CISO2CISO.COM & CYBER SECURITY GROUP
Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
The Most Complete Reference & News Site For The Global Cyber Community.
CISO´s Notepad & Pappers Series
Cyber Security Stories & News
Cyber Security Attacks & Incidents
Malware & Ransomware
Vulnerabilities & Zero Days
About US
Account Login
Latest News -
27/05/2023 - 2:23 PM -
The Week in Ransomware – May 26th 2023 – Cities Under Attack – Source: www.bleepingcomputer.com
27/05/2023 - 2:23 PM -
Microsoft Defender Antivirus gets ‘performance mode’ for Dev Drives – Source: www.bleepingcomputer.com
27/05/2023 - 1:23 PM -
New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets – Source:thehackernews.com
27/05/2023 - 1:23 PM -
Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking – Source:thehackernews.com
27/05/2023 - 12:23 PM -
Careless IT security worker exploited ransomware attack against his employer, but failed to cover his tracks – Source: www.tripwire.com
27/05/2023 - 9:23 AM -
Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation – Source: www.securityweek.com
27/05/2023 - 9:23 AM -
Google Cloud Users Can Now Automate TLS Certificate Lifecycle – Source: www.securityweek.com
27/05/2023 - 9:23 AM -
Zyxel Firewalls Hacked by Mirai Botnet – Source: www.securityweek.com
27/05/2023 - 9:23 AM -
NCC Group Releases Open Source Tools for Developers, Pentesters – Source: www.securityweek.com
27/05/2023 - 9:23 AM -
2 Lenses for Examining the Safety of Open Source Software – Source: www.darkreading.com
27/05/2023 - 9:23 AM -
130K+ Patients’ Social Security Numbers Leaked in UHS of Delaware Data Breach – Source: www.darkreading.com
27/05/2023 - 9:23 AM -
Tesla Whistleblower Leaks 100GB of Data, Revealing Safety Complaints – Source: www.darkreading.com
27/05/2023 - 9:23 AM -
Travel-Themed Phishing, BEC Campaigns Get Smarter as Summer Season Arrives – Source: www.darkreading.com
27/05/2023 - 8:23 AM -
New PowerExchange Backdoor linked to an Iranian APT group – Source: securityaffairs.com
27/05/2023 - 8:23 AM -
Dark Frost Botnet targets the gaming sector with powerful DDoS – Source: securityaffairs.com
27/05/2023 - 8:23 AM -
New CosmicEnergy ICS malware threatens energy grid assets – Source: securityaffairs.com
27/05/2023 - 5:23 AM -
Friday Squid Blogging: Online Cephalopod Course – Source: www.schneier.com
27/05/2023 - 5:23 AM -
Expeditionary Cyberspace Operations – Source: www.schneier.com
27/05/2023 - 4:23 AM -
Latitude Financial Attack Costs Company Up to AU$105 Million – Source: www.govinfosecurity.com
27/05/2023 - 4:23 AM -
Pegasus Spyware Spotted in Nagorno-Karabakh War – Source: www.govinfosecurity.com
Home
Pages: CISO2CISO Cyber Security Stories & News
The Hacker News
The Hacker News
New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets – Source:thehackernews.com
27/05/2023
The Hacker News
Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking – Source:thehackernews.com
27/05/2023
The Hacker News
Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data – Source:thehackernews.com
27/05/2023
The Hacker News
Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities – Source:thehackernews.com
26/05/2023
The Hacker News
5 Must-Know Facts about 5G Network Security and Its Cloud Benefits – Source:thehackernews.com
26/05/2023
The Hacker News
New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids – Source:thehackernews.com
26/05/2023
The Hacker News
Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances – Source:thehackernews.com
26/05/2023
The Hacker News
Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry – Source:thehackernews.com
26/05/2023
The Hacker News
Zyxel Issues Critical Security Patches for Firewall and VPN Products – Source:thehackernews.com
26/05/2023
Threat Post Cyber Security News
threatpost
Student Loan Breach Exposes 2.5M Records – Source: threatpost.com
25/04/2023
threatpost
Watering Hole Attacks Push ScanBox Keylogger – Source: threatpost.com
25/04/2023
threatpost
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms – Source: threatpost.com
25/04/2023
threatpost
Ransomware Attacks are on the Rise – Source: threatpost.com
25/04/2023
threatpost
Cybercriminals Are Selling Access to Chinese Surveillance Cameras – Source: threatpost.com
25/04/2023
threatpost
Twitter Whistleblower Complaint: The TL;DR Version – Source: threatpost.com
25/04/2023
threatpost
Firewall Bug Under Active Attack Triggers CISA Warning – Source: threatpost.com
25/04/2023
threatpost
Fake Reservation Links Prey on Weary Travelers – Source: threatpost.com
25/04/2023
threatpost
iPhone Users Urged to Update to Patch 2 Zero-Days – Source: threatpost.com
25/04/2023
The Register News
The Register Security
Alien versus Predator? No, this Android spyware works together – Source: go.theregister.com
27/05/2023
The Register Security
US govt pushes spyware to other countries? Senator Wyden would like a word – Source:...
27/05/2023
The Register Security
BlackByte ransomware crew lists city of Augusta after cyber ‘incident’ – Source: go.theregister.com
26/05/2023
The Register Security
It’s 2023 and Sri Lanka doesn’t have a cyber security authority – Source: go.theregister.com
26/05/2023
The Register Security
Spotted: Suspected Russian malware designed to disrupt Euro, Asia energy grids – Source: go.theregister.com
26/05/2023
The Register Security
So the FBI ‘persistently’ abused its snoop powers. What’s to worry about? – Source: go.theregister.com
26/05/2023
The Register Security
Facial recog system used by Met Police shows racial bias at low thresholds – Source:...
26/05/2023
The Register Security
Five Eyes and Microsoft accuse China of attacking US infrastructure again – Source: go.theregister.com
25/05/2023
The Register Security
This legit Android app turned into audio-snooping malware – and Google missed it – Source:...
25/05/2023
Graham Cluley Security Cyber News
grahamcluley.com
Careless IT security worker exploited ransomware attack against his employer, but failed to cover his...
27/05/2023
grahamcluley.com
Can zero trust be saved? – Source: grahamcluley.com
26/05/2023
grahamcluley.com
Sorry scammer, I’m not cancelling my McAfee Antivirus subscription – Source: grahamcluley.com
26/05/2023
grahamcluley.com
Smashing Security podcast #323: Botched Bitcoin blackmail, iSpoof, and Meta’s billion dollar data bungle –...
26/05/2023
grahamcluley.com
83C0000B: The error code that means a dodgy software update bricked your HP printer –...
25/05/2023
grahamcluley.com
Suzuki motorcycle plant shut down by cyber attack – Source: www.bitdefender.com
24/05/2023
grahamcluley.com
M&S and Diageo pension schemes exposed in Capita hack – Source: grahamcluley.com
23/05/2023
grahamcluley.com
Take action now to avoid BianLian ransomware attacks, US Government warns organisations – Source: www.tripwire.com
19/05/2023
grahamcluley.com
Smashing Security podcast #322: When you buy a criminal’s phone, and paying for social media...
18/05/2023
Databreachtoday.com
Data Breach Today
OpenAI CEO Altman ‘Blackmails’ EU Over AI Regulation – Source: www.databreachtoday.com
26/05/2023
Data Breach Today
Capita Hack Fallout: Regulator Sees Breach Reports Surge – Source: www.databreachtoday.com
26/05/2023
Data Breach Today
Iranian Hackers Deploy New Ransomware Against Israeli Firms – Source: www.databreachtoday.com
26/05/2023
Data Breach Today
ISMG Editors: How Ukraine’s Cyber Defenders Prepped for War – Source: www.databreachtoday.com
26/05/2023
Data Breach Today
Mitigating OT Security Risks: Focusing on Solutions, not Products – Source: www.databreachtoday.com
25/05/2023
Data Breach Today
CyberArk CEO Touts New Browser That Secures Privileged Users – Source: www.databreachtoday.com
25/05/2023
Data Breach Today
Mass Exploitation of Zyxel Network Appliances Underway – Source: www.databreachtoday.com
25/05/2023
Data Breach Today
Key Strategies for Secure Access to Private Apps – Source: www.databreachtoday.com
25/05/2023
Data Breach Today
Chinese State Hacker ‘Volt Typhoon’ Targets Guam and US – Source: www.databreachtoday.com
25/05/2023
SOC Prime Cyber Security News
socprime.com
Chinese State-Sponsored Cyber Actor Detection: Joint Cybersecurity Advisory (CSA) AA23-144a Sheds Light on Stealty Activity...
26/05/2023
socprime.com
SOC Prime to Present at the 11th EU MITRE ATT&CK® Community Workshop – Source: socprime.com
25/05/2023
socprime.com
UAC-0063 Cyber-Espionage Activity Detection: Hackers Target Organizations in Ukraine, Kazakhstan, Kyrgyzstan, Mongolia, Izrael, and India...
23/05/2023
socprime.com
Merdoor Malware Detection: Lancefly APT Uses a Stealthy Backdoor in Long-Running Attacks Against Organizations in...
18/05/2023
socprime.com
SOC Prime Threat Bounty — April 2023 Results – Source: socprime.com
15/05/2023
socprime.com
CVE-2023-25717 Detection: New Malware Botnet AndoryuBot Exploits RCE Flaw in the Ruckus Wireless Admin Panel...
