Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
THREAT INTELLIGENCE
THREAT INTELLIGENCE
NCSC & NCA
Ransomware, extorsion and the cyber crime ecosystem by NCSC & NCA
FATF
Countering Ransomware Financing – FATF Report March 2023
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
BlackBerry CyberSecurity
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by...
Cyborg Security
Threat Hunting Framework by Cyborg Security
CSO - AKAMAI
From Bad Bots to Malcious Scripts – The Effectiveness of Specialized Defense by CSO –...
Recorded Future
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
PICUS
ILLUMINATING DARKSIDE – TTPs, Tools, and the Trend Towards Defense Evasion by PICUS
Flashpoint
State of Cyber Threat Intelligence 2023 – A deep dive into perpetual cycles of cybercrime...
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
osint - Open Source Intelligence
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and...
BONI YEAMIN
OPEN SOURCE SOC TOOLS BY BONI YEAMIN
PRASANNAKUMAR MUNDAS
Threat Hunting Playbooks for MITRE Tactics – Starting your first threat hunting today by PRASANNAKUMAR...
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection...
Joas Antonio
OSINT – The Most Complete Open Source Intelligence Overview by Joas Antonio
ENDGAME
KERNEL MODE THREATS AND PRACTICAL DEFENSES BY Joe Desimone and Ganriel Landau – ENDGAME
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect, deter, and...
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group – Threat Intelligence...
MANDIANT
M-TRENDS 2022 Mandiant Special Report
National Cyber Crime Agencie
Manual on Social Media Intelligence (SOCMINT) for Law Enforcement Agencies by National Cyber Crume Research...
State service of Ukraine
Russia´s Cyber Tactics – Lessons Learnead 2022 by Information Protection of Ukraine
MANDIANT
MANDIANT APT1 – Exposing One of Chinas Cyber Espionage Units
Red Canary
2023 THREAT DETECTION REPORT – TECHNIQUES, TRENDS AND TAKEAWAYS BY Red Canary
SANS
SANS Offensive Operations – ChatGPT for Offensive Security – What is ChatGPT and how can...
Joas Antonio
ChatGPT for Cybersecurity 1 by Joas Dos Santos
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
Posts navigation
1
2
Latest Cyber News
Data Breach Today
The Critical Role of Effective Onboarding – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Will Cybersecurity Get Its 1st New Unicorn Since June 2022? – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
HHS Resources, Funding to Bolster Healthcare Cyber Efforts – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Building a 911 Cyber Civil Defense System for Healthcare – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
The Concentrated Cyber Risk Posed by Enormous Vendors – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Webinar | Navigating the SEC Rules for Enhanced Cybersecurity in IT and OT Environments –...
14/03/2024
Data Breach Today
Hackers Hiding Keylogger, RAT Malware in SVG Image Files – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Live Webinar | Navigating Identity Threats: Detection & Response Strategies for Modern Security Challenges – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
EU Parliament Approves the Artificial Intelligence Act – Source: www.databreachtoday.com
14/03/2024