's Avatar

@jon24cote.bsky.social

32 Followers  |  175 Following  |  5 Posts  |  Joined: 25.05.2025  |  1.4712

Latest posts by jon24cote.bsky.social on Bluesky

Author Nikki Robinson

Author Nikki Robinson

Effective Vulnerability Management Book

Effective Vulnerability Management Book

Author Chris Hughes

Author Chris Hughes

๐Ÿฒ ๐Ÿ“š ๐—œ๐˜'๐˜€ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†! ๐Ÿ“š๐Ÿฒ

"Chris Hughes and Nikki Robinson provide a valuable contribution to our profession with ๐˜Œ๐˜ง๐˜ง๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜๐˜ถ๐˜ญ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜”๐˜ข๐˜ฏ๐˜ข๐˜จ๐˜ฆ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต: ๐˜”๐˜ข๐˜ฏ๐˜ข๐˜จ๐˜ช๐˜ฏ๐˜จ ๐˜™๐˜ช๐˜ด๐˜ฌ ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜๐˜ถ๐˜ญ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ฃ๐˜ญ๐˜ฆ ๐˜‹๐˜ช๐˜จ๐˜ช๐˜ต๐˜ข๐˜ญ ๐˜Œ๐˜ค๐˜ฐ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ. The book offers an approachable overview of one of our industryโ€™s most challenging domains...

29.07.2025 15:40 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Author Michael Wooldridge holding 3 of his books including A Brief History of Artificial Intelligence

Author Michael Wooldridge holding 3 of his books including A Brief History of Artificial Intelligence

๐Ÿ“– ๐Ÿ”Ž Book Review Day!

You're likely consumed with the AI hype train ๐Ÿค– ๐Ÿš„, but do know the history of what led to today's world of AI bots and agents?

University of Oxford's Ashall Professor of the Foundations of Artificial Intelligence, Michael Wooldridge, certainly does!...

tinyurl.com/2dkzax3z

22.07.2025 13:39 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Photo of Kim Zetter's Countdown to Zero Day

Photo of Kim Zetter's Countdown to Zero Day

Kim Zetter's 2014 book ๐˜Š๐˜ฐ๐˜ถ๐˜ฏ๐˜ต๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ ๐˜ต๐˜ฐ ๐˜ก๐˜ฆ๐˜ณ๐˜ฐ ๐˜‹๐˜ข๐˜บ was one of the first inducted into the Canon Hall of Fame ๐Ÿ†. It unpacks the story of #Stuxnet and a 1st of its kind to turn a real-world cyber espionage operation ๐Ÿ•ตโ€โ™€๏ธ into a gripping thriller.

Book review: tinyurl.com/mubj2z4n

@kimzetter.bsky.social

21.07.2025 18:53 โ€” ๐Ÿ‘ 20    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Jessica Barker singing her books at RSAC including 'Confident Cyber Security'

Jessica Barker singing her books at RSAC including 'Confident Cyber Security'

New week, new book review to check out. And this one is getting a Hall of Fame nomination...

"If thereโ€™s one book Iโ€™ve consistently recommended to those peering into the cybersecurity industry from the outside, itโ€™s Jessica Barker's 'Confident Cyber Security'...

tinyurl.com/4brjsfpd

14.07.2025 15:18 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
The Language of Deception review screenshot

The Language of Deception review screenshot

๐Ÿšจ๐Ÿ“– ๐๐ž๐ฐ ๐›๐จ๐จ๐ค ๐ซ๐ž๐ฏ๐ข๐ž๐ฐ ๐๐ซ๐จ๐ฉ ๐Ÿ“–๐Ÿšจ

This week, ๐‰๐ž๐Ÿ๐Ÿ ๐“๐ก๐จ๐ฆ๐ฉ๐ฌ๐จ๐ง provides us with some great insights on โ€œ๐“๐ก๐ž ๐‹๐š๐ง๐ ๐ฎ๐š๐ ๐ž ๐จ๐Ÿ ๐ƒ๐ž๐œ๐ž๐ฉ๐ญ๐ข๐จ๐ง: ๐–๐ž๐š๐ฉ๐จ๐ง๐ข๐ณ๐ข๐ง๐  ๐๐ž๐ฑ๐ญ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐ข๐จ๐ง ๐€๐ˆโ€ by ๐‰๐ฎ๐ฌ๐ญ๐ข๐ง ๐‡๐ฎ๐ญ๐œ๐ก๐ž๐ง๐ฌ

The book is a comprehensive review of technologies used to manipulate, deceive, and defraud the public. It covers both old...

10.07.2025 13:44 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
"Read the best books first or you may not have a chance to read them at all" quote by Henry David Thoreau

"Read the best books first or you may not have a chance to read them at all" quote by Henry David Thoreau

This 1849 quote from Henry Thoreau is so applicable today to cybersecurity: with too much content and too much noise, where should you start?

The Cybersecurity Canon provides straightforward answers. Our team of cybersecurity experts reviews books so that you can prioritize what to read first...

10.07.2025 13:52 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
"CyberCanon New Book Review" with a pic of the book, Investments Unlimted.

"CyberCanon New Book Review" with a pic of the book, Investments Unlimted.

๐Ÿšจ๐Ÿ“– New Book Review Drop! ๐Ÿ“–๐Ÿšจ

Investments Unlimited: A Novel About DevOps, Security, Audit Compliance, and Thriving in the Digital Age

tinyurl.com/cybercanon25...

โ€œThroughout the book, the authors successfully model real-world challenges in ways that resonate. Whether itโ€™s resistance from...

24.06.2025 11:47 โ€” ๐Ÿ‘ 3    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

โ€ฆBut, if I take all the stolen creds out there on the dark web over the past several years and mash them into one database, is that really a new โ€˜colossal data breachโ€™?

Be better, folks. Or weโ€™re just like the monsters in Monsters, Inc scared to hell of a cute little toddler yelling โ€˜boo!โ€™.

20.06.2025 18:26 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

โ€ฆfocused sources and industry โ€˜expertsโ€™ see the headlines and fall prey, itโ€™s irresponsible.

This doesnโ€™t help security awareness. It does the opposite.

Per BleepingComputer (thanks Joe Tidy for sharing), a researcher found a database with a crap ton of creds. A LOT of credsโ€ฆ

20.06.2025 18:26 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

โ€ฆloves to fall for and amplify without much thought. Then, 2 seconds later, we all complain that business leaders and users donโ€™t listen to us.

I get that the big news outlets do it. Itโ€™s a problem, mainly due to the system incentivizing this very thing.

But, when many respected cybersecurityโ€ฆ

20.06.2025 18:26 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Monsterโ€™s Inc screenshot when Boo yells โ€˜Boo!โ€™ in the restaurant scaring all the patrons.

Monsterโ€™s Inc screenshot when Boo yells โ€˜Boo!โ€™ in the restaurant scaring all the patrons.

BREAKING: The Internet Still Has Leaked Credentials.

All over my feed is the latest โ€˜massiveโ€™, โ€˜unimaginableโ€™, โ€˜colossalโ€™, โ€˜data breachโ€™, โ€˜EVER!โ€™. โ€˜A nightmareโ€™. ๐Ÿคจ
But, instead, this appears to be just some more of that good old fashioned fear mongering. The kind the cybersecurity communityโ€ฆ

20.06.2025 18:26 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
CyberCanon Newsletter #1 coming out of a steel pad-locked mailbox with a Substack logo.

CyberCanon Newsletter #1 coming out of a steel pad-locked mailbox with a Substack logo.

๐Ÿ“ The #CyberCanon Newsletter Has Landed! ๐Ÿ—ž๏ธ

Weโ€™re excited to announce the launch of our #Substack newsletter. It's your front-row seat to the best writing in #cybersecurity.

๐Ÿ”— ๐Ÿ‘‰๐Ÿผ substack.com/@cybercanon

19.06.2025 14:28 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐Ÿ“š Books: The Original OSINT ๐Ÿ”

Over the weekend, a member of our team attended the @layer8conference.com, an OSINT and Social Engineering focused event.

Dr. Brian Nussbaumโ€™s (@ilnuttree.bsky.social) interesting talk was right up our alley regarding OSINT National History referencingโ€ฆ
(1/5)

17.06.2025 02:15 โ€” ๐Ÿ‘ 4    ๐Ÿ” 5    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
CyberCanon book review screenshot of Cybersecurity Readiness

CyberCanon book review screenshot of Cybersecurity Readiness

"I experienced tremendous technical and cultural challenges during our implementation and only wish that we had a book like this to navigate us."

๐Ÿ’ฅIt's Tuesday-review-day here at the #CyberCanon.๐Ÿ’ฅ

A new review by committee member Sandip Dholakia has been added to the Canon library...
(1/4)

17.06.2025 18:26 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Layer 8 Conference entrance

Layer 8 Conference entrance

Layer 8 badge and Rae Baker book signing

Layer 8 badge and Rae Baker book signing

OSINT themed CyberCanon sticker

OSINT themed CyberCanon sticker

โ€ฆ
2026 edition.

#cybersecuritybooks #socialengineering #layer8con

cybercanon.org/spies-lies-a...

cybercanon.org/tracers-in-t...
(5/5)

17.06.2025 02:15 โ€” ๐Ÿ‘ 2    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
CyberCanon OSINT stickers

CyberCanon OSINT stickers

Boston based folks, looking like another ๐ŸŒง๏ธ Saturday. Even more the reason to attend @layer8conference.com an OSINT and Social Engineering conference tomorrow. โ€ฉ
If still on the fence, let it be known that a Canon team member will be in attendance and may have OSINT themed CyberCanon stickers. ๐Ÿค—

13.06.2025 12:41 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Help wanted sign joke about no pay but cool helmets

Help wanted sign joke about no pay but cool helmets

Well, we may not be offering cool helmets like your local fire department, but we do have a very nice logo you could put on your LinkedIn profile, ๐Ÿคท?

If you are passionate about cybersecurity and our mission, please check out the volunteer roles we are looking to fill.

11.06.2025 21:53 โ€” ๐Ÿ‘ 2    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Dark Avenger, Minecraft Wars, Killer Toasters... Super fun one that I enjoyed about famous hacks, definitely worth checking out...

10.06.2025 14:14 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
New Cybersecurity Canon Book Review for Fancy Bear Goes Phishing

New Cybersecurity Canon Book Review for Fancy Bear Goes Phishing

๐Ÿšจ๐Ÿ“– New Cybersecurity Canon Book Review Drop! ๐Ÿ“–๐Ÿšจ

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott J. Shapiro @scottjshapiro.bsky.social

Reviewer J. Carlos Vega, CISSP takes us through this compelling dive into five infamous hacks...
(1/4)

10.06.2025 13:27 โ€” ๐Ÿ‘ 14    ๐Ÿ” 8    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
CyberCanon.org screenshot - Join the community!

CyberCanon.org screenshot - Join the community!

๐Ÿšจ Big News: our new website is now live at CyberCanon.org! ๐Ÿšจ

Explore our curated library of must-read cybersecurity books, suggest new titles, and support our mission to share the essential knowledge every InfoSec professional needs to learn, apply, and master.
(1/3)

30.05.2025 15:37 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

@jon24cote is following 19 prominent accounts