CISO2CISO.COM & CYBER SECURITY GROUP
Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
The Most Complete Reference & News Site For The Global Cyber Community.
CISO´s Notepad & Pappers Series
Cyber Security Stories & News
Cyber Security Attacks & Incidents
Malware & Ransomware
Vulnerabilities & Zero Days
About US
Account Login
LASTEST NEWS
04/06/2023 - 7:23 PM -
Strengthening The Canadian Financial Sector’s Cybersecurity – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Dancho Danchev’s OSINT and Threat Intelligence Training Video Demonstration in Bulgarian – Part Two – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Dancho Danchev’s OSINT and Threat Intelligence Training Video Demonstration in Bulgarian – Part One – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Technical Analysis of Bandit Stealer – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Using Cloud Securely — The Config Doom Question – Source: securityboulevard.com
04/06/2023 - 6:23 PM -
Microsoft Sets Aside $425M For Anticipated GDPR Fine – Source: www.databreachtoday.com
04/06/2023 - 4:23 PM -
Xplain hack impacted the Swiss cantonal police and Fedpol – Source: securityaffairs.com
04/06/2023 - 4:23 PM -
Zyxel published guidance for protecting devices from ongoing attacks – Source: securityaffairs.com
04/06/2023 - 4:23 PM -
Kimsuky APT poses as journalists and broadcast writers in its attacks – Source: securityaffairs.com
04/06/2023 - 10:23 AM -
API security in the spotlight – Week in security with Tony Anscombe – Source: www.welivesecurity.com
04/06/2023 - 1:23 AM -
Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech – Source: www.securityweek.com
04/06/2023 - 1:23 AM -
In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack – Source: www.securityweek.com
03/06/2023 - 11:24 PM -
Weekly Update 350 – Source: www.troyhunt.com
03/06/2023 - 10:24 PM -
Risk: Everything Everywhere All at Once – Source: www.cyberdefensemagazine.com
03/06/2023 - 9:19 PM -
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
03/06/2023 - 8:23 PM -
Microsoft Sets Aside $425M For Anticipated GDPR Fine – Source: www.govinfosecurity.com
03/06/2023 - 8:23 PM -
Hackers Using MOVEit Flaw to Deploy Web Shells, Steal Data – Source: www.govinfosecurity.com
03/06/2023 - 8:23 PM -
Chinese APT Backdoor Bypasses Indonesian Antivirus – Source: www.govinfosecurity.com
03/06/2023 - 7:23 PM -
The great CISO resignation: Why security leaders are quitting in droves – Source: www.proofpoint.com
03/06/2023 - 7:23 PM -
Online sellers targeted by new information-stealing malware campaign – Source: www.bleepingcomputer.com
Home
Pages: CISO2CISO Cyber Security Resources – RED – BLUE & PURPLE TEAMS
RED - BLUE - PURPLE TEAMS Notepads & resources
Hugo Hoffman
Ethical Hacking with Kali Linux – Learn fast how to hack like a pro by...
not known
Threat Intelligence & Dark web Monitoring Tools
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
TIDAL CYBER
The Ultimate Guide to CYBER THREAT Profiling by TIDAL CYBER
Security Boulevard
COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT – Source: securityboulevard.com
IZZMIER
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
Kaspersky
Incident Response 2022 Report by Kaspersky
Purple Knight
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory...
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
exabean
The Ultimate Guide to Insider Threats eBook by exabeam
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
Apress
Quick Start Guide to Penetration Testing with NMAP , OpenVAS & Metaexploit by Sagar Rahalkar...
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
Apress
Wireshark for Network Forensics – An Essential Guide for IT and Cloud Professionals by Nagendra...
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
GFCE
Introduction to Tabletop Exercises (TTX) – A practical Guidebook for Organizations by Capgemini for GFCE...
aws
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
Maddie Stone - Google
0-days Detected in-the-Wild in 2022 – Year in Review – Maddie Stone – Zer0Con 2023...
IGNITE Technologies
Incident Response Cheatsheet Windows & Linux by Hackingarticles.in – Ignite Technologies
Cyborg Security
Threat Hunting Framework by Cyborg Security
osint - Open Source Intelligence
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and...
BHInfoSecurity
Blue Team Perspective & Red Team Tools by Black Hills Information Security – BHinfoSecurity
Recorded Future
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
Packt
Cybersecurity Blue Team Strategies – Uncover the secrets of blue teams to combat cyber threats...
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by...
HADESS
Red Team Guides 2023 by HADESS
WILEY
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech and non-tech...
@ANHKWAR
The Most Complete RED TEAM & PENTEST Reference and Resources Guide by @ANHKWAR
CISSPWOMEN.COM
Introducing to Pueple Teaming – Some Attacks and Detects Methods by Saeedeh Zeinali
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS