Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Cyber Security
Page 3
Cyber Security
Splunk
Top 50 Security Threats by Splunk
VIRUSTOTAL
Ransomware in a Global Context Report 2021 by Virustotal
Microsoft Security
Data Loss Prevention from on-premises to cloud by Microsoft Security
Benjamin Eidam
The 116 Best Cybersecurity Tools & Tactics 2021
Bruce Schneier
The Coming AI Hackers – Council for the responsible use of AI by Bruce Schneier
WILEY
Modern Malware for Dummies
IST RANSOM TASKFORCE
Blueprint for Ransomware Defense – An Action Plan for Ransomware Mitigation , Response and Recovery...
CLAROTY TEAM 82 RESEARCH
EVIL PLC ATTACK – WEAPONIZING PLCS By Team82, Claroty Research Team
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT !!!
WILEY
Threat Hunting for Dummies
Dinesh Shetty - Security Innovation
Hacking iOS Applications – A detailed testing guide by Dinesh Shetty – Security Innovation
HHS
The Evolution of Cyber Hunt Processes From IOCs to TTPs by HHS OIS Organization
SOPHOS
The State of Ransomware in Retail 2022 by SOPHOS –
ENISA-EUROPA
A Governance Framework for National Cybersecurity Strategies by European Union Agency for Cybersecurity – enisa
DRAGOS
ASSESSING OPERATIONAL TECHNOLOGY (OT) CYBERSECURITY MODEL – AN ANALYSIS OF LEASED DATACENTERS UTILIZING THE CYBERSECURITY...
HADESS
Red Team Guides 2023 by HADESS
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
Logan Simpson
So You Want To Be a Hacker – A story guide by Logan Simpson
SecurityScorecard
A Deep Dive into Black Basta Ransomware by SecurityScorecard
Packt
Windows Ransomware Detection and Protection – Securing Windows endpoints , the cloud and infrastructure using...
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
Cynalytica
5 Targets Hackers Look for When Attacking an OT Network by Cynalytica
Europol
ChatGTP – The impact of Large Language Models on Law Enforcement by EUROPOL
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency...
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
OWASP
Mobile Application Security Verification Standard – MASVD By OWASP
Europol
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by EUROPOL
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
Posts navigation
1
2
3
4
…
37
Latest Cyber News
The Register Security
Russia, Iran pose most aggressive threat to 2024 elections, say infoseccers – Source: go.theregister.com
01/05/2024
The Register Security
Indian bank’s IT is so shabby it’s been banned from opening new accounts – Source:...
01/05/2024
The Register Security
Australia’s spies and cops want ‘accountable encryption’ – aka access to backdoors – Source: go.theregister.com
01/05/2024
The Register Security
Governments issue alerts after ‘sophisticated’ state-backed actor found exploiting flaws in Cisco security boxes –...
01/05/2024
The Register Security
Shouldn’t Teams, Zoom, Slack all interoperate securely for the Feds? Wyden is asking – Source:...
01/05/2024
The Hacker News
Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds – Source:thehackernews.com
01/05/2024
The Hacker News
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers – Source:thehackernews.com
01/05/2024
The Hacker News
Everyone’s an Expert: How to Empower Your Employees for Cybersecurity Success – Source:thehackernews.com
01/05/2024
The Hacker News
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan – Source:thehackernews.com
01/05/2024