybersecurity Leaders Predict Threats and Navigate Risk – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Groups Ask HHS for Guidance on Massive Change Breach Reports – Source: www.databreachtoday.com
02/07/2024
Data Breach Today
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys – Source: www.databreachtoday.com
02/07/2024