Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: CISO2CISO Cyber Security Stories & News
The Hacker News
The Hacker News
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool – Source:thehackernews.com
18/03/2024
The Hacker News
Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer – Source:thehackernews.com
16/03/2024
The Hacker News
Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover – Source:thehackernews.com
16/03/2024
The Hacker News
3 Things CISOs Achieve with Cato – Source:thehackernews.com
16/03/2024
The Hacker News
RedCurl Cybercrime Group Abuses Windows PCA Tool for Corporate Espionage – Source:thehackernews.com
16/03/2024
The Hacker News
Ande Loader Malware Targets Manufacturing Sector in North America – Source:thehackernews.com
16/03/2024
The Hacker News
Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software – Source:thehackernews.com
16/03/2024
The Hacker News
Researchers Highlight Google’s Gemini AI Susceptibility to LLM Threats – Source:thehackernews.com
16/03/2024
The Hacker News
Alert: Cybercriminals Deploying VCURMS and STRRAT Trojans via AWS and GitHub – Source:thehackernews.com
16/03/2024
Threat Post Cyber Security News
threatpost
Student Loan Breach Exposes 2.5M Records – Source: threatpost.com
28/05/2023
threatpost
Watering Hole Attacks Push ScanBox Keylogger – Source: threatpost.com
28/05/2023
threatpost
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms – Source: threatpost.com
28/05/2023
threatpost
Ransomware Attacks are on the Rise – Source: threatpost.com
28/05/2023
threatpost
Cybercriminals Are Selling Access to Chinese Surveillance Cameras – Source: threatpost.com
28/05/2023
threatpost
Twitter Whistleblower Complaint: The TL;DR Version – Source: threatpost.com
28/05/2023
threatpost
Firewall Bug Under Active Attack Triggers CISA Warning – Source: threatpost.com
28/05/2023
threatpost
Fake Reservation Links Prey on Weary Travelers – Source: threatpost.com
28/05/2023
threatpost
iPhone Users Urged to Update to Patch 2 Zero-Days – Source: threatpost.com
28/05/2023
The Register News
The Register Security
More than 133,000 Fortinet appliances still vulnerable to month-old critical bug – Source: go.theregister.com
18/03/2024
The Register Security
In the rush to build AI apps, please, please don’t leave security behind – Source:...
17/03/2024
The Register Security
US Congress goes bang, bang, on TikTok sale-or-ban plan – Source: go.theregister.com
14/03/2024
The Register Security
March Patch Tuesday sees Hyper-V join the guest-host escape club – Source: go.theregister.com
13/03/2024
The Register Security
Meta sues ex infra VP for allegedly stealing top-secret datacenter blueprints – Source: go.theregister.com
13/03/2024
The Register Security
Biden’s budget proposal boosts CISA funding to $3B – Source: go.theregister.com
13/03/2024
The Register Security
JetBrains is still mad at Rapid7 for the ransomware attacks on its customers – Source:...
13/03/2024
The Register Security
Microsoft waited 6 months to patch actively exploited admin-to-kernel vulnerability – Source: go.theregister.com
11/03/2024
The Register Security
Cybercrime crew Magnet Goblin bursts onto the scene exploiting Ivanti holes – Source: go.theregister.com
09/03/2024
Graham Cluley Security Cyber News
grahamcluley.com
$12.5 billion lost to cybercrime, amid tidal wave of crypto investment fraud – Source: www.tripwire.com
08/03/2024
grahamcluley.com
Smashing Security podcast #362: Ransomware fraud, pharmacy chaos, and suicide – Source: grahamcluley.com
08/03/2024
grahamcluley.com
Ukraine claims it hacked Russian Ministry of Defence, stole secrets and encryption ciphers – Source:...
08/03/2024
grahamcluley.com
Whoops! ACEMAGIC ships mini PCs with free bonus pre-installed malware – Source: grahamcluley.com
06/03/2024
grahamcluley.com
Someone is hacking 3D printers to warn owners of a security flaw – Source: www.bitdefender.com
02/03/2024
grahamcluley.com
Act now to stop WordPress and Tumblr selling your content to AI firms – Source:...
02/03/2024
grahamcluley.com
Healthcare sector warned of ALPHV BlackCat ransomware after surge in targeted attacks – Source: www.tripwire.com
29/02/2024
grahamcluley.com
Smashing Security podcast #361: Wireless charging woe, AI romance apps, and ransomware revisited – Source:...
28/02/2024
grahamcluley.com
How to interpret the MITRE Engenuity ATT&CK® Evaluations: Enterprise – Source: grahamcluley.com
28/02/2024
Databreachtoday.com
Data Breach Today
Illicit Credentials Marketplace Admin Gets 42-Month Sentence – Source: www.databreachtoday.com
17/03/2024
Data Breach Today
Ransomware Groups’ Data Leak Blogs Lie: Stop Trusting Them – Source: www.databreachtoday.com
17/03/2024
Data Breach Today
Feds Launch Investigation into Change Healthcare Attack – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
The Critical Role of Effective Onboarding – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Will Cybersecurity Get Its 1st New Unicorn Since June 2022? – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
HHS Resources, Funding to Bolster Healthcare Cyber Efforts – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Building a 911 Cyber Civil Defense System for Healthcare – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
The Concentrated Cyber Risk Posed by Enormous Vendors – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Webinar | Navigating the SEC Rules for Enhanced Cybersecurity in IT and OT Environments –...
14/03/2024
SOC Prime Cyber Security News
socprime
3CXDesktopApp Supply Chain Attack Detection: Active Intrusion Campaign Targeting Millions of 3CX Customers
31/03/2023
socprime
Detect CVE-2022-47986 Exploits: Critical Pre-Authenticated Remote Code Execution Vulnerability in IBM Aspera Faspex
30/03/2023
socprime
Ferrari Data Breach Disclosed: Attackers Gain Access to the Company’s Network While Demanding Ransom to...
23/03/2023
socprime
SOC Prime Threat Bounty — February 2023 Results
20/03/2023
socprime
Detect CVE-2023-23397 Exploits: Critical Elevation of Privilege Vulnerability in Microsoft Outlook Leveraged in the Wild...
16/03/2023
socprime
BlackLotus UEFI Bootkit Detection: Exploits CVE-2022-21894 to Bypass UEFI Secure Boot and Disables OS Security...
14/03/2023
socprime
ScrubCrypt Attack Detection: 8220 Gang Applies Novel Malware in Cryptojacking Operations Exploiting Oracle WebLogic Servers
14/03/2023
socprime
On the Frontline of the Global Cyber War: Overview of Major russia-backed APT Groups Targeting...
09/03/2023
socprime
MQsTTang Backdoor Detection: New Custom Malware by Mustang Panda APT Actively Used in the Latest...
06/03/2023
Welive Cyber Security News
Welivesecurity.com
Fake Signal and Telegram apps – Week in security with Tony Anscombe – Source:
04/09/2023
Welivesecurity.com
What you need to know about iCloud Private Relay – Source:
04/09/2023
Welivesecurity.com
BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps – Source:
04/09/2023
Welivesecurity.com
Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?...
04/09/2023
Welivesecurity.com
How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe...
04/09/2023
Welivesecurity.com
Telekopye: Hunting Mammoths using Telegram bot – Source:
04/09/2023
Welivesecurity.com
Scarabs colon-izing vulnerable servers – Source:
04/09/2023
Welivesecurity.com
A Bard’s Tale – how fake AI bots try to install malware – Source:
04/09/2023
Welivesecurity.com
Evacuation of 30,000 hackers – Week in security with Tony Anscombe – Source:
04/09/2023
Naked Security News
AI Research
Benchmarking the Security Capabilities of Large Language Models – Source: news.sophos.com
18/03/2024
EDR
Sophos named a Leader in the 2024 IDC MarketScape for Worldwide Modern Endpoint Security for...
13/03/2024
CVE
59 CVEs primed for Microsoft’s March Patch Tuesday – Source: news.sophos.com
12/03/2024
2024 threat report
The 2024 Sophos Threat Report: Cybercrime on Main Street – Source: news.sophos.com
12/03/2024
#SophosLife
Inspiring Inclusion: Sophos Celebrates International Women’s Day 2024 – Source: news.sophos.com
07/03/2024
CIRCIA
Sophos Guidance on CIRCIA – Source: news.sophos.com
06/03/2024
naked security
The Impact of Organizational Structure on Cybersecurity Outcomes – Source: news.sophos.com
05/03/2024
AuKill
It’ll be back: Attackers still abusing Terminator tool and variants – Source: news.sophos.com
04/03/2024
#SophosLife
Sophos Sponsors Scholarships To Celebrate Black History Month – Source: news.sophos.com
27/02/2024
Krebs on Security Cyber News
Krebs On Security
CEO of Data Privacy Company Onerep.com Founded Dozens of People-Search Firms – Source: krebsonsecurity.com
16/03/2024
Krebs On Security
Patch Tuesday, March 2024 Edition – Source: krebsonsecurity.com
16/03/2024
Krebs On Security
Incognito Darknet Market Mass-Extorts Buyers, Sellers – Source: krebsonsecurity.com
12/03/2024
Krebs On Security
A Close Up Look at the Consumer Data Broker Radaris – Source: krebsonsecurity.com
09/03/2024
Krebs On Security
BlackCat Ransomware Group Implodes After Apparent $22M Payment by Change Healthcare – Source: krebsonsecurity.com
06/03/2024
Krebs On Security
Fulton County, Security Experts Call LockBit’s Bluff – Source: krebsonsecurity.com
29/02/2024
Krebs On Security
Calendar Meeting Links Used to Spread Mac Malware – Source: krebsonsecurity.com
28/02/2024
Krebs On Security
FBI’s LockBit Takedown Postponed a Ticking Time Bomb in Fulton County, Ga. – Source: krebsonsecurity.com
26/02/2024
Krebs On Security
New Leak Shows Business Side of China’s APT Menace – Source: krebsonsecurity.com
22/02/2024
Haxf4All Cyber Security News
Haxf4rall Security
SilentHound – Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups, Etc.
08/09/2022
Haxf4rall Security
ESP32 Marauder v0.9.12 releases: suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
08/09/2022
Haxf4rall Security
Three Sentenced in the UK for Selling Drugs on the Darkweb
08/09/2022
Haxf4rall Security
CVE-2022-29154: Rsync client-side arbitrary file write vulnerability
08/09/2022
Haxf4rall Security
ForceAdmin: Create infinite UAC prompts forcing a user to run as admin
08/09/2022
Haxf4rall Security
Woman Heads to Prison for Hiring a "Hitman” on the Darkweb
08/09/2022
Haxf4rall Security
Security Scorecards v4.5 releases: OSS Security Scorecards
08/09/2022
Haxf4rall Security
Apache Tomcat Scanner: scan for Apache Tomcat server vulnerabilities
08/09/2022
Haxf4rall Security
Kage – Graphical User Interface For Metasploit Meterpreter And Session Handler
08/09/2022
Bleeping Computer Cybersecurity News
Bleeping Computer
Fujitsu found malware on IT systems, confirms data breach – Source: www.bleepingcomputer.com
18/03/2024
Bleeping Computer
How the New NIST 2.0 Guidelines Help Detect SaaS Threats – Source: www.bleepingcomputer.com
18/03/2024
Bleeping Computer
AT&T says leaked data of 70 million people is not from its systems – Source:...
18/03/2024
Bleeping Computer
New acoustic attack determines keystrokes from typing patterns – Source: www.bleepingcomputer.com
18/03/2024
Bleeping Computer
McDonald’s: Global outage was caused by “configuration change” – Source: www.bleepingcomputer.com
18/03/2024
Bleeping Computer
US moves to recover $2.3 million from “pig butchers” on Binance – Source: www.bleepingcomputer.com
18/03/2024
Bleeping Computer
PornHub now also blocks Texas over age verification laws – Source: www.bleepingcomputer.com
18/03/2024
Bleeping Computer
Microsoft announces Office LTSC 2024 preview starting next month – Source: www.bleepingcomputer.com
18/03/2024
Bleeping Computer
Admin of major stolen account marketplace gets 42 months in prison – Source: www.bleepingcomputer.com
18/03/2024
Info Security Magazine Cyber News
Infosecurity Magazine
Moldovan Behind E-Root Marketplace Gets US Federal Prison Term – Source: www.infosecurity-magazine.com
18/03/2024
Infosecurity Magazine
HSE Misconfiguration Exposed Over a Million Irish Citizens’ Vaccine Status – Source: www.infosecurity-magazine.com
17/03/2024
Infosecurity Magazine
NIST National Vulnerability Database Disruption Sees CVE Enrichment on Hold – Source: www.infosecurity-magazine.com
17/03/2024
Infosecurity Magazine
Fortinet Patches Critical Bug in FortiClient EMS – Source: www.infosecurity-magazine.com
14/03/2024
Infosecurity Magazine
Meta Sues Former VP After Defection to AI Startup – Source: www.infosecurity-magazine.com
14/03/2024
Infosecurity Magazine
Investment Scams Grow, 13,000 Domains Detected in January 2024 – Source: www.infosecurity-magazine.com
14/03/2024
Infosecurity Magazine
Cloud Account Attacks Surged 16-Fold in 2023 – Source: www.infosecurity-magazine.com
14/03/2024
Infosecurity Magazine
New Research Exposes Security Risks in ChatGPT Plugins – Source: www.infosecurity-magazine.com
14/03/2024
Infosecurity Magazine
Google to Restrict Election-Related Answers on AI Chatbot Gemini – Source: www.infosecurity-magazine.com
14/03/2024
Cyber Talk Cybersecurity News
Cyber Talk
Is your outdated WAN putting the brakes on your business? What to watch for –...
19/03/2024
Cyber Talk
Anticipating the future of malicious open-source packages: next gen insights – Source: www.cybertalk.org
18/03/2024
Cyber Talk
Victim of cyber crime? 7 crucial steps your business should take – Source: www.cybertalk.org
15/03/2024
Cyber Talk
Malicious open-source packages: Insights from Check Point’s Developer-First Head of Data Science – Source: www.cybertalk.org
15/03/2024
Cyber Talk
Securing Kubernetes: mitigating the RCE flaw for Windows nodes – Source: www.cybertalk.org
14/03/2024
Cyber Talk
The best cloud security tools have these features… – Source: www.cybertalk.org
13/03/2024
Cyber Talk
A primer on MESH networks and MESH cyber security – Source: www.cybertalk.org
12/03/2024
Cyber Talk
The 10 most dangerous ransomware groups right now – Source: www.cybertalk.org
12/03/2024
Cyber Talk
A strategic shift to AI-powered and cloud-delivered solutions – Source: www.cybertalk.org
11/03/2024
Security on Tech Republic News
Security TechRepublic
Get on CompTIA Certification Track With These $30 Study Guides – Source: www.techrepublic.com
18/03/2024
Security TechRepublic
5 Best VPNs for Travel in 2024 (Free & Paid VPNs) – Source: www.techrepublic.com
17/03/2024
Security TechRepublic
OneLogin vs. Okta (2024): Which IAM Solution Is Better? – Source: www.techrepublic.com
13/03/2024
Security TechRepublic
If your Business Needs Cybersecurity, you Should Become the Expert – Source: www.techrepublic.com
11/03/2024
Security TechRepublic
5 Best VPNs for Social Media in 2024 (Free & Paid VPNs) – Source: www.techrepublic.com
09/03/2024
Security TechRepublic
Enjoy 2 Years of Unrestricted Access to Your Favorite Content for Only $40 – Source:...
08/03/2024
Security TechRepublic
Learn how to Protect Your Business With this $28 Cybersecurity Training – Source: www.techrepublic.com
07/03/2024
Security TechRepublic
Best of KB4-CON 2024: The State of Phishing, Hacking and Security Awareness Training – Source:...
07/03/2024
Security TechRepublic
How to Use Norton Secure VPN (A Step-by-Step Guide) – Source: www.techrepublic.com
06/03/2024
CSO Online Cybersecurity News
CSO - Online
SEC notice to SolarWinds CISO and CFO roils cybersecurity industry – Source: www.csoonline.com
27/06/2023
CSO - Online
Fortanix adds confidential data search for encrypted enterprise data – Source: www.csoonline.com
27/06/2023
CSO - Online
Bionic integrations offer context-based vulnerability management – Source: www.csoonline.com
27/06/2023
CSO - Online
New Android banking trojan targets US, UK, and Germany – Source: www.csoonline.com
27/06/2023
CSO - Online
Fileless attacks surge as cybercriminals evade cloud security defenses – Source: www.csoonline.com
27/06/2023
CSO - Online
Survey reveals mass concern over generative AI security risks – Source: www.csoonline.com
27/06/2023
CSO - Online
BrandPost: Effective security training programs are vital to creating a cyber-aware workforce – Source: www.csoonline.com
27/06/2023
CSO - Online
Critical flaw in VMware Aria Operations for Networks sees mass exploitation – Source: www.csoonline.com
26/06/2023
CSO - Online
Latest MOVEit exploit hits thousands of NYC school students and staff – Source: www.csoonline.com
26/06/2023
Schneier on Security Cyber News
Schneier on Security
Drones and the US Air Force – Source: www.schneier.com
18/03/2024
Schneier on Security
Friday Squid Blogging: Operation Squid – Source: www.schneier.com
18/03/2024
Schneier on Security
Improving C++ – Source: www.schneier.com
18/03/2024
Schneier on Security
Automakers Are Sharing Driver Data with Insurers without Consent – Source: www.schneier.com
18/03/2024
Schneier on Security
Burglars Using Wi-Fi Jammers to Disable Security Cameras – Source: www.schneier.com
14/03/2024
Schneier on Security
Jailbreaking LLMs with ASCII Art – Source: www.schneier.com
12/03/2024
Schneier on Security
Using LLMs to Unredact Text – Source: www.schneier.com
11/03/2024
Schneier on Security
Friday Squid Blogging: New Plant Looks Like a Squid – Source: www.schneier.com
09/03/2024
Schneier on Security
Essays from the Second IWORD – Source: www.schneier.com
09/03/2024
The Last Watchdog Cybersecurity News
The Last Watchdog
GUEST ESSAY: A DIY guide to recognizing – and derailing – Generative AI voice scams...
12/03/2024
The Last Watchdog
News alert: Badge expands availability of ‘Enroll Once and Authenticate on Any Device’ software –...
08/03/2024
The Last Watchdog
GUEST ESSAY: Essential cyber hygiene practices all charities must embrace to protect their donors –...
05/03/2024
The Last Watchdog
News alert: Silence Laboratories raises $4.1M for new privacy-preserving cryptography platform – Source: www.lastwatchdog.com
05/03/2024
The Last Watchdog
News alert: Chiral announces $3.8m funding round to advance nanomaterial chip manufacturing – Source: www.lastwatchdog.com
02/03/2024
The Last Watchdog
News alert: Harter Secrest & Emery announces designation as NetDiligence-authorized Breach Coac – Source: www.lastwatchdog.com
02/03/2024
The Last Watchdog
News alert: ThreatHunter.ai stops hundreds of ransomware attacks, nation-state threats in 48 hours – Source:...
28/02/2024
The Last Watchdog
SHARED INTEL: Poll shows companies pursuing ‘Digital Trust’ reap benefits as laggards fall behind –...
21/02/2024
The Last Watchdog
GUEST ESSAY: Everything you should know about the cybersecurity vulnerabilities of AI chatbots – Source:...
21/02/2024
Security Boulevard News
Security Boulevard
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update – Source:...
18/03/2024
Security Boulevard
How to Identify & Monitor Insider Threat Indicators [A Guide] – Source: securityboulevard.com
17/03/2024
Security Boulevard
USENIX Security ’23 – Pushed By Accident: A Mixed-Methods Study On Strategies Of Handling Secret...
