The most complete list compiled of Cyber Security Web Sites, Blogs & RSS Feeds with more that 660 sites including general IT Security Blogs & Forums,...
Category: CISO2CISO ToolBox Series
PCI DSS Quick Reference Guide – Understanding the Payment Card Industry – Data Security Standar version 3.2.1
Introduction: Protecting Cardholder Data with PCI Security Standards The twentieth century U.S. criminal Willie Sutton was said to rob banks because “that’s where themoney is.” The...
CISO2CISO Notepad Series CISO2CISO ToolBox Series Last Article Publication SIEM SOC User most voted post
Undestanding the Open Cybersecurity Schema Framework by Paul Agbabian.
Introduction to the Framework and Schema This document describes the Open Cybersecurity Schema Framework (OCSF) and its taxonomy,including the core cybersecurity event schema built with the...
Advisor Most Voted Post CISO2CISO Notepad Series CISO2CISO ToolBox Series SIEM SOC TOP Featured Post User most voted post
81 Siem Very important Use Cases for your SOC by SPLUNK
Splunk Use Cases Tags: Splunk 1- Windows Audit Log Tampering Check for any tampering done to Windows audit logs. 2- Finding Large Web Uploads Find large file...
Cybersecurity for SCADA Systems by William T. Shaw
In the 1960s, when the first computer-based supervisory control and data acquisition systems (SCADA) were being developed, there was no cultural concept of needing to provide...
Nmap for Pentesters – A Beginners Guide By Ignite Technologies
IntroductionNmap (“Network Mapper”) is a free and open-source (licenced) utility for network discovery and securityauditing. Many systems and network administrators also find it useful for tasks...
40 Methods for Privilege Escalation P1 by Hadess
Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from...
Blue Team Cheat Sheets by Chris Davis
NETWORKING / BLUE TEAM TOOLSCommon Ports………………………………………………………………………………………… 1IPv4/TCP-UDP-ICMP Headers, Subnetting…………………………………………………. 2IPv6/TCP Header ……………………………………………………………………………………. 6OSI Model,……………………………………………………………………………………………… 9HTTP, FTP, Decimal to Hex Conversion …………………………………………………… 1220 Critical Security Controls ……………………………………………………………………....
How to Build a Security Operation Center in Budget by AT&T Cybersecurity
Introduction SOC basics Whether you’re protecting a bank or the local grocery store, certain common sense security rules apply. At the very least, you need locks...
Top 10 Open Source Security Testing Tools for Pentesters by Uendi Hoxha
What is Security Testing? Security testing is performed to ensure that the data within an information system is protected andis not accessible by unauthorized users. It...
21 OSINT Research Tools for Threat Intelligence
Introduction To help you investigate the vast expanses of the open, deep, and dark web, Authentic8 engineers used Silo for Research (Toolbox) to build a list...