white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
CISO MindMap 2023: What do InfoSec Professionals Really do?

Most people outside the Cybersecurity profession don’t fully realize and appreciate the complexity of a security professional’s job. Since 2012, CISO MindMap has been an effective educational tool to communicate CISO responsibilities and has enabled security professionals to design and refine their security programs.

Here is the latest and updated CISO MindMap for 2023 with a number of updates and new recommendations for 2023-24.

#useful #management
👍4
CISO MindMap 2023_What do InfoSec Professionals Really do.pdf
874.5 KB
CISO MindMap 2023: What do InfoSec Professionals Really do?
👍4
Forwarded from CyberSecBastion
Cloud Security Handbook

#docs
🔥3
Forwarded from CyberSecBastion
Cloud Security Handbook_2023.pdf
312.4 KB
Cloud Security Handbook
👍4
Немного позитива в рабочие будни)

#fun
😁18
Ну, парни, чего выберем? 😄

#fun
🤔9😁1
First things first: Threat Modelling using Free and Open Source Tools by Roger Carhuatocto

On 2014 RSA Conference (archive not available), Eric Olson of Cyveillance said a good and real simil about Threat Modelling: “It is a lot like teenage sex: Everyone is talking about it, everyone thinks everyone else is doing it, and most of the few people who are actually doing it aren’t doing it all that well”.

Source

#useful #DevSecOps
👍4
Quick Start Guide to Penetration Testing (ENG)

Русская версия здесь (вольный перевод)
👍41
Penetration Testing Guide Via Cyber Press.pdf
6.4 MB
Quick Start Guide to Penetration Testing (ENG)
👍5
Incident Response Playbooks and workflows for Account Compromised, Critical, Data Loss, Malware, Phishing, Ransom

#docs
👍4
Incident_Response_Playbooks_and_workflows_for_Account_Compromised.pdf
3.9 MB
Incident Response Playbooks and workflows for Account Compromised, Critical, Data Loss, Malware, Phishing, Ransom
👍4
Cyber Security Toolkit for Boards

Resources designed to help board members govern cyber risk more effectively.

#docs
👍3
Cyber Security Toolkit for Boards.pdf
4.6 MB
Cyber Security Toolkit for Boards
👍4
Wi-Fi Credential Dumping, 2023

When the term "password cracking" is used in the cyber world, it is being used as a broad concept as itnshelters all the methods related to attacking/dumping/retrieving passwords of the victim/target. But today, in this post we will solely focus on a technique called "credential dumping.

Credential dumping is said to be a technique through which usernames and passwords are extracted from any login account on the target system. It is this technique that allows an attacker to get credentials for multiple accounts from one person. And these credentials can be for anything, such as a bank, email account, social media account, or wireless network.

#pentest
👍4