's Avatar

@jon24cote.bsky.social

48 Followers  |  200 Following  |  5 Posts  |  Joined: 25.05.2025  |  2.0909

Latest posts by jon24cote.bsky.social on Bluesky

Artwork for CyberCanon October book review recap

Artwork for CyberCanon October book review recap

๐Ÿ—“๏ธ๐—ข๐—ฐ๐˜๐—ผ๐—ฏ๐—ฒ๐—ฟ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—ฅ๐—ฒ๐—ฐ๐—ฎ๐—ฝ!๐Ÿ“š

In case you missed any...

๐Ÿง‘โ€๐Ÿ’ผ ๐™๐™๐™š ๐™๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ก ๐™‡๐™š๐™–๐™™๐™š๐™ง: tinyurl.com/94z7ujsu

๐Ÿ” ๐˜ฟ๐™ž๐™›๐™›๐™š๐™ง๐™š๐™ฃ๐™ฉ๐™ž๐™–๐™ก ๐™‹๐™ง๐™ž๐™ซ๐™–๐™˜๐™ฎ: tinyurl.com/2s3jk4cn

๐Ÿค– ๐˜ผ๐™„-๐˜ฟ๐™ง๐™ž๐™ซ๐™š๐™ฃ ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™–๐™ฃ๐™™ ๐™๐™๐™ง๐™š๐™–๐™ฉ ๐™„๐™ฃ๐™ฉ๐™š๐™ก๐™ก๐™ž๐™œ๐™š๐™ฃ๐™˜๐™š: tinyurl.com/4k263a9c

๐Ÿง  ๐™๐™ฃ๐™ ๐™ฃ๐™ค๐™ฌ๐™–๐™—๐™ก๐™š ๐™ˆ๐™ž๐™ฃ๐™™๐™จ: tinyurl.com/yc4r5r4r

#CybersecurityBooks

06.11.2025 18:17 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Artwork for CyberCanon's latest Newsletter, including the book 'We Are Anonymous'

Artwork for CyberCanon's latest Newsletter, including the book 'We Are Anonymous'

Did you catch our latest newsletter over on Substack?

It covers various topics, including #hactivism, and how @parmy.bsky.social 's Hall of Fame book, ๐™’๐™š ๐˜ผ๐™ง๐™š ๐˜ผ๐™ฃ๐™ค๐™ฃ๐™ฎ๐™ข๐™ค๐™ช๐™จ, ties into today's cyber threats.

๐Ÿ“ฐ tinyurl.com/2zbsvsfx

05.11.2025 18:27 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
CyberCanon Review of Understand the Cyber Attacker Mindset

CyberCanon Review of Understand the Cyber Attacker Mindset

๐Ÿ‘ฉโ€๐Ÿ’ป๐—œ๐˜'๐˜€ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†!๐Ÿง 

This week, Kevin Magee provides a Hall of Fame recommendation for Sarah Armstrong-Smithโ€™s ๐™๐™ฃ๐™™๐™š๐™ง๐™จ๐™ฉ๐™–๐™ฃ๐™™ ๐™ฉ๐™๐™š ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐˜ผ๐™ฉ๐™ฉ๐™–๐™˜๐™ ๐™š๐™ง ๐™ˆ๐™ž๐™ฃ๐™™๐™จ๐™š๐™ฉ

Read why he believes it will help you "transform your response to threats" โžก๏ธ tinyurl.com/56nzxp5z

#CISO #SecurityAwareness #ThreatIntelligence

04.11.2025 15:31 โ€” ๐Ÿ‘ 5    ๐Ÿ” 4    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 1
Post image

๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet.

๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by @scottjshapiro.bsky.social , covers the #MorrisWorm as one of its five infamous hacks. Our review โžก๏ธ tinyurl.com/r2b3zc2u

(1/3..)

02.11.2025 15:33 โ€” ๐Ÿ‘ 29    ๐Ÿ” 9    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐ŸŽƒIt's Halloween. But forget ghost stories, the scariest stories are true.

In ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข, @agreenberg.bsