CISO Intelligence.
  • Home
  • About
  • Social Media
  • Bio
  • Signup for Free!
Sign in Subscribe
Newsletter

New Phishing Technique Targets CEOs With AI-Generated Voices

"When your boss’s deep voice isn't their deep thought, it's just deep fake!"
Read More
Jonathan Care
Newsletter

Pig Butchering Alert: A Hog of a Scam

All that glitters isn't gold, especially in fake investment apps where the only things getting 'fattened' are the scammers' wallets
Read More
Jonathan Care
Newsletter

Pig Butchering Alert: A Hog of a Scam

All that glitters isn't gold, especially in fake investment apps where the only things getting 'fattened' are the scammers' wallets
Read More
Jonathan Care
Newsletter

How Cloudflare Beat a 3.8 Tbps DDoS Attack: The Incredible Hulk of Cyber Defense

When life gives you terabits, Cloudflare makes lemonade - at wire-speed.
Read More
Jonathan Care
Newsletter

How Cloudflare Beat a 3.8 Tbps DDoS Attack: The Incredible Hulk of Cyber Defense

When life gives you terabits, Cloudflare makes lemonade - at wire-speed.
Read More
Jonathan Care
Newsletter

Crackin' Capas: Web Tool Wizardry with capa Explorer

Reverse engineering? There's an app for that! capa Explorer makes it click-and-mortar in the realm of ones and zeroes.
Read More
Jonathan Care
Newsletter

Crackin' Capas: Web Tool Wizardry with capa Explorer

Reverse engineering? There's an app for that! capa Explorer makes it click-and-mortar in the realm of ones and zeroes.
Read More
Jonathan Care
Newsletter

NCA Unmasks Alleged Cross-Platform 'Ransomware Royalty'

"When One Crime Just Isn't Enough: Meet the Overachiever of Cybercrime"
Read More
Jonathan Care
Newsletter

NCA Unmasks Alleged Cross-Platform 'Ransomware Royalty'

"When One Crime Just Isn't Enough: Meet the Overachiever of Cybercrime"
Read More
Jonathan Care
Newsletter

Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs

"Who knew your Windows Event Log was the snitch you always needed but never spoke to—until now."
Read More
Jonathan Care
Newsletter

Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs

"Who knew your Windows Event Log was the snitch you always needed but never spoke to—until now."
Read More
Jonathan Care
Newsletter

Why Adversaries Target VPN Appliances: The Pathway from IT to OT Cyber Attack

Hackers making a "VPN sandwich": IT bun, OT filling. Deliciously destructive.
Read More
Jonathan Care
CISO Intelligence. © 2025
  • Sign up
Powered by Ghost