13/05/2023
socprime.com
Snake Malware Detection: Cyber-Espionage Implant Leveraged by russia-Affiliated Turla APT in a Long-Lasting Campaign Against...
10/05/2023
socprime.com
Detecting Abused Legitimate Tools Applied by Hackers in the Human-Operated Ransomware Attacks – Source: socprime.com
10/05/2023
socprime.com
SmokeLoader Malware Detection: UAC-0006 Group Reemerges to Launch Phishing Attacks Against Ukraine Using Financial Subject...
10/05/2023
Welive Cyber Security News
Welivesecurity.com
Shedding light on AceCryptor and its operation – Source: www.welivesecurity.com
25/05/2023
Welivesecurity.com
Digital security for the self‑employed: Staying safe without an IT team to help – Source:...
24/05/2023
Welivesecurity.com
Android app breaking bad: From legitimate screen recording to file exfiltration within a year –...
24/05/2023
Welivesecurity.com
The real cost of a free lunch – Week in security with Tony Anscombe –...
20/05/2023
Welivesecurity.com
5 useful search engines for internet‑connected devices and services – Source: www.welivesecurity.com
19/05/2023
Welivesecurity.com
Meet “AI”, your new colleague: could it expose your company’s secrets? – Source: www.welivesecurity.com
19/05/2023
Welivesecurity.com
You may not care where you download software from, but malware does – Source: www.welivesecurity.com
18/05/2023
Welivesecurity.com
Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe...
13/05/2023
Welivesecurity.com
Why you need parental control software – and 5 features to look for – Source:...
13/05/2023
Naked Security News
bust
S3 Ep136: Navigating a manic malware maelstrom – Source: nakedsecurity.sophos.com
25/05/2023
bust
Ransomware tales: The MitM attack that really had a Man in the Middle – Source:...
25/05/2023
Malware
PyPI open-source code repository deals with manic malware maelstrom – Source: nakedsecurity.sophos.com
24/05/2023
bust
Phone scamming kingpin gets 13 years for running “iSpoof” service – Source: nakedsecurity.sophos.com
22/05/2023
Apple
Apple’s secret is out: 3 zero-days fixed, so be sure to patch now! – Source:...
19/05/2023
naked security
S3 Ep135: Sysadmin by day, extortionist by night – Source: nakedsecurity.sophos.com
19/05/2023
babuk
US offers $10m bounty for Russian ransomware suspect outed in indictment – Source: nakedsecurity.sophos.com
18/05/2023
belkin
Belkin Wemo Smart Plug V2 – the buffer overflow that won’t be patched – Source:...
16/05/2023
Clearview
Zut alors! Raclage crapuleux! Clearview AI in 20% more trouble in France – Source: nakedsecurity.sophos.com
16/05/2023
Krebs on Security Cyber News
Krebs On Security
Phishing Domains Tanked After Meta Sued Freenom – Source: krebsonsecurity.com
26/05/2023
Krebs On Security
Interview With a Crypto Scam Investment Spammer – Source: krebsonsecurity.com
23/05/2023
Krebs On Security
Russian Hacker “Wazawaka” Indicted for Ransomware – Source: krebsonsecurity.com
17/05/2023
Krebs On Security
Re-Victimization from Police-Auctioned Cell Phones – Source: krebsonsecurity.com
17/05/2023
Krebs On Security
Microsoft Patch Tuesday, May 2023 Edition – Source: krebsonsecurity.com
10/05/2023
Krebs On Security
Feds Take Down 13 More DDoS-for-Hire Services – Source: krebsonsecurity.com
10/05/2023
Krebs On Security
$10M Is Yours If You Can Get This Guy to Leave Russia – Source: krebsonsecurity.com
05/05/2023
Krebs On Security
Promising Jobs at the U.S. Postal Service, ‘US Job Services’ Leaks Customer Data – Source:...
03/05/2023
Krebs On Security
Many Public Salesforce Sites are Leaking Private Data – Source: krebsonsecurity.com
28/04/2023
Haxf4All Cyber Security News
Haxf4rall Security
SilentHound – Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups, Etc.
