Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Targeted attacks
Targeted attacks
securelist.com
APT trends report Q1 2024 – Source: securelist.com
securelist.com
Exploits and vulnerabilities in Q1 2024 – Source: securelist.com
securelist.com
Managed Detection and Response in 2023 – Source: securelist.com
securelist.com
ToddyCat is making holes in your infrastructure – Source: securelist.com
securelist.com
Assessing the Y, and How, of the XZ Utils incident – Source: securelist.com
securelist.com
DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware – Source: securelist.com
securelist.com
Using the LockBit builder to generate targeted ransomware – Source: securelist.com
securelist.com
ICS and OT threat predictions for 2024 – Source: securelist.com
securelist.com
A lightweight method to detect potential iOS malware – Source: securelist.com
securelist.com
Operation Triangulation: The last (hardware) mystery – Source: securelist.com
securelist.com
IT threat evolution in Q2 2023 – Source: securelist.com
securelist.com
Focus on DroxiDat/SystemBC – Source: securelist.com
securelist.com
Common TTPs of attacks against industrial organizations – Source: securelist.com
securelist.com
APT trends report Q2 2023 – Source: securelist.com
Security Boulevard
Employee Spotlight – Joseph Pike – Source: securityboulevard.com
securelist.com
Dissecting TriangleDB, a Triangulation spyware implant – Source: securelist.com
securelist.com
Operation Triangulation: iOS devices targeted with previously unknown malware – Source: securelist.com
securelist.com
Meet the GoldenJackal APT group. Don’t expect any howls – Source: securelist.com
securelist.com
CloudWizard APT: the bad magic story goes on – Source: securelist.com
securelist.com
The nature of cyberincidents in 2022 – Source: securelist.com
securelist.com
Managed Detection and Response in 2022 – Source: securelist.com
securelist.com
APT trends report Q1 2023 – Source: securelist.com
securelist.com
Tomiris called, they want their Turla malware back – Source: securelist.com
securelist.com
Following the Lazarus group by tracking DeathNote campaign – Source: securelist.com
Latest Cyber News
Data Breach Today
What Kind of People Do Cybersecurity for a Living? – Source: www.databreachtoday.com
10/07/2024
Data Breach Today
Cryptocurrency Theft Haul Surges Alongside Crypto Value – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
How CISA Plans to Measure Trust in Open-Source Software – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
Reports: Florida Health Department Dealing With Data Heist – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
OnDemand | Secure Your Applications: Learn How to Prevent AI-Generated Code Risk – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
Taking an AI-First Approach to Securing Your Organization – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
What’s the Best Strategy for Exploiting Flaws in Ransomware? – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
New Zealand Fitness Retailer Hit By DragonForce Ransomware – Source: www.databreachtoday.com
06/07/2024
Data Breach Today
Health Benefits Administrator Reports 3rd-Party Hack to SEC – Source: www.databreachtoday.com
06/07/2024