Skip to content
The Most Complete Reference & News Site For The Global Cyber Community.
CISO´s Notepad & Pappers Series
Cyber Security Stories & News
Cyber Security Attacks & Incidents
Malware & Ransomware
Vulnerabilities & Zero Days
About US
Account Login
Home
Pages: CISO2CISO Cyber Security Resources – Hacking – Hackers – Pentest – Vulnerability Assessment – Notepads & Tools
Hacking - Pentest - Vulnerability Assessment - Notepads & Tools
Security TechRepublic
HackerOne: How Artificial Intelligence Is Changing Cyber Threats and Ethical Hacking – Source: www.techrepublic.com
Security TechRepublic
Learn How to Protect Your Business With Ultimate Security for $80 – Source: www.techrepublic.com
Logan Simpson
So You Want To Be a Hacker – A story guide by Logan Simpson
Security TechRepublic
This 18-course ethical hacking bundle is under $50 – Source: www.techrepublic.com
Hugo Hoffman
Ethical Hacking with Kali Linux – Learn fast how to hack like a pro by...
Security TechRepublic
Launch your cybersecurity career with this ethical hacking bundle – Source: www.techrepublic.com
Security Boulevard
The Legacy of The Hacker Manifesto – Source: securityboulevard.com
Apress
Quick Start Guide to Penetration Testing with NMAP , OpenVAS & Metaexploit by Sagar Rahalkar...
Security TechRepublic
HackerOne: How the economy is impacting cybersecurity teams – Source: www.techrepublic.com
Security TechRepublic
Protect your business by developing valuable cybersecurity skills for just $40 – Source: www.techrepublic.com
Dror Amrami
TESLA Cars Cyber Security – Threats Vulnerabilities Hacking Protection by Dror Amrami
WILEY
Hacking Connected Cars – Tactics, Techniques and Procedures by Alissa Knight – Wiley
upstream
Global Automotive Cybersecurity Report 2022 – Automotive Cyber Threat Landscape in Light of New Regulations...
Security TechRepublic
Learn what you need to protect your business with ethical hacking for just $45
Dinesh Shetty - Security Innovation
Hacking iOS Applications – A detailed testing guide by Dinesh Shetty – Security Innovation
Bruce Schneier
The Coming AI Hackers – Council for the responsible use of AI by Bruce Schneier
varonis
Pentesting Active Directory Environments by VARONIS
Cobalt
The Estate of Pentesting 2022 by Cobalt
IGNITE Technologies
RDP Penetration Testing by IGNITE Technologies
@ANHKWAR
The Most Complete RED TEAM & PENTEST Reference and Resources Guide by @ANHKWAR
Bleeping Computer
bleepingcomputer – Hackers undetected on Queensland water supplier server for 9 months
help net security
helpnetsecurity – Why are we still asking KBA questions to authenticate identity?
The Hacker News
thehackernews – Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters
The Hacker News
thehackernews – 3 Former U.S. Intelligence Officers Admit to Hacking for UAE Company
Security Boulevard
Attacking APIs by tainting data in weird places – Source: securityboulevard.com
SecurityAffairs.com
Pro-Russia group NoName took down multiple France sites, including the French Senate one – Source:...
Apress
Quick Start Guide to Penetration Testing with NMAP , OpenVAS & Metaexploit by Sagar Rahalkar...
Security TechRepublic
HackerOne: How the economy is impacting cybersecurity teams – Source: www.techrepublic.com
Security TechRepublic
Protect your business by developing valuable cybersecurity skills for just $40 – Source: www.techrepublic.com
Cyber Talk
Hacktivism and the new age of cyber warfare – Source: www.cybertalk.org
Cyber Talk
Microsoft’s next-level nomenclature, naming hacking groups – Source: www.cybertalk.org
help net security
Why juice jacking is overhyped – Source: www.helpnetsecurity.com
Dror Amrami
TESLA Cars Cyber Security – Threats Vulnerabilities Hacking Protection by Dror Amrami
SecurityAffairs.com
Pro-Russia hacking group executed a disruptive attack against a Canadian gas pipeline – Source: securityaffairs.com
SecurityAffairs.com
Pro-Russia hackers launched a massive attack against the EUROCONTROL agency – Source: securityaffairs.com
WILEY
Hacking Connected Cars – Tactics, Techniques and Procedures by Alissa Knight – Wiley
upstream
Global Automotive Cybersecurity Report 2022 – Automotive Cyber Threat Landscape in Light of New Regulations...
SecurityAffairs.com
Experts warn of an emerging Python-based credential harvester named Legion – Source: securityaffairs.com
SecurityAffairs.com
A cyber attack hit the water controllers for irrigating fields in the Jordan Valley
Security TechRepublic
Learn what you need to protect your business with ethical hacking for just $45
Security TechRepublic
DDoS attacks rise as pro-Russia groups attack Finland, Israel
Schneier on Security
A Hacker’s Mind News
Dinesh Shetty - Security Innovation
Hacking iOS Applications – A detailed testing guide by Dinesh Shetty – Security Innovation
Bruce Schneier
The Coming AI Hackers – Council for the responsible use of AI by Bruce Schneier
varonis
Pentesting Active Directory Environments by VARONIS
Cobalt
The Estate of Pentesting 2022 by Cobalt
IGNITE Technologies
RDP Penetration Testing by IGNITE Technologies
@ANHKWAR
The Most Complete RED TEAM & PENTEST Reference and Resources Guide by @ANHKWAR
Bleeping Computer
bleepingcomputer – Hackers undetected on Queensland water supplier server for 9 months
help net security
helpnetsecurity – Why are we still asking KBA questions to authenticate identity?
The Hacker News
thehackernews – Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters
The Hacker News
thehackernews – 3 Former U.S. Intelligence Officers Admit to Hacking for UAE Company
The Hacker News
thehackernews – Hackers Leak VPN Account Passwords From 87,000 Fortinet FortiGate Devices
The Hacker News
thehackernews – FIN7 Hackers Using Windows 11 Themed Documents to Drop Javascript Backdoor
The Hacker News
thehackernews – Chinese Authorities Arrest Hackers Behind Mozi IoT Botnet Attacks
The Hacker News
The Hacker News – Interpol Arrests Moroccan Hacker Engaged in Nefarious Cyber Activities
The Hacker News
The Hacker News – Researchers Uncover Hacking Operations Targeting Government Entities in South Korea
The Hacker News
The Hacker News – 120 Compromised Ad Servers Target Millions of Internet Users
naked security
nakedsecurity – S3 Ep28: Pwn2Own hacks, dark web hitmen and COVID-19 privacy [Podcast]
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy