Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Cyber Security
Page 2
Cyber Security
HADESS
Red Team Guides 2023 by HADESS
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
Logan Simpson
So You Want To Be a Hacker – A story guide by Logan Simpson
SecurityScorecard
A Deep Dive into Black Basta Ransomware by SecurityScorecard
Packt
Windows Ransomware Detection and Protection – Securing Windows endpoints , the cloud and infrastructure using...
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
Europol
ChatGTP – The impact of Large Language Models on Law Enforcement by EUROPOL
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency...
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
CyberRes
A Guide to Insider Threats Infographics and How to Prevent Then by CyberRes
creative commons
OWASP API Security Top 10 – The Ten Most Critical API Security Risks by creative...
OWASP
Mobile Application Security Verification Standard – MASVD By OWASP
Europol
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by EUROPOL
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
SANS DFIR
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
CLOUDSEK
Increased Cyber Attacks on the Global Health Sector by CloudSEK
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
CSBS.ORG
Cybersecurity 101 – A Resource Guide for BANK EXECUTIVES – Executive Leadership of Cybersecurity
Inperva
DDoS Threat Landscape Report Q2 2022 by Imperva
VIRUSTOTAL
Deception at Scale – How Malware Abuses Trust by VIRUSTOTAL
ThreatLabz Team
2022 ThreatLabz Research Team – State of Ransomware Report by Zscaler
BARRACUDA
The State of Industrial Security in 2022 by Barracuda – Insecure remote access, lack of...
MANDIANT
MANDIANT APT1 – Exposing One of Chinas Cyber Espionage Units
HornetSecurity
THE 2022 HORNETSECURITY RANSOMWARE ATTACKS ANALYSIS
ACFE
ANTI-FRAUD PLAYBOOK – THE BEST DEFENSES IS A GOOD OFFENSE BY ACFE – FRAUD RISK...
CISO MAG
A day in the life of a modern CISO — You must read…
PICUS
ILLUMINATING DARKSIDE – TTPs, Tools, and the Trend Towards Defense Evasion by PICUS
Malware Analysis Techniques – Tricks for the triage of adversarial software by Dylan Barker –...
Posts navigation
1
2
3
…
37
Latest Cyber News
The Register Security
Cisco creates architecture to improve security and sell you new switches – Source: go.theregister.com
18/04/2024
The Register Security
Singapore infosec boss warns China/West tech split will be bad for interoperability – Source: go.theregister.com
18/04/2024
The Hacker News
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade – Source:thehackernews.com
18/04/2024
The Hacker News
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor – Source:thehackernews.com
18/04/2024
The Hacker News
Recover from Ransomware in 5 Minutes—We will Teach You How! – Source:thehackernews.com
18/04/2024
The Hacker News
How to Conduct Advanced Static Analysis in a Malware Sandbox – Source:thehackernews.com
18/04/2024
The Hacker News
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks – Source:thehackernews.com
18/04/2024
The Hacker News
Global Police Operation Disrupts ‘LabHost’ Phishing Service, Over 30 Arrested Worldwide – Source:thehackernews.com
18/04/2024
The Hacker News
Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes – Source:thehackernews.com
18/04/2024