08/09/2022
Haxf4rall Security
ESP32 Marauder v0.9.12 releases: suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
08/09/2022
Haxf4rall Security
Three Sentenced in the UK for Selling Drugs on the Darkweb
08/09/2022
Haxf4rall Security
CVE-2022-29154: Rsync client-side arbitrary file write vulnerability
08/09/2022
Haxf4rall Security
ForceAdmin: Create infinite UAC prompts forcing a user to run as admin
08/09/2022
Haxf4rall Security
Woman Heads to Prison for Hiring a "Hitman” on the Darkweb
08/09/2022
Haxf4rall Security
Security Scorecards v4.5 releases: OSS Security Scorecards
08/09/2022
Haxf4rall Security
Apache Tomcat Scanner: scan for Apache Tomcat server vulnerabilities
08/09/2022
Haxf4rall Security
Kage – Graphical User Interface For Metasploit Meterpreter And Session Handler
08/09/2022
Bleeping Computer Cybersecurity News
Bleeping Computer
The Week in Ransomware – May 26th 2023 – Cities Under Attack – Source: www.bleepingcomputer.com
27/05/2023
Bleeping Computer
Microsoft Defender Antivirus gets ‘performance mode’ for Dev Drives – Source: www.bleepingcomputer.com
27/05/2023
Bleeping Computer
US govt contractor ABB confirms ransomware attack, data theft – Source: www.bleepingcomputer.com
26/05/2023
Bleeping Computer
Emby shuts down user media servers hacked in recent attack – Source: www.bleepingcomputer.com
26/05/2023
Bleeping Computer
Mozilla stops Firefox fullscreen VPN ads after user outrage – Source: www.bleepingcomputer.com
26/05/2023
Bleeping Computer
BlackByte ransomware claims City of Augusta cyberattack – Source: www.bleepingcomputer.com
26/05/2023
Bleeping Computer
Windows 11 finally gets a ‘never combine taskbar buttons’ mode – Source: www.bleepingcomputer.com
26/05/2023
Bleeping Computer
Predator: Looking under the hood of Intellexa’s Android spyware – Source: www.bleepingcomputer.com
26/05/2023
Bleeping Computer
Microsoft 365 phishing attacks use encrypted RPMSG messages – Source: www.bleepingcomputer.com
26/05/2023
Info Security Magazine Cyber News
Infosecurity Magazine
New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids – Source: www.infosecurity-magazine.com
27/05/2023
Infosecurity Magazine
Romania’s Safetech Leans into UK Cybersecurity Market – Source: www.infosecurity-magazine.com
27/05/2023
Infosecurity Magazine
Advanced Phishing Attacks Surge 356% in 2022 – Source: www.infosecurity-magazine.com
25/05/2023
Infosecurity Magazine
Expo Framework API Flaw Reveals User Data in Online Services – Source: www.infosecurity-magazine.com
25/05/2023
Infosecurity Magazine
NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure – Source: www.infosecurity-magazine.com
25/05/2023
Infosecurity Magazine
SMBs Targeted by State-Aligned Actors for Financial Theft and Supply Chain Attacks – Source: www.infosecurity-magazine.com
25/05/2023
Infosecurity Magazine
AI Used to Create Malware, WithSecure Observes – Source: www.infosecurity-magazine.com
25/05/2023
Infosecurity Magazine
Lazarus Group Targeting Microsoft Web Servers to Launch Espionage Malware – Source: www.infosecurity-magazine.com
24/05/2023
Infosecurity Magazine
US Sanctions North Korean Entities Training Expat IT Workers in Russia, China and Laos –...
24/05/2023
Cyber Talk Cybersecurity News
Cyber Talk
Unprecedented security risks, electric vehicle chargers – Source: www.cybertalk.org
27/05/2023
Cyber Talk
Safeguarding SMBs: Trends, challenges, best practices & smart security strategies – Source: www.cybertalk.org
27/05/2023
Cyber Talk
‘Volt Typhoon’ infiltrates US critical infrastructure organizations – Source: www.cybertalk.org
25/05/2023
Cyber Talk
C-suite and managers, the disconnect around cyber risk – Source: www.cybertalk.org
24/05/2023
Cyber Talk
An ounce of prevention is worth a pound of cure – Source: www.cybertalk.org
22/05/2023
Cyber Talk
Healthcare attacks are increasing: Why zero trust will prevent care disruptions – Source: www.cybertalk.org
20/05/2023
Cyber Talk
What is business identity theft and how can you prevent it? – Source: www.cybertalk.org
20/05/2023
Cyber Talk
Why are we still talking about email security? – Source: www.cybertalk.org
18/05/2023
Cyber Talk
A new malware threat is stealing 2FA codes and passwords – Source: www.cybertalk.org
17/05/2023
Security on Tech Republic News
Security TechRepublic
How to use Google Smart Lock on iOS to lock down your Google Account –...
27/05/2023
Security TechRepublic
GitLab announces AI-DevSecOps platform GitLab 16 – Source: www.techrepublic.com
27/05/2023
Security TechRepublic
Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure – Source: www.techrepublic.com
27/05/2023
Security TechRepublic
From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise – Source:...
