Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: Home Versión 2
CISO Strategics
SOC OPERATIONS
THREAT INTEL
RED-BLUE-purple
DATA BREACH
vulnerabilities
cyber attacks
Ransomware
DDOS ATTACKS
HACKING
DEVSECOPS
IA CYBERSECURITY
ZERO TRUST
architecture
NETWORK SECURITY
CLOUD SECURITY
IOT - OT SECURITY
API SECURITY
RISK & COMPLIANCE
#RSAC 2023
CISO2CISO Editors' Picks
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of Digital Threats ?
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
IZZMIER
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection in Your SOC by Logpoint
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR Is Dead, Long Live XDR by Allie Mellen – Forrester
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK: FIRST 100 DAYS Setting the CISO up for success
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Gartner
A CISOs Guide for Conversations with the CFO by Gartner
CyberDB
Best 160 Cybersecurity Groups On LinkedIn by CyberDB
Feedspot.com
146 Best Cyber Security Blogs and Websites by Feedspot.com
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness – Global Survey of Cybersecurity Leaders by Delinea
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or Service. Software Quality must include Cybersecurity by Design Principle. Marcos Jaimovich
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original document in Spanish).
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK – Protecting The Crown Jewels by Cyber Leadership Institute – Building a cyber security strategy around high value digital assets
Marcos Jaimovich
Cyber Threat “Info Stealer” explained in Simple way: A mallware and set of techniques used by attackers to steal your confidential information !!! and much more that you should know By Marcos Jaimovich.
Unbound Security
The Cybersecurity Acronym Book
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
FIRE EYE
The Cyber Risk Playbook – What boards of directors and executives should know about Cyber Risk by FireEye.
HADESS
Introduction to Doxing- OSINT methods for information gathering by HADESS
IBM Security
How much does a data breach cost in 2022? IBM Cost of a Data Breach 2022 Report by IBM Security
Codrut Andrei
Secure Software Development Lifecycle Fundamentals by Codrut Andrei
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined largely by your first 100 days in the role.
RedHat
State of Kubernetes Security Report 2022 by RedHat
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips with cyber security by NCSC
WILEY
Cybercrime Investigators Handbook by WILEY
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
Harvard Business Review
Boards Are Having the Wrong Conversations About Cybersecurity – Board interactions with the CISO are lacking – by Lucia Millica and Keri Pearlson – Harvard Business Review
Nathalie Cole
How Much 10 Companies Paid Their Virtual CISO Service in 2022 Benchmark by Nathaniel Cole
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats 2022 by Tushar Subhra Dutta – Cyber Security News.
Microsoft
Microsoft Zero Trust Maturity Model
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
HADESS
DevSecOps Guides – Comprehensive resource for integrating security into the software development by HADESS
CISO2CISO Notepad Series
The sqreen DevSecOps Security Checklist
Apress
Jump-start Your SOC Analyst Career – A Roadmap to Cybersecurity Success by Apress
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos – malwareanalysis #reverseengineering
CISO2CISO Notepad Series
How Can We Structure Cybersecurity Teams To Better Integrate Security In Agile At Scale?
OCCUPYTHEWEB
Linux Basics for Hackers by Occupytheweb
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT) by NIST – Eran Salfati and Michael Pease
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
Practical DevSecOps
API Security Fundamentals – Your Handy Guide to Building an Unhackable System by practical-devsecops.com
help net security
Compliance does not equal security !!
Chris Davis
Blue Team Cheat Sheets by Chris Davis
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by – University of Foreign Military and Cultural Studies (UFMCS).