17/03/2024
Security Boulevard
What it’s Like Using Integrations Built by D3 – Source: securityboulevard.com
16/03/2024
Security Boulevard
5M WordPress Websites At Risk Amid LiteSpeed Plugin Flaw – Source: securityboulevard.com
14/03/2024
Security Boulevard
DCIM Software is the Key to Uptime and Performance – Source: securityboulevard.com
14/03/2024
Security Boulevard
Edgeless Systems Brings Confidential Computing to AI – Source: securityboulevard.com
14/03/2024
Security Boulevard
HHS to Investigate Change’s Security in Wake of Crippling Cyberattack – Source: securityboulevard.com
14/03/2024
Security Boulevard
Guarding Your Business: A Guide to Employee Training for Cybersecurity Vigilance – Source: securityboulevard.com
14/03/2024
McAfee Security News
McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
01/04/2023
McAfee
Rising Trend of OneNote Documents for Malware delivery
31/03/2023
McAfee
Digital Spring Cleaning: Seven Steps for Faster, Safer Devices
30/03/2023
McAfee
How You May be Sharing Private Information Online Without Even Knowing
30/03/2023
McAfee
What Parents Need To Know About TikTok’s New Screen Time Limits
30/03/2023
McAfee
Protecting Your Parents from Scams with Our New Family Plans
29/03/2023
McAfee
Mobile Myths: Can My Apple Devices Get Hacked?
25/03/2023
McAfee
Spot and Remove Viruses from Your Android Phone
25/03/2023
McAfee
4 Mobile Malware Threats You Can’t Even See
23/03/2023
The Guardian Cybersecurity News
The Guardian UK
How an infamous ransomware gang found itself hacked – podcast – Source: www.theguardian.com
15/03/2024
The Guardian UK
Russia-based LockBit ransomware hackers attempt comeback – Source: www.theguardian.com
26/02/2024
The Guardian UK
A penny per email could curb our enormous data use | Letters – Source: www.theguardian.com
20/02/2024
The Guardian UK
Seized ransomware network LockBit rewired to expose hackers to world – Source: www.theguardian.com
20/02/2024
The Guardian UK
Prolific cybercrime gang disrupted by joint UK, US and EU operation – Source: www.theguardian.com
20/02/2024
The Guardian UK
Greens accuse Labor and Coalition of ‘race to the bottom’ over migration bill – as...
17/02/2024
The Guardian UK
Hackers got nearly 7 million people’s data from 23andMe. The firm blamed users in ‘very...
15/02/2024
The Guardian UK
Power grab: the hidden costs of Ireland’s datacentre boom – Source: www.theguardian.com
15/02/2024
The Guardian UK
Rhysida, the new ransomware gang behind British Library cyber-attack – Source: www.theguardian.com
15/02/2024
CSH Cyber Security Hub Cybersecurity News
CSH - Cyber Security Hub
How to build an operational technology risk management strategy – Source: www.cshub.com
15/06/2023
CSH - Cyber Security Hub
Top five APAC government hacks of 2023 (so far) – Source: www.cshub.com
14/06/2023
CSH - Cyber Security Hub
When will AI be fully integrated into cyber security? – Source: www.cshub.com
28/05/2023
CSH - Cyber Security Hub
We are less than a year away from a cyber attack credited to ChatGPT –...
28/05/2023
CSH - Cyber Security Hub
The role of API inventory in SBOM and cyber security – Source: www.cshub.com
28/05/2023
CSH - Cyber Security Hub
The ultimate guide to malware – Source: www.cshub.com
28/05/2023
CSH - Cyber Security Hub
The benefits of automating enterprise cyber security – Source: www.cshub.com
28/05/2023
CSH - Cyber Security Hub
What is business email compromise? – Source: www.cshub.com
28/05/2023
CSH CYBER SECURITY HUB
IOTW: Latitude Financial data breach affects 14 million people
30/03/2023
Heimdal Security Cyber News
HeimdalSecurity.com
[Free & Downloadable] Information Security Policy Template – 2024 – Source: heimdalsecurity.com
17/03/2024
HeimdalSecurity.com
Researchers Disclose Proof of Concept for New GhostRace Attack – Source: heimdalsecurity.com
14/03/2024
HeimdalSecurity.com
MSP vs MSSP: What Is The Difference – Source: heimdalsecurity.com
14/03/2024
HeimdalSecurity.com
Russians Used Microsoft’s Stolen Authentication Secrets to Access Source Code – Source: heimdalsecurity.com
13/03/2024
HeimdalSecurity.com
Heimdal’s 10th Anniversary – Our Finest Hours – Source: heimdalsecurity.com
13/03/2024
HeimdalSecurity.com
What Is An MSP (Managed Service Provider)? A Vendor and Buyer Guide – Source: heimdalsecurity.com
13/03/2024
HeimdalSecurity.com
Capita Reports a Yearly Loss of about £106M Due to Cyberattack – Source: heimdalsecurity.com
13/03/2024
HeimdalSecurity.com
WordPress Websites Used by Threat Actor to Launch Brute-Force Attacks – Source: heimdalsecurity.com
13/03/2024
HeimdalSecurity.com
Critical TeamCity On-Premises Vulnerability Actively Exploited by Threat Actors – Source: heimdalsecurity.com
13/03/2024
Security affairs Cyber News
SecurityAffairs.com
Nissan Oceania data breach impacted roughly 100,000 people – Source: securityaffairs.com
14/03/2024
SecurityAffairs.com
Researchers found multiple flaws in ChatGPT plugins – Source: securityaffairs.com
14/03/2024
SecurityAffairs.com
Russia’s Foreign Intelligence Service (SVR) alleges US is plotting to interfere in presidential election –...
12/03/2024
SecurityAffairs.com
First-ever South Korean national detained for espionage in Russia – Source: securityaffairs.com
12/03/2024
SecurityAffairs.com
Insurance scams via QR codes: how to recognise and defend yourself – Source: securityaffairs.com
12/03/2024
SecurityAffairs.com
Massive cyberattacks hit French government agencies – Source: securityaffairs.com
12/03/2024
SecurityAffairs.com
BianLian group exploits JetBrains TeamCity bugs in ransomware attacks – Source: securityaffairs.com
11/03/2024
SecurityAffairs.com
Experts released PoC exploit for critical Progress Software OpenEdge bug – Source: securityaffairs.com
11/03/2024
SecurityAffairs.com
Magnet Goblin group used a new Linux variant of NerbianRAT malware – Source: securityaffairs.com
11/03/2024
Helpnet Security Cyber News
Cisco Security Blog Cyber News
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
01/10/2023
Cisco Security Blog
Cisco Event Response: March 2023 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled...
23/03/2023
Cisco Security Blog
Cisco Event Response: March 2023 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication
08/03/2023
Cisco Security Blog
Cisco Event Response: February 2023 Semiannual Cisco FXOS and NX-OS Software Security Advisory Bundled Publication
23/02/2023
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication
18/12/2022
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled...
18/12/2022
Cisco Security Blog
Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled...
18/12/2022
Cisco Security Blog
Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled...
09/11/2022
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled...
27/10/2022
Top Recommended Posts
0-days Detected in-the-Wild in 2022 – Year in Review – Maddie Stone – Zer0Con 2023...
Reducing the Cyber Risk in 10 Critical Areas
Azure DevOps Security CheckList
EXPLAINING PENETRATION TESTING
Building a SOC Honeynet in Azure
Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines
2023 – Cyber Strategy of The Departament of Defence
INFORME SOBRE LA CIBERCRIMINALIDAD EN ESPAÑA POR SISTEMA ESTADISTICO DE CRIMINALIDAD SEC
Confidentiality and Information Security Management Toolkit
Secure & Privacy by Design Principles Framework & Security & Privacy Capability Maturity Model (SP-CMM)...
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
CREDENTIAL DUMPING CHEATSHEET
Types of AI Attacks CISOs Should Track
CGMA Cybersecurity Tool
Devsecops Security Model
The evolution of Cyber Hunt Processes from IOCs to TTPs by HHS
Security Economics Knowledge Guide
Enterprise Information Security
CISOs-Practical Guide and Set of Worksheets for Building Insider Threat Program
Web3 Defined – An overview report by Brainsy
Security Economics Knowledge Guide
2023 Global Mobile Threat Report is now available
Microsoft Azure Resiliency – Business Continuity and Disaster Recovery
Technical Insights: TheFuture of Cloud SecurityPosture Management
2022 Consumer Identity Breach Report by ForgeRock – Eve Maler.
Things of the Internet Global Cyber Domain Report by DNSSense – H2 – 2022 Report
TELECOM SECURITY INCIDENTS REPORT 2021 BY ENISA
How to Plan a Cybersecurity Roadmap in 4 Steps
Privacy as an Enabler of Customer Trust
Common TTPsof attacks againstindustrial organizations. Implantsfor uploading data
BASELINE CYBER SECURITY CONTROLS FOR SMALL AND MEDIUM ORGANIZATIONS V1.2 by Canadian Centre for CYBERSECURITY
Exploring Organisational Experiences of Cyber Security Breaches Report by IPSOS
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
TRAINING PROGRAM CAPTURE THE FLAG
The Hack on Sony Group Pictures Entertainment
Cyber Threat “Info Stealer” explained in Simple way: A mallware and set of techniques used...
Cybersecurity Blue Team Strategies – Uncover the secrets of blue teams to combat cyber threats...
Pentest Best Practices Checklist
The Second Quantum Revolution
REFERENCIAS WEB SOBRE SEGURIDAD DE LA INFORMACIÓN Y CIBERSEGURIDAD
WORDLISTS FOR PENTESTER
The art of Linux persistence
Anatomy of 100 Cybersecurity Incidents in Industrial Op
Cybersecurity Alphabet
Cyber Threat Report 2022 – 2023
Cyber Security Cost Effectiveness for Business Risk Reduction by Cambridge Centre for Risk Studies and...
Recommended best practices for Administrators – Identity and Access Management by NSA & CISA
API Security Quick Audit Checklist
The state of Cloud configuration security practices by Olivia Powel – CSHUB – Find out...
LLM AI Security & Governance Checklist
INFORME SOBRE LA CIBERCRIMINALIDAD EN ESPAÑA POR SISTEMA ESTADISTICO DE CRIMINALIDAD SEC
Unveiling the Breach!
Financial Cybersecurity Predictions for 2024
Vendor Assessment Checklist
Threat Hunting Playbooks for MITRE Tactics – Starting your first threat hunting today by PRASANNAKUMAR...
ISO 27001 Audit Checklist Part 2
HANDBOOK FOR SOCIAL MEDIA INVESTIGATIONS by MALTEGO
MITRE PLAYBOOK – Understanding Today’s Threat Landscape Using MITRE ATACK Frameworks
MICROSOFT 365 SECURITY CHECKLIST
2023 Annual Report – Cybersecurity Trends & Insights by Perception Point
THREAT HUNTING MALWARE INFRASTRUCTURE
Cisco Talos shares insights related to recent cyber attack on Cisco
API Security: Threats, Best Practices,Challenges, and Way forward usingAI
OT SECURITY
Dev.Sec.Ops. – Protecting the Modern Software Factory by GitGuardian
Evolving Cyber Operationsand Capabilities
Value creation in the metaverse – The Real business of the virtual world by McKinsey...
CROWDSTRIKE 2023 GLOBAL THREAT REPORT
Cybersecurity Tips to Secure Your Privacy in 2023
The GDPR Playbook – Discover, Plan, and Act on the Upcoming EU Data Protection Regulation
ABC DE PROTECCION DE DATOS PERSONALES
Guide to Security Operations
FBI – 2021 Internet Crime Report
Credential Dumping
JCDC REMOTE MONITORING & MANAGEMENT CYBER DEFENSE PLAN
PHISHING GUIDANCE: STOPPING THE ATTACK CYCLE AT PHASE ONE
A USER GUIDE TO DATA PROTECTION IN THE EUROPEAN UNION
Windows Persistence Techniques by Joas Antonio
Advanced Cybersecurity Practices 2024
SECURE CODING GUIDELINES
H1 2023 Brief Overview of Main Incidents in Industrial CS
Ransomware as a service (RaaS) – An explainer guide to cybercrime´s newest business model
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
API Security Checklist
How to Define Objetives for Cybersecurity Tabletop Exercises by Lester Chng
SANS DFIR – CHEAT SHEETS & NOTEBOOKS – The most complete reference !!!
Wireless Pentesting – CheatSheet
Anonymous Logins for Pentesters
How to protect your identity
Azure Penetration Testing Guide
MOVEIT ADVISORY NOTE
A checklist for efective Threath Hunting by SecurityHQ
A 10 step guide to implementing an ISO 27001 Information Security Management System (ISMS)
The Ultimate Guide to Insider Threats eBook by exabeam