27/05/2023
Security TechRepublic
CISO Guide to Business Email Compromise – Source: www.techrepublic.com
27/05/2023
Security TechRepublic
The Essential Guide to Cloud Email Security – Source: www.techrepublic.com
27/05/2023
Security TechRepublic
Launch your cybersecurity career with this ethical hacking bundle – Source: www.techrepublic.com
26/05/2023
Security TechRepublic
Experts laud GDPR at five year milestone – Source: www.techrepublic.com
26/05/2023
Security TechRepublic
Microsoft warns of Volt Typhoon, latest salvo in global cyberwar – Source: www.techrepublic.com
26/05/2023
CSO Online Cybersecurity News
CSO - Online
Researchers find new ICS malware toolkit designed to cause electric power outages – Source: www.csoonline.com
26/05/2023
CSO - Online
BrandPost: New report reveals tips for building a skilled cybersecurity workforce – Source: www.csoonline.com
26/05/2023
CSO - Online
BrandPost: The state of operational technology and cybersecurity – Source: www.csoonline.com
26/05/2023
CSO - Online
BrandPost: Adding the operation focus to OT security – Source: www.csoonline.com
25/05/2023
CSO - Online
How to check for new exploits in real time? VulnCheck has an answer – Source:...
25/05/2023
CSO - Online
Inactive accounts pose significant account takeover security risks – Source: www.csoonline.com
25/05/2023
CSO - Online
Microsoft links attacks on American critical infrastructure systems to China – Source: www.csoonline.com
25/05/2023
CSO - Online
6 ways generative AI chatbots and LLMs can enhance cybersecurity – Source: www.csoonline.com
25/05/2023
CSO - Online
Attributes of a mature cyber-threat intelligence program – Source: www.csoonline.com
25/05/2023
Schneier on Security Cyber News
Schneier on Security
Friday Squid Blogging: Online Cephalopod Course – Source: www.schneier.com
27/05/2023
Schneier on Security
Expeditionary Cyberspace Operations – Source: www.schneier.com
27/05/2023
Schneier on Security
On the Poisoning of LLMs – Source: www.schneier.com
26/05/2023
Schneier on Security
Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws – Source: www.schneier.com
24/05/2023
Schneier on Security
Credible Handwriting Machine – Source: www.schneier.com
23/05/2023
Schneier on Security
Google Is Not Deleting Old YouTube Videos – Source: www.schneier.com
22/05/2023
Schneier on Security
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away – Source: www.schneier.com
20/05/2023
Schneier on Security
Security Risks of New .zip and .mov Domains – Source: www.schneier.com
20/05/2023
Schneier on Security
Microsoft Secure Boot Bug – Source: www.schneier.com
18/05/2023
The Last Watchdog Cybersecurity News
The Last Watchdog
RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints – Source:...
25/05/2023
The Last Watchdog
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms...
24/05/2023
The Last Watchdog
GUEST ESSAY: A roadmap for wisely tightening cybersecurity in the modern workplace – Source: www.lastwatchdog.com
24/05/2023
The Last Watchdog
RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials...
23/05/2023
The Last Watchdog
RSAC Fireside Chat: Counteracting Putin’s weaponizing of ransomware — with containment – Source: www.lastwatchdog.com
20/05/2023
The Last Watchdog
RSAC Fireside Chat: Upgrading containment to counter Putin’s weaponizing of ransomware – Source: www.lastwatchdog.com
19/05/2023
The Last Watchdog
RSAC Fireside Chat: Deploying Hollywood-tested content protection to improve mobile app security – Source: www.lastwatchdog.com
18/05/2023
The Last Watchdog
RSAC Fireside Chat: Achieving ‘outcome-based security’ by blending cybersecurity, business goals – Source: www.lastwatchdog.com
17/05/2023
The Last Watchdog
RSAC Fireside Chat: How a well-placed ‘NGWAF’ can staunch the flow of web, mobile app...
16/05/2023
Security Boulevard News
Security Boulevard
COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT – Source: securityboulevard.com
26/05/2023
Security Boulevard
Revolutionize Zero-Trust Security With a Converged Identity Platform – Source: securityboulevard.com
26/05/2023
Security Boulevard
Digital Trust Digest: This Week’s Must-Know News – Source: securityboulevard.com
26/05/2023
Security Boulevard
Revolutionizing DMARC Solutions: Permission Management – Source: securityboulevard.com
26/05/2023
Security Boulevard
Consumers Wary of Biometric Security – Source: securityboulevard.com
26/05/2023
Security Boulevard
How to Scan Zip Files for Malware Threats – Source: securityboulevard.com
26/05/2023
Security Boulevard
Connecting the dots: Development + business risk + due diligence – Source: securityboulevard.com
26/05/2023
Security Boulevard
Federal Appellate Court Approves ‘Pretext’ Border Search – Source: securityboulevard.com
26/05/2023
Security Boulevard
Expeditionary Cyberspace Operations – Source: securityboulevard.com
26/05/2023
McAfee Security News
McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
01/04/2023
McAfee
Rising Trend of OneNote Documents for Malware delivery
31/03/2023
McAfee
Digital Spring Cleaning: Seven Steps for Faster, Safer Devices
30/03/2023
McAfee
How You May be Sharing Private Information Online Without Even Knowing
30/03/2023
McAfee
What Parents Need To Know About TikTok’s New Screen Time Limits
30/03/2023
McAfee
Protecting Your Parents from Scams with Our New Family Plans
29/03/2023
McAfee
Mobile Myths: Can My Apple Devices Get Hacked?
25/03/2023
McAfee
Spot and Remove Viruses from Your Android Phone
25/03/2023
McAfee
4 Mobile Malware Threats You Can’t Even See
23/03/2023
The Guardian Cybersecurity News
The Guardian UK
Real estate agents push back against Australian privacy law changes designed to protect personal data...
18/05/2023
The Guardian UK
Drug and alcohol tests of graduate paramedics revealed in Ambulance Victoria data breach – Source:...
12/05/2023
The Guardian UK
Twitter admits to ‘security incident’ involving Circles tweets – Source: www.theguardian.com
07/05/2023
The Guardian UK
UK competition watchdog launches review of AI market – Source: www.theguardian.com
04/05/2023
The Guardian UK
Labor to appoint dedicated privacy commissioner to combat data breaches – Source: www.theguardian.com
02/05/2023
The Guardian UK
Australian law firm HWL Ebsworth hit by Russian-linked ransomware attack – Source: www.theguardian.com
02/05/2023
The Guardian UK
Australians report record $3.1bn losses to scams, with real amount even higher, ACCC says
17/04/2023
The Guardian UK
Labour glitch put voting intentions data of millions at risk
17/04/2023
The Guardian UK
Former TSB chief information officer fined £81,000 over IT meltdown in 2018
13/04/2023
CSH Cyber Security Hub Cybersecurity News
CSH - Cyber Security Hub
When will AI be fully integrated into cyber security? – Source: www.cshub.com
25/04/2023
CSH - Cyber Security Hub
The role of API inventory in SBOM and cyber security – Source: www.cshub.com
25/04/2023
CSH - Cyber Security Hub
Have your say: the global state of cyber security – Source: www.cshub.com
25/04/2023
CSH - Cyber Security Hub
The ultimate guide to malware – Source: www.cshub.com
25/04/2023
CSH - Cyber Security Hub
We are less than a year away from a cyber attack credited to ChatGPT –...
25/04/2023
CSH - Cyber Security Hub
The benefits of automating enterprise cyber security – Source: www.cshub.com
25/04/2023
CSH - Cyber Security Hub
What is business email compromise? – Source: www.cshub.com
25/04/2023
CSH - Cyber Security Hub
The dangerous vulnerabilities caused by weak email security – Source: www.cshub.com
25/04/2023
CSH CYBER SECURITY HUB
IOTW: Latitude Financial data breach affects 14 million people
30/03/2023
Heimdal Security Cyber News
HeimdalSecurity.com
What Is ZTNA? Zero Trust Network Access Explained. – Source: heimdalsecurity.com
27/05/2023
HeimdalSecurity.com
CosmicEnergy: The New Russian-Linked Malware Targets Industrial System – Source: heimdalsecurity.com
27/05/2023
HeimdalSecurity.com
Buhti Ransomware: Blacktail’s Newest Operation Affects Multiple Countries – Source: heimdalsecurity.com
27/05/2023
HeimdalSecurity.com
Heimdal®’s Threat Prevention Endpoint Wins ‘Cloud-Based Solution of the Year’ at the Network Computing Awards...
26/05/2023
HeimdalSecurity.com
Apria Loses Financial Data of Nearly Two Million Customers Due to Cyberattack – Source: heimdalsecurity.com
25/05/2023
HeimdalSecurity.com
Breach Alert! Rheinmetall AG Confirms Being Hit by BlackBasta Ransomware Attack – Source: heimdalsecurity.com
24/05/2023
HeimdalSecurity.com
Almost 300k People Affected by Ransomware Attack on Dish Network – Source: heimdalsecurity.com
24/05/2023
HeimdalSecurity.com
The Royal Gang Is Developing Its Own Malware Loader – Source: heimdalsecurity.com
23/05/2023
HeimdalSecurity.com
IAM-Driven Biometrics: The Security Issues with Biometric Identity and Access Management – Source: heimdalsecurity.com
23/05/2023
Security affairs Cyber News
SecurityAffairs.com
New PowerExchange Backdoor linked to an Iranian APT group – Source: securityaffairs.com
27/05/2023
SecurityAffairs.com
Dark Frost Botnet targets the gaming sector with powerful DDoS – Source: securityaffairs.com
27/05/2023
SecurityAffairs.com
New CosmicEnergy ICS malware threatens energy grid assets – Source: securityaffairs.com
27/05/2023
SecurityAffairs.com
D-Link fixes two critical flaws in D-View 8 network management suite – Source: securityaffairs.com
26/05/2023
SecurityAffairs.com
Zyxel firewall and VPN devices affected by critical flaws – Source: securityaffairs.com
26/05/2023
SecurityAffairs.com
China-linked APT Volt Typhoon targets critical infrastructure organizations – Source: securityaffairs.com
26/05/2023
SecurityAffairs.com
North Korea-linked Lazarus APT targets Microsoft IIS servers to deploy malware – Source: securityaffairs.com
26/05/2023
SecurityAffairs.com
Iran-linked Tortoiseshell APT behind watering hole attacks on shipping and logistics Israeli websites – Source:...
26/05/2023
SecurityAffairs.com
Barracuda Email Security Gateway (ESG) hacked via zero-day bug – Source: securityaffairs.com
25/05/2023
Helpnet Security Cyber News
help net security
Keysight E5081A ENA-X produces error vector magnitude measurements – Source: www.helpnetsecurity.com
27/05/2023
help net security
Edgewater Wireless launches MLX 488 WiFi7 Spectrum Slicing platform – Source: www.helpnetsecurity.com
27/05/2023
help net security
Hopr raises $500K to accelerate product-led go-to-market strategy – Source: www.helpnetsecurity.com
27/05/2023
help net security
Coalesce Partner Program helps automate the modern data stack – Source: www.helpnetsecurity.com
27/05/2023
help net security
Cognigy and Black Box partnership to accelerate deployment of conversational AI – Source: www.helpnetsecurity.com
27/05/2023
help net security
Phishers use encrypted file attachments to steal Microsoft 365 account credentials – Source: www.helpnetsecurity.com
27/05/2023
help net security
New Buhti ransomware uses leaked payloads and public exploits – Source: www.helpnetsecurity.com
27/05/2023
help net security
New infosec products of the week: May 26, 2023 – Source: www.helpnetsecurity.com
27/05/2023
help net security
Threat actors exploit new channels for advanced phishing attacks – Source: www.helpnetsecurity.com
27/05/2023
Cisco Security Blog Cyber News
Cisco Security Blog
Cisco Event Response: March 2023 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled...
23/03/2023
Cisco Security Blog
Cisco Event Response: March 2023 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication
08/03/2023
Cisco Security Blog
Cisco Event Response: February 2023 Semiannual Cisco FXOS and NX-OS Software Security Advisory Bundled Publication
23/02/2023
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication
18/12/2022
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled...
18/12/2022
Cisco Security Blog
Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled...
18/12/2022
Cisco Security Blog
Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled...
09/11/2022
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled...
27/10/2022
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication
22/09/2022
Top Recommended Posts
Telegram – How a Messenger Turned into a Cybercrime Ecosystem by 2023 by Kela Cybercrime...
Microsoft Zero Trust Maturity Model
CIS Software Supply Chain Security Guide by Center for Internet Security (CIS)
Chemical Sector Cybersecurity – Framework Implementation Guidance by CISA
Hacking Tools Cheat Sheet by Compass Security
Threat Hunting Survival Guide by Microsoft Security Experts
Security Protocols – SSL vs TLS – ALL YOU NEED TO KNOW.
Common TTPs of modern ransomware groups by Kaspersky Crimeware
Threat Hunting Introduction by Joas Antonio
Cisco Talos shares insights related to recent cyber attack on Cisco
Cybersecurity for SCADA Systems by William T. Shaw
10 WAYS ASSET VISIBILITY BUILDS THE FOUNDATION FOR OT CYBERSECURITY – KNOWING THE DATA YOU...
Master Cybersecurity with Eudureka – Getting Started with Cybersecurity
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
How Can We Structure Cybersecurity Teams To Better Integrate Security In Agile At Scale?
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT !!!
CROWDSTRIKE 2022 Global Threat Report by George Kurtz
2022 Global Digital Trust Insights – The C-suite guide to simplifyng for cyber readiness today...
2023 RISK IN FOCUS – Hot topics for internal auditors by ECIIA – VUCA context...
Building a cyber resilience strategy for a geopolitically unstable world
A SANS 2021 survey – Security operations center
THE TREATH REPORT SUMMER 2022 by Trelix
Microsoft 365 and the NIST Cybersecurity Framework
Building an Effective Cyber Security Strategy in four parts approach by Silent Breach
Malware and Vulnerability Trends Report H1 2022 by Recorded Future
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
Hack the Cybersecurity Interview – A complete Interview Preparation Guide for jumpstarting your cybersecurity career...
You are probably doing DevSecOps Wrong by Practical DevSecOps – DevSecOps can seem like a...
MANDIANT – M-Trends 2023 – Mandiant Special Report
How to Recover From a Ransomware Attack by Gartner
5G Cybersecurity – Telecom Cybersecurity – Decoding the ecosystem and its vulnerabilities by SecurityGen –...
