Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
THREAT INTELLIGENCE
THREAT INTELLIGENCE
NCSC & NCA
Ransomware, extorsion and the cyber crime ecosystem by NCSC & NCA
FATF
Countering Ransomware Financing – FATF Report March 2023
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
BlackBerry CyberSecurity
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by...
Cyborg Security
Threat Hunting Framework by Cyborg Security
CSO - AKAMAI
From Bad Bots to Malcious Scripts – The Effectiveness of Specialized Defense by CSO –...
National Cyber Crime Agencie
Manual on Social Media Intelligence (SOCMINT) for Law Enforcement Agencies by National Cyber Crume Research...
State service of Ukraine
Russia´s Cyber Tactics – Lessons Learnead 2022 by Information Protection of Ukraine
MANDIANT
MANDIANT APT1 – Exposing One of Chinas Cyber Espionage Units
Red Canary
2023 THREAT DETECTION REPORT – TECHNIQUES, TRENDS AND TAKEAWAYS BY Red Canary
SANS
SANS Offensive Operations – ChatGPT for Offensive Security – What is ChatGPT and how can...
Recorded Future
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
PICUS
ILLUMINATING DARKSIDE – TTPs, Tools, and the Trend Towards Defense Evasion by PICUS
Flashpoint
State of Cyber Threat Intelligence 2023 – A deep dive into perpetual cycles of cybercrime...
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
osint - Open Source Intelligence
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and...
BONI YEAMIN
OPEN SOURCE SOC TOOLS BY BONI YEAMIN
PRASANNAKUMAR MUNDAS
Threat Hunting Playbooks for MITRE Tactics – Starting your first threat hunting today by PRASANNAKUMAR...
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection...
Joas Antonio
OSINT – The Most Complete Open Source Intelligence Overview by Joas Antonio
ENDGAME
KERNEL MODE THREATS AND PRACTICAL DEFENSES BY Joe Desimone and Ganriel Landau – ENDGAME
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect, deter, and...
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group – Threat Intelligence...
MANDIANT
M-TRENDS 2022 Mandiant Special Report
Joas Antonio
ChatGPT for Cybersecurity 1 by Joas Dos Santos
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
Posts navigation
1
2
Latest Cyber News
The Register Security
EU tells Meta it can’t paywall privacy – Source: go.theregister.com
18/04/2024
The Register Security
Prolific phishing-made-easy emporium LabHost knocked offline in cyber-cop op – Source: go.theregister.com
18/04/2024
The Register Security
Cisco creates architecture to improve security and sell you new switches – Source: go.theregister.com
18/04/2024
The Register Security
Singapore infosec boss warns China/West tech split will be bad for interoperability – Source: go.theregister.com
18/04/2024
The Hacker News
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade – Source:thehackernews.com
18/04/2024
The Hacker News
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor – Source:thehackernews.com
18/04/2024
The Hacker News
Recover from Ransomware in 5 Minutes—We will Teach You How! – Source:thehackernews.com
18/04/2024
The Hacker News
How to Conduct Advanced Static Analysis in a Malware Sandbox – Source:thehackernews.com
18/04/2024
The Hacker News
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks – Source:thehackernews.com
18/04/2024