Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
TOP Featured Post
TOP Featured Post
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
Joas Antonio
Windows Persistence Techniques by Joas Antonio
Unbound Security
The Cybersecurity Acronym Book
expel
MITRE ATT&CK in Google Cloud Platform (GCP) – A defender’s cheat sheet by expel
HADESS
GITHUB IN THE WILD – Some examples of offensive security used github by HADESS
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group – Threat Intelligence...
CSBS.ORG
Cybersecurity 101 – A Resource Guide for BANK EXECUTIVES – Executive Leadership of Cybersecurity
TRIMARC
10 WAYS TO IMPROVE AD SECURITY QUICKLY – list of widely applicable “easy” wins for...
help net security
Compliance does not equal security !!
HADESS
TALE OF PHIHING – Some Phishing Techniques & Awareness by HADESS.IO
ALEX SIDORENKO & ELENA DEMIDENKO
GUIDE TO EFFECTIVE RISK MANAGEMENT 3.0 – ALEX SIDORENKO – ELENA DEMIDENKO
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
Microsoft
Microsoft Zero Trust Maturity Model
SLOWMIST
Blockchain Security and AML Analysis Report 2022 Mid-Year by SLOWMIST
FORGEROCK
2022 Consumer Identity Breach Report by ForgeRock – Eve Maler.
Microsoft
Microsoft_Azure_Active_Directory_Data_Security_Considerations by Microsoft
O´REILLY
10 Steps Every CISO Should Take to Secure Next-Gen Software by Cindy Blake – O´REILLY...
Sittikorn Sangrattanapitak
Indicator of Attack (IoAs) and Activities – SOC-SIEM – A Detailed Explanation by GBHackers On...
Cobalt
The Estate of Pentesting 2022 by Cobalt
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
WILEY
Cybercrime Investigators Handbook by WILEY
Chris Davis
Blue Team Cheat Sheets by Chris Davis
McKinsey & Company
Value creation in the metaverse – The Real business of the virtual world by McKinsey...
SOPHOS
The State of Ransomware in Retail 2022 by SOPHOS –
ConversationalGeek Series
ConversationalGeek Series – Cyber Insurance by Joseph Brunsman – Delinea
Cencys
2022 State of the internet report by cencys
Canadian Centre for CyberSecurity
BASELINE CYBER SECURITY CONTROLS FOR SMALL AND MEDIUM ORGANIZATIONS V1.2 by Canadian Centre for CYBERSECURITY
CheckPoint
KEEPING YOUR EMAIL SECURE – WHO DOES IT BEST ? A Especial analysis by Checkpoint.
CSA Cloud Security Alliance
SaaS Governance Best Practices Cloud by CSA Cloud Security Alliance
Posts navigation
1
2
…
5
Latest Cyber News
The Hacker News
Recover from Ransomware in 5 Minutes—We will Teach You How! – Source:thehackernews.com
18/04/2024
The Hacker News
How to Conduct Advanced Static Analysis in a Malware Sandbox – Source:thehackernews.com
18/04/2024
The Hacker News
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks – Source:thehackernews.com
18/04/2024
The Hacker News
Global Police Operation Disrupts ‘LabHost’ Phishing Service, Over 30 Arrested Worldwide – Source:thehackernews.com
18/04/2024
The Hacker News
Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes – Source:thehackernews.com
18/04/2024
securelist.com
DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware – Source: securelist.com
18/04/2024
Data Breach Today
EU Data Regulator Threatens Meta’s ‘Pay or Okay’ Model – Source: www.databreachtoday.com
18/04/2024
Data Breach Today
How to Start a Career in Cybersecurity – Source: www.databreachtoday.com
18/04/2024
Data Breach Today
Possible Chinese Hackers Use OpenMetadata to Cryptomine – Source: www.databreachtoday.com
18/04/2024