A Complete Guide to Implementing DevSecOps in AWS by aspire
A Brief Guide to Secure Multi Cloud by SPLUNK
Windows Ransomware Detection and Protection – Securing Windows endpoints , the cloud and infrastructure using...
Digest of Cyber Organized Crime by UNODC – United Nations Office on Drugs and Crime
Global Cybersecurity Outlook 2023 Insight Report by WEF – World Economic Forum in collaboration with...
2022 VEEAM Ransomware Trends Report
A Complete Guide to Cybersecurity Risk Management – Learn the ins and outs of risk...
Top 10 Open Source Security Testing Tools for Pentesters by Uendi Hoxha
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
Cybersecurity Resources and References Guide by U.S. Department of Defense
40 Methods for Privilege Escalation P1 by Hadess
Windows 11 Security Book – Powerful security from chip to cloud – Built with zero-trust...
How to design your Security Operations Center (SOC) to work smarter, not harder.
The RED REPORT 2023 – The Top 10 Most Prevalent MITRE ATT&ACK Techniques Used by...
The evolution of Cyber Hunt Processes from IOCs to TTPs by HHS
Secure Software Development Lifecycle Fundamentals by Codrut Andrei
Practical Guide for CSIRTs by OAS – A Sustainable Business Model.
A CISOs Guide to Defender Alignment by exabean
Cyber Risk and CFOs – Over-Confidence is Costly – 2022 Edition by KROLL
SANS Faculty Cybersecurity Free Tools – SANS Instructors have built more than 150 open source...
NCSC Cyber Security for Small Business “SMEs” Guide.
The evolution of Cyber Hunt Processes from IOCs to TTPs by HHS
RDP Penetration Testing by IGNITE Technologies
Malware Analysis Techniques – Tricks for the triage of adversarial software by Dylan Barker –...
How Can We Structure Cybersecurity Teams To Better Integrate Security In Agile At Scale?
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
2022 ThreatLabz Research Team – State of Ransomware Report by Zscaler
CYBER ESSENTIALS STARTER KIT – The Basics for Building a Culture of Cyber Readiness –...
New to Cyber Field Manaul – The Ultimate Guide to Getting Into Cybersecurity by SANS...
NCSC Cyber Security for Small Business “SMEs” Guide.
The Pentester Blueprint – a Guide to Becoming a Pentester
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by EUROPOL
Blueprint for Ransomware Defense – An Action Plan for Ransomware Mitigation , Response and Recovery...
Industrial Cybersecurity USB Threath Report 2022 – Threats designed for USB exploitation rise to 52%....
ChatGPT Security Risks -A Guide for Cyber Security Professionals by Cybertalk.org
CYBER RESILIENCE ACT – New EU cybersecurity rules ensure more secure hardware and software products...
2022 Microsoft Vulnerabilities Report by BeyondTrust (you must read).
Blue Team Perspective & Red Team Tools by Black Hills Information Security – BHinfoSecurity
The Transformational CISOs Guide to Security Orchestration, Automation and Response – How giving security teams...
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and...
81 Siem Very important Use Cases for your SOC by SPLUNK
Checkpoint Cyber Attack Trend 2022 Mid Year Report by Check Point Research
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
Ninjio´s Cyber Hygiene Checklist – Level Up Your Cybersecurity
CROWDSTRIKE 2022 Global Threat Report by George Kurtz
Microsoft Entra – The Comprensive Guide to Secure Azure AD & User Identities by Mohamed...
Threat Intel – Threat Intelligence JSSLoader – the shellcode edition
How to Build a Security Operation Center in Budget by AT&T Cybersecurity
The Unified Kill Chain by Paul Pols
KEEPING YOUR EMAIL SECURE – WHO DOES IT BEST ? A Especial analysis by Checkpoint.
The State of API Security Q1 2022 Report from Salt Labs
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
List Of Top Penetration Testing Tools by Hacker Combat.
Securing the cloud by design and by Default by NCSC.GOV.UK – To reduce data breaches...
Chemical Sector Cybersecurity – Framework Implementation Guidance by CISA
Best vendor agnostic SIEM for SOCs solution implementation guide by Info-Tech Research Group
Azure DevOps Security Checklist by OKAN YILDIZ – Securedebug
Cybersecurity Risk Report 2023 by RiskLens
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 by CSA Cloud Security...
The Global Risks Report 2023 – Insight Report – 18th Edition by World Economic Forum...
The “Sand Clock” Model of Cybersecurity by Javier Stransky
OWASP Top 10 2021 (DRAFT FOR PEER REVIEW) What´s New!!
How to design your Security Operations Center (SOC) to work smarter, not harder.
Microsoft 365 Enterprise – Security Assessment Playbook – A field guide and toolkit for assessing...