SALT
State of the CISO – a global report on priorities , pain points, and security gaps 2023 by SALT
Latest News
Data Breach Today
UK Blood Stocks Drop After Ransomware Hack – Source: www.databreachtoday.com
26/07/2024
Data Breach Today
Proof of Concept: How Can We Outpace Deepfake Threats? – Source: www.databreachtoday.com
26/07/2024
Data Breach Today
Chainguard Raises $140M to Drive AI Support, Global Growth – Source: www.databreachtoday.com
26/07/2024
Data Breach Today
Cybercrooks Continue to Capitalize on CrowdStrike Outage – Source: www.databreachtoday.com
26/07/2024
Data Breach Today
Live Webinar | AI-Driven Endpoint Security: Adapting to Industry Changes – Source: www.databreachtoday.com
26/07/2024
Data Breach Today
Mandiant: North Korean Hackers Targeting Healthcare, Energy – Source: www.databreachtoday.com
25/07/2024
Data Breach Today
Vulnerabilities in LangChain Gen AI Could Prompt Data Leak – Source: www.databreachtoday.com
25/07/2024
Data Breach Today
Senator: Top Banks Only Reimburse 38% of Unauthorized Claims – Source: www.databreachtoday.com
25/07/2024
Data Breach Today
Check Point Snags Team8’s Nadav Zafrir to Replace Gil Shwed – Source: www.databreachtoday.com
25/07/2024
Data Breach Today
How to Lead When a Crisis Occurs – Source: www.databreachtoday.com
25/07/2024
Data Breach Today
Time to Rethink Identity: What Security Leaders Need to Know – Source: www.databreachtoday.com
25/07/2024
Data Breach Today
CrowdStrike Says Code-Testing Bugs Failed to Prevent Outage – Source: www.databreachtoday.com
24/07/2024
Data Breach Today
Hackers Froze Ukrainian Heating Systems in Winter – Source: www.databreachtoday.com
24/07/2024
Latest Published Posts
Google
We’re All in this Together
CyberSN
U.S. Cybersecurity Job Posting Data Report
CISA | Cybersecurity and Infrastructure Security Agency
UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
McKinsey & Company
Transforming risk efficiency and effectiveness
Arnold Antoo
Zero Trust Security Model
Richea Perry
Your Cybersecurity Toolkit
IGNITE Technologies
Wireless Penetration Testing
Joas A Santos
Windows API for Red Team #101
Economic Research Working Paper
Artificial Intelligence and Intellectual Property
CASOS DE USO APLICABLES EN UN SIEM
IGNITE Technologies
Burp Suite for Pentester
The Institute of Internal auditors
Auditing Risk Culture
DevSecOps Guide
ATTACKING PHP APPLICATIONS
DevSecOps Guide
ATTACKING KUBERNETES WITH SECURITY BEST PRACTICE
CLTC WHITE PAPER SERIES
Guidance for the Development of AI Risk and Impact Assessments
Active Directory
Active Directory IT AuditChecklist
A guide to business continuity planning
LOG RHYTHM
Using MITRE ATT&CK™ in Threat Huntingand Detection
Kaspersky
H2 2023 – A brief overviewof main incidentsin industrial cybersecurity
Andrey Prozorov
24 Great Cybersecurity Frameworks
ENISA-EUROPA
SEGURIDAD DE TELECOMUNICACIONES
Project Management Institute
Building Resilience Through Strategic Risk Management
DATA LOSS PREVENTION (DLP)
AICSSolutions
Cybersecurity Red Team
cisco
Cyber Incident Response
CSR Cyber Security Council
EVERY BUSINESS HAS DUTIES OF CARE IN THE FIELD OF CYBER SECURITY
SYBEX
Cybersecurity ESSENTIALS
Agency for Digital Government
Cyber security in supplier relation ships
RINKU
Curso de introducción KALI LINUX PARA HACKERS ÉTICOS
CNIL
PRACTICE GUIDE GDPR
FERMA
THE ROADMAP TO STRATEGIC RISK MANAGEMENT
ENISA-EUROPA
Cyber Resilience Act Requirements Standards Mapping
CYTAD
Essential Data Privacy Checklist
SF-ISAC
Digital Operational Resilience Act
SYNGRESS
DIGITAL FORENSICS WITH Open Source TOOLS
IT REVOLUTION DEVOPS ENTERPRISE FORUM
DevOps Automated Governance Reference Architecture
SANS GIAC CERTIFICATIONS
Detecting Attacks on Web Applications from Log Files
EUROPEAN DATA PROTECTION SUPERVISOR
ANNUAL REPORT 2023
TechTarget
IT Disaster Recovery Plan Template
Opstune
IOC Scan Framework v2.0
Federal Office for Information Security
Indirect Prompt Injections
the Department of the Environment Climate and Communications
Guidelines on CyberSecurity Specifications
Edelman
INCIDENT RESPONSE REFERENCE GUIDE
Security METRICS
Security Metrics Guide to PCI DSS Compliance
SOC TIPS Cybersecurity
Guia de Resposta a Incidentes de Segurança para LGPD
CDCP
FIREWALL Audit CHECKLIST
GitGuardian
Secrets Management Maturity Model
MegaCorp One
Sample Penetration Test Report
FORTINET
Routing in FortiGate
FUTURE OF PRIVACY FORUM
Risk Framework Body Related Data (PD) Immersive Tech
ENISA
Remote ID Proofing Good Practices
Google
Why Red TeamsPlay a Central Rolein Helping OrganizationsSecure AI Systems
Red Canary
Threat Detection Report 2024
HADESS
Pwning the Domain Persistence
Australian Goverment
PROTECTIVE SECURITYPOLICY FRAMEWORKSecuring government business:Protective security guidance for executive
CISC (Comité Internacional Sobre Ciberseguridad)
Política Nacional de Ciberseguridad 2023-2028
Google
Perspectiveson Securityfor the Board
HADESS
OSINT Method for Map Investigations
CCN-CERT
Observatorio Riesgos Ciberseguridad 2024
CYBERTHEORY
The ISMG Cybersecurity Pulse Report 2024 is a treasure trove of insights from the RSA Conference, revealing the dynamic landscape of cybersecurity. From AI to Zero Trust: A comprosive guide to the key themes and expert opinions from RSA CONFERENCE 2024 – #RSAC2024
FORTINET
Bloking Malware Through Antivirus Security Profile in FortiGate
ENISA
Best Practices for Cyber Crisis Management
viehgroup
AWS Cloud Security Checklist
DevSecOps Guide
Attacking .NET
IGNITE Technologies
Advance Burp Suite Pentester Training (Online)
LogRhythm
Using MITRE ATT&CK™in Threat Huntingand Detection
INCIDENT RESPONSE PLAN
NIST CSF 2.0
Incident Response Recommendations and Considerations for Cybersecurity Risk Management
GmFaruk
Identity and Access Management Policy
UK HM Government
National Cyber Strategy 2022
NSA
NSA Network Infrastructure Security Guide
NIST
NIST Policy Template Guide
Thecyphere
Malware prevention tips for businesses
ministry of security
MERGERS AND ACQUISITIONS
Cyber Topics
CISO Strategics & Leadership
FIRST.Org CVSS V4.0 Releasead – Navigation the Evolution – Dive into CVSS 4.0 Unveiled by Marcos Jaimovich
Azure Defenses for Ransomware Attack by Microsoft Security
Risk Mitigation , Prevention and Cutting the Kill Chain – Minimize the impact of ransomware with Akamai Guardicore Segmentation
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
The Global Risks Report 2023 – Insight Report – 18th Edition by World Economic Forum (WEF). Economics, Environmental, Geopolitical, Societal, Technological & Cyber Risks Included in the report.
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR Is Dead, Long Live XDR by Allie Mellen – Forrester
Advancing Cyber Resilience Principles and Tools for Boards by World Economic Forum (WEF)
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by BlackBerry Cybersecurity.
What is Cyber Resilience and Why Your Business Needs It by Federico Hansen ?
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
TOP 10 Cybersecurity Posture Metrics every CISO should use – A CISO Executive Guide by Balbix
Security Operations & SOC
ISACA Ransomware Incident Management Quick Reference Guide
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection in Your SOC by Logpoint
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR Is Dead, Long Live XDR by Allie Mellen – Forrester
How to Avoid Party Chaos with the Right Application-Layer DDoS Platform whitepaper by Akamai
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Incident Response 2022 Report by Kaspersky
Network Segmentation and Microsegmentation in Moderm Enterprise Environments by Akamai
Next Generation Anti-Malware Testing for Dummies – Brought to you by Cylance
Red - Blue & Purple Teams
Ghostwriter v4.1: The Custom Fields Update – Source: securityboulevard.com
CVE-2024-23897: Assessing the Impact of the Jenkins Arbitrary File Leak Vulnerability – Source: securityboulevard.com
CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive – Source: securityboulevard.com
Calling Home, Get Your Callbacks Through RBI – Source: securityboulevard.com
ISACA Ransomware Incident Management Quick Reference Guide
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection in Your SOC by Logpoint
Threat Hunting Framework by Cyborg Security
Incident Response 2022 Report by Kaspersky
Next Generation Anti-Malware Testing for Dummies – Brought to you by Cylance
Ethical Hacking with Kali Linux – Learn fast how to hack like a pro by Hugo Hoffman
Quick Start Guide to Penetration Testing with NMAP , OpenVAS & Metaexploit by Sagar Rahalkar – Apress
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
The Most Complete RED TEAM & PENTEST Reference and Resources Guide by @ANHKWAR
Cloud Security
Top 5 Cloud Trends U.K. Businesses Should Watch in 2024 – Source: www.techrepublic.com
6 Best VPNs for Canada in 2024 (Free & Paid VPNs) – Source: www.techrepublic.com
What is Cloud Penetration Testing? – Source: securityboulevard.com
How to Change Your VPN Location (A Step-by-Step Guide) – Source: www.techrepublic.com
How to Install a VPN on Your Router – Source: www.techrepublic.com
How platformization is transforming cyber security – Source: www.cybertalk.org
What is Secure Code Review and How to Conduct it? – Source: securityboulevard.com
Does a VPN Slow Down Your Internet Speed? – Source: www.techrepublic.com
15-Year-Old Ebury Botnet Compromised 400,000 Linux Servers – Source: securityboulevard.com
How to Set Up & Use a VPN on Android (A Step-by-Step Guide) – Source: www.techrepublic.com
Dell Hell: 49 Million Customers’ Information Leaked – Source: securityboulevard.com
Massive Online Shopping Scam Racks Up 850,000 Victims – Source: securityboulevard.com
DevSecOps Discipline
D3 Is Security Automation that Makes Your Team Better – Source: securityboulevard.com
The Importance of Patching Vulnerabilities in Cybersecurity – Source: securityboulevard.com
FUD: How Fear, Uncertainty, and Doubt can ruin your security program – Source: securityboulevard.com
North Korea IT Worker Scam Brings Malware and Funds Nukes – Source: securityboulevard.com
Navigating Yesterday’s Battles: Insights from Cybersecurity Reports – Source: securityboulevard.com
Simplify Certificate Lifecycle Management And Build Security Into OpenShift Kubernetes Engine With AppViewX KUBE+ – Source: securityboulevard.com
Get SOAR Savvy Before RSAC 2024: 5 Reads to Level Up Your SOC – Source: securityboulevard.com
Palo Alto Networks Extends SASE Reach to Unmanaged Devices – Source: securityboulevard.com
The impact of automating open source dependency management – Source: securityboulevard.com
What is Proxmox VE – and Why You Should Live Patch It – Source: securityboulevard.com
Choosing SOC Tools? Read This First [2024 Guide] – Source: securityboulevard.com
DevOps pioneers navigate organizational transformation – Source: securityboulevard.com
THREAT INTELLIGENCE
Black Basta Ransomware Attack: Microsoft Quick Assist Flaw – Source: securityboulevard.com
CFO Deepfake Redux — Arup Lost $26M via Video – Source: securityboulevard.com
North Korea IT Worker Scam Brings Malware and Funds Nukes – Source: securityboulevard.com
SugarGh0st RAT variant, targeted AI attacks – Source: www.cybertalk.org
Hackers Use Fake DocuSign Templates to Scam Organizations – Source: securityboulevard.com
Risks of GenAI Rising as Employees Remain Divided About its Use in the Workplace – Source: securityboulevard.com
15-Year-Old Ebury Botnet Compromised 400,000 Linux Servers – Source: securityboulevard.com
Dell Hell: 49 Million Customers’ Information Leaked – Source: securityboulevard.com
Emerald Divide Uses GenAI to Exploit Social, Political Divisions in Israel Using Disinformation – Source: securityboulevard.com
NASA Must Improve Spacecraft Cybersecurity, GAO Report Finds – Source: securityboulevard.com
API Vulnerabilities Found Across AI Infrastructure Projects at NVIDIA, Mercedes – Source: securityboulevard.com
Identity, Credential Misconfigurations Open Worrying Security Gaps – Source: securityboulevard.com
Data Breaches & Leaks
D3 Is Security Automation that Makes Your Team Better – Source: securityboulevard.com
The Importance of Patching Vulnerabilities in Cybersecurity – Source: securityboulevard.com
FUD: How Fear, Uncertainty, and Doubt can ruin your security program – Source: securityboulevard.com
North Korea IT Worker Scam Brings Malware and Funds Nukes – Source: securityboulevard.com
Navigating Yesterday’s Battles: Insights from Cybersecurity Reports – Source: securityboulevard.com
Simplify Certificate Lifecycle Management And Build Security Into OpenShift Kubernetes Engine With AppViewX KUBE+ – Source: securityboulevard.com
Latest News
Data Breach Today
Proactive Network Security: Lessons From CrowdStrike Outage – Source: www.databreachtoday.com
24/07/2024
Data Breach Today
Report: HHS Needs to Beef Up Cloud Security and Skills – Source: www.databreachtoday.com
24/07/2024
Data Breach Today
Chinese Cyberespionage Group Expands Malware Arsenal – Source: www.databreachtoday.com
23/07/2024
Data Breach Today
CrowdStrike’s Response to Outage Will Minimize Lost Business – Source: www.databreachtoday.com
23/07/2024
Data Breach Today
E-Prescription Vendor Breach Affects 12.9 Million Aussies – Source: www.databreachtoday.com
23/07/2024
Data Breach Today
CrowdStrike Disruption Restoration Is Taking Time – Source: www.databreachtoday.com
23/07/2024
Data Breach Today
Microsoft Sees 8.5M Systems Hit by Faulty CrowdStrike Update – Source: www.databreachtoday.com
22/07/2024
Data Breach Today
Fake Websites, Phishing Surface in Wake CrowdStrike Outage – Source: www.databreachtoday.com
21/07/2024
Data Breach Today
ISMG Editors: What the CrowdStrike Outage Taught Us So Far – Source: www.databreachtoday.com
20/07/2024
Data Breach Today
CrowdStrike/Microsoft Outage Latest Blow to Healthcare – Source: www.databreachtoday.com
20/07/2024
Data Breach Today
Federal Agencies Scramble to Fix Massive Software Outage – Source: www.databreachtoday.com
20/07/2024
Data Breach Today
CrowdStrike, Microsoft Outage Uncovers Big Resiliency Issues – Source: www.databreachtoday.com
20/07/2024
Data Breach Today
Healthcare in The Cloud: Detecting and Overcoming Threats to Ensure Continuity & Compliance...
20/07/2024
Data Breach Today
Banks and Airlines Disrupted as Mass Outage Hits Windows PCs – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
The Cost of Underpreparedness to Your Business – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Measuring Your Data’s Risk – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Top ‘Privacy by Design’ Considerations for Medical Devices – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Court’s Web Tracker Ruling: What HIPAA Entities Should Know – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Ransomware Remains a Major Threat to Energy – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Why AI and Human Behavior Drive New Urgency for Zero Trust – Source:...
19/07/2024
Data Breach Today
Social Engineering Defense – An Emerging Career – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Change Healthcare’s Breach Costs Could Reach $2.5 Billion – Source: www.databreachtoday.com
17/07/2024
Data Breach Today
CEO Chris O’Malley on Why LogRhythm, Exabeam Opted to Merge – Source: www.databreachtoday.com
17/07/2024
Data Breach Today
Coast Guard Battles Cyberthreats Amid Industry Resistance – Source: www.databreachtoday.com
17/07/2024
More Latest Published Posts
THE LINUX FUNDATION
Linux Privilege Escalation
LogRhythm
How to build a SOC with limited resources
Kubernetes
Kubernetes and Cloud Native Associate (KCNA) Study Guide
Australian Government
Management structures and responsibilities
Hacker Combat
How are Passwords Cracked ? by Hacker Combat.
N/A
Security Metrics & KPIs for Measuring SOC Success – Measure Up: How SOC Metrics Elevate Your Security Posture.
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat Research Lab Initiative.
ISA SECURE
The Case for ISA/IEC 62443Security Level 2 as a Minimumfor COTS Components
Huntress
2024 Cyber Threat Report
NACD - Intenet Security Alliance
2023 Director’s Handbook on Cyber-risk Oversight
Devoteam
14 Cybersecurity Trends for 2024
IGNITE Technologies
MEMORY FORENSICS VOLATILITY
CAREER UP
7 Steps to your SOC Analyst Career
National Cyber Security Centrum
Managing Insider Threats
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of Digital Threats ?
National Security Agency
CSI Cloud Top10 Key Management
CSA Cloud Security Alliance
Defining the Zero TrustProtect Surface
HANIM EKEN
CONTAINER SECURITY INTERVIEW QUESTIONS ANSWERS
CNIL
PRACTICE GUIDE GDPR – SECURITY OF PERSONAL DATA Version 2024
PWNED LABS
Cloud Security Engineer Roadmap
tutorialspoint.com
Cloud Computing Tutorial Simply Easy Learning
SMITHA SRIHARSHA
CISSP Preparation Notes
CISSP Mind Map: All Domains
Lansweeper
CIS 18 CRITICAL SECURITY CONTROLS CHECKLIST
Semaphore
CI-CD with Docker and Kubernetes
EC-MSP
BUSINESS CONTINUITY PLAN & DISASTER RECOVERY PLAN TEMPLATE
PWC
Building a risk-resilient organisation
Accenture
THE NEXT-GENERATION Building a Digital Central Bankfor a Digital Age
Thecyphere
Microsoft EntraID (Azure)ConditionalAccess
aws
AWS Security Incident Response Guide
Government of South Australian
South Australian Cyber Security Framework
NAO -National Audit Office
Audit and Risk Assurance Committee Effectiveness Tool
WWW. D E V S E COP S G U I D E S . CO M
Attacking Docker
W W W . D E V S E C O P S G U I D E S . C O M
Attacking AWS – Offensive Security Aproach
ENISA
Artificial Intelligence and Cybersecurity Research 2023
MuleSoft
API Security Best Practices – Protect your APIs with Anypoint Platform
Green Circle
All about Security Operations Center
DAZZ
A Guide to Building a Secure SDLC – Which Scanning Tools Should I look at, and where do they go?
zimperium
2023 Mobile Banking Heists Report
40 under 40
40 under 40 in CyberSecurity 2024
HADESS
40 Days in DeepDark Web About Crypto Scam
Everbridge
8 Principles of Supply Chain Risk Management
CHAOSSEARCH
Threat Hunter’s Handbook – Using Log Analytics to Find and Neutralize Hidden Threats in Your Environment
ENDGAME
The Hunters Handbook Endgame’s Guide to Adversary Hunting
THE EU’S MOST THREATENING by EUROPOL
National Cyber Security Centre
Responding to a cyber incident – a guide for CEOs
IGNITE Technologies
CREDENTIAL DUMPING
HADESS
Pwning the Domain Lateral Movement
Jorgen Lanesskog
PING Basic IP Network Troubleshooting
TELESOFT
Layer 7 Visibility What are the Benefits?
TIGERA
Introduction to Kubernetes Networking and Security
Department of Defense's (DoD)
Defense Industrial Base Cybersecurity Strategy 2024
Dummies
Zero Trust Access for Dummies Fortinet
Homeland Security
Zero Trust Implementation Strategy
National Australia Bank Limited
Your Business and Cyber Security
CYFIRMA
Xeno RAT- A New Remote Access Trojan
IGNITE Technologies
Windows Persistence COM Hijacking MITRE T1546 015
IGNITE Technologies
Windows Exploitation Rundll32
IGNITE Technologies
Windows Exploitation Msbuild
HADESS
Web LLM Attacks
HADESS
Trended Protocols for Security Stuff
Red Iberoamericana de Protección de Datos
Transferencia Internacional de Datos Personales – Guia de Implementación
CYFIRMA
TRACKING RANSOMWARE January 2024
https://www.linkedin.com/in/harunseker/
TOP Cyber Attacks Detected by SIEM Solutions
TRAVARSA
Top 100 Cyber Threats and Solutions 2024
Top 50 Cybersecurity Threats
OWASP
Top 10 Considerations for Incident Response
EXECWEB
Tips for Cybersecurity Vendors to Connect with CISOs
WITH SECURE
Threat Landscape Report 2024
ThreatRadar
Threat Intel Roundup Phar SEO Poisoning ScreenConnect
ThreatRadar
Threat Intel Roundup Outlook, QNAP, Okta
ThreatRadar
Threat Intel Roundup Outlook SmartScreen Lockbit
ThreatRadar
Threat Intel Roundup FortiOS Super Bowl Chrome APT15
INFOSECTRAIN
Third Party Information Security Assessment Checklist
INFOSECTRAIN
THE ULTIMATE SOC – CAREER GUIDE FOR BEGINNERS
Waterfall Security Solutions LTD.
THE TOP 20 CYBERATTACKS on Industrial Control Systems
CSA Cloud Security Alliance
The State of SecurityRemediation 2024
THE LINUX FUNDATION
The Open Source Software Security Mobilization Plan by OpenSSF
HITRUST
The HITRUST Approach to NIST CSF 2.0
Gavin Phillips
The Deep and Dark Web Guide
The Computer and Information Security
Deloitte
The CISOs guide to Generative AI
Ahmed Medhat
Suspicious Traffic Detection and Analysis
KPMG
Supply Chain Risk Management – A data driven approach to protecting your organization
Standford University
Rethinking Privacy in the AI Era Policy Provocations for a Data-Centric World
Orangeava
Ultimate SplunkforCybersecurity
Michael Tchuindjang
Splunk – SIEM Log Monitoring
Spam and Phishing Report for 2023
iExperts
SOC Audit Report Type1 Type2
Cybersecurity & Infrastructure Security Agency
Secure Cloud Business Applications
OAG
Security Basics for ProtectingCritical Infrastructure fromCyber Threats
InstaSafe
TIPS TOAVOID ROMANCE SCAMS
GISF
Securityto go: A Risk Management Toolkit for Humanitarianaid Agencies
COSO
R I S K A P P E T I T E –C R I T I C A L TOSUCCESS U S I N G R I S K A P P E T I T E T O T H R I V E I N A C H A N G I N G W O R L D
ISACA
Reporting Cybersecurity Risk to the Board of Directors
Freddy Dezeure
Reporting Cyber Risk to Boards
Joas A Santos
Red Team Operations Concepts
National Cyber Security Centrum
Ransomware Incident Response Plan The incident response cycle, applied to ransomware
CCN
Gestión deincidentes de ransomware INFORME DE BUENAS PRÁCTICAS
CSO.IE
Public Sector Cyber Security Baseline Standards
Mark Settle
Privacy By Design:From Principles toRequirements
Netpoleon India
DemystifyingPublic KeyInfrastructure (PKI)& CertificateLifecycle Management
PICUS
Red Report 2024 The Top 10 Most Prevalent MITRE ATT&CK® Techniques
National Security Agency
Implement Network Segmentation Encryption Cloud Envir by NSA
Active Directory Security Guide
O'Reilly
Practical Cloud Security
Incibe
CISO Libro Blanco
NACD
CISO handbook 2023
CREATED BY IBRAHIM S ALEH
CheatSheets of Common Attacks
AICPA
CGMA Cybersecurity Tool
CERT-EU
THREAT LANDSCAPE REPORT 2023
A Historical Journey Through Cybersecurity
IGNITE Technologies
A Detailed Guide for Pentester on Wfuzz
IGNITE Technologies
A Detailed Gidue on Command & Control (C2)
Ntirety
2024 Tech Predictions
Thecyphere
10 Steps to Cyber Security New Explained Cyphere
W W W . D E V S E C O P S G U I D E S . C O M
2FA Security Issues
Blue Team Notes
ENISA
BEST PRACTICES FOR CYBER CRISIS MANAGEMENT
BRIEF
Automated Threat Modeling with Threat Canvas
IGNITE Technologies
ANDROID PENTEST
IGNITE Technologies
Android Penetration Testing MOBSF FRAMEWORK
Active Directory
Active Directory PenTesting Tools
Sectrio
Vulnerability Assessment & Penetration Testing (VAPT)
IGNITE Technologies
Android Penetration Testing
Kaspersky
Incident Response Playbook: Dark Web Breaches
World Economic Forum
Cybersecurity Futures 2030
Interlinked Computingin 2040: Safety,Truth, Ownership, and Accountability
Agency for Digital Government
Cyber security in supplier relation ships
RED SIFT
State of Cyber Resilience 2023
ministry of security
DECODING CYBER ATTACKS
IGNITE Technologies
AUTOPSY LINUX AND WINDOWS
CheatSheets of Common Attacks
AICPA
CGMA Cybersecurity Tool
IGNITE Technologies
BURP SUITE FOR PENTESTER HACK BAR
Awesome Incident Response
Awesome Bug Bounty Tools
IGNITE Technologies
Android Penetration Testing
IGNITE Technologies
BURP SUITE for PENTESTER
Acronis
Acronis Cyber threats Report, H2 2023
IIRM
A Practical Guide to Enterprise Risk Management
IGNITE Technologies
Windows Privilege Escalation
HADESS
Moxa ioLogik E1212
HornetSecurity
MICROSOFT 365 SECURITY CHECKLIST
VIEH GROUP
METASPLOIT ESSENTIALS
IGNITE Technologies
Windows Privilege Escalation
Lock Your Doors
Kaspersky
Cybersecurity Alphabet
John the Ripper
John The Ripper A Pentester Guide
CYFIRMA
Caught in the Crossfire
DigiSPEAK
English Vocab for TECH
LUMU
DISRUPTING MSP CYBERSECURITY
IGNITE Technologies
DIGITAL FORENSICS – AN INTRODUCTION
SYNGRESS
THE BASICS OF WEB HACKING
NATIONAL PRIVACY COMMISSION
NPC PRIVACY TOOLKIT
Secure Claw
CYBER THREAT INTELLIGENCE ADVISORY REPORT
CRC Press
INTELLIGENT APPROACHES TO CYBER SECURITY
European Center for Digital Rights
GDPR: a culture of non-compliance?
cisco
Privacy as an Enabler of Customer Trust
National Cyber Security Centre
Prepare for Zero Trust
ENGINEERING THE DIGITAL TRANSFORMATION COMPANY
OT SECURITY
IGNITE Technologies
TRAINING PROGRAM
IGNITE Technologies
A DETAILED GUIDE ON HONEYPOTS
ACSC Australia
Identifying and Mitigating Living Off the Land Techniques
IGNITE Technologies
Nmap for Pentester PACKET TRACE
NACD - Internet Security Alliance
DIRECTOR’S HANDBOOK ON CYBER-RISK OVERSIGHT
IGNITE Technologies
MULTIPLE METHOD TO SETUP KALI LINUX
EC-council
THREAT REPORT 2024
sqreen
Pentest Best Practices Checklist
IGNITE Technologies
NMAP FOR PENTESTER
HADESS
NTLM Abuse Methods
IGNITE Technologies
NETCAT FOR PENTESTER COMPREHENSIVE GUIDE
FORESIGHT
Models for risk analysis and assessment
Interpol
METAVERSE
Microsoft Security
CISO Workshop
ICELAND.EXE
MALWARE ANALYSIS
Cyber People
The major cyberattacks on the telecommunications sector in 2023
ISECT
Information risk catalogue
OECD Publishing
Confidentiality and Information Security Management Toolkit
ThreatRadar
Threat Intel Roundup: Jenkins, ScarCruft, Midnight Blizzard
ThreatRadar
Threat Intel Roundup: Anydesk, FortiSIEM, Ivanti, Mastodon
Saudi Aramco
Third Party Cybersecurity Standard
txOne networks
The Crisis of Convergence: OT/ICS Cybersecurity in 2023
Kubernetes
The Hidden Dangers in Kubernetes Clusters
CISA
The Mirai Botnet Phenomenon
iexpeerts
10 Cybersecurity Advices
Login Soft
Annual Report – Vulnerability Intelligence
IoT Security Institute
The IoTSI SCCI Framework
FAIR
The Essential Guide to Secure Al
CISA
The Art of Balancing Cybersecurity and Business Growth
CISA
Banking Cybersecurity: Zero Margin For Error
IGNITE Technologies
WORDLISTS FOR PENTESTER
IGNITE Technologies
Wireless Penetration Testing PMKID Attack
IGNITE Technologies
Wireless Penetration Testing Wifite
IGNITE Technologies
Wireless Penetration Testing SSID Discovery
IGNITE Technologies
Wireless Penetration Testing BETTERCAP
Hyperproof
2023 Proposed Changesto NIST CSF
SentinelOne
WATCHTOWER Intelligence-Driven Threat Hunting
U.S. Department of Defense
Department of Defense (DoD) Cybersecurity Reference Architecture
CISA
Unmask Hidden Cyber Threats with MITRE ATT&CK
IGNITE Technologies
A DETAILED GUIDE TO NMAP SCAN WITH WIRESHARK
CISA
Underestimating GDPR & PCI-DSSImpact?
Didomi
What is the most important data privacy trend in 2024?
Carnegie Mellon University
Introduction to Threat Hunting
Insikt Group
Informe de Amenazas a la Infraestructura
Centre for Cyber Security Belgium
Cyber Secutiry Incident Management Guide
Natural Resources Canada
IACS Cyber Security Incident Response Playbook
HR Top Priorities for 2024
FDPIC - Federal Data Protection and Information Commissioner
Guide to Technical and Organisational Data Protection
Latest News
Data Breach Today
Federal Agencies Scramble to Fix Massive Software Outage – Source: www.databreachtoday.com
20/07/2024
Data Breach Today
CrowdStrike, Microsoft Outage Uncovers Big Resiliency Issues – Source: www.databreachtoday.com
20/07/2024
Data Breach Today
Healthcare in The Cloud: Detecting and Overcoming Threats to Ensure Continuity & Compliance – Source: www.databreachtoday.com
20/07/2024
Data Breach Today
Banks and Airlines Disrupted as Mass Outage Hits Windows PCs – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
The Cost of Underpreparedness to Your Business – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Measuring Your Data’s Risk – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Top ‘Privacy by Design’ Considerations for Medical Devices – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Court’s Web Tracker Ruling: What HIPAA Entities Should Know – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Ransomware Remains a Major Threat to Energy – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Why AI and Human Behavior Drive New Urgency for Zero Trust – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Social Engineering Defense – An Emerging Career – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Change Healthcare’s Breach Costs Could Reach $2.5 Billion – Source: www.databreachtoday.com
17/07/2024
Data Breach Today
CEO Chris O’Malley on Why LogRhythm, Exabeam Opted to Merge – Source: www.databreachtoday.com
17/07/2024
Data Breach Today
Coast Guard Battles Cyberthreats Amid Industry Resistance – Source: www.databreachtoday.com
17/07/2024
Data Breach Today
Iranian State Hackers Are Deploying a New Malware Backdoor – Source: www.databreachtoday.com
17/07/2024
Data Breach Today
Live Webinar | Every Transaction Counts: How to Improve Your Payment Performance—and Your Bottom Line – Source: www.databreachtoday.com
17/07/2024
Data Breach Today
Webinar | Accelerate your SOC with AI-driven security analytics with Elastic and Google Cloud – Source: www.databreachtoday.com
17/07/2024
Data Breach Today
Cybersecurity Support for Rural Hospitals – Source: www.databreachtoday.com
17/07/2024
Data Breach Today
Hacktivists Dump Disney Slack Data Online Over AI Projects – Source: www.databreachtoday.com
16/07/2024
Data Breach Today
DOD Failing to Fix Critical Cybersecurity Gaps, Report Says – Source: www.databreachtoday.com
16/07/2024
Data Breach Today
Synnovis Attack Halts 8,000 NHS Patient Procedures So Far – Source: www.databreachtoday.com
16/07/2024
Data Breach Today
Employees Say OpenAI Shields Whistleblowers From Regulators – Source: www.databreachtoday.com
16/07/2024
Data Breach Today
Enhancing Cyber Defense with AI-Powered SOCs – Source: www.databreachtoday.com
16/07/2024
Data Breach Today
Cybersecurity Can Be a Businesses Enabler – Source: www.databreachtoday.com
16/07/2024
Data Breach Today
AT&T Allegedly Pays Ransom After Snowflake Account Breach – Source: www.databreachtoday.com
16/07/2024
Data Breach Today
Why Google Is Eyeing a $23B Buy of Cloud Security Phenom Wiz – Source: www.databreachtoday.com
16/07/2024
Data Breach Today
Experts Warn of Post-Trump Shooting Misinformation, Scams – Source: www.databreachtoday.com
15/07/2024
Data Breach Today
Millions of Exim Servers Still Exposed to Critical Flaw – Source: www.databreachtoday.com
14/07/2024
Data Breach Today
Live Webinar | Is Your Organization Ready for the Next Wave of Endpoint Security Modernization? – Source: www.databreachtoday.com
14/07/2024
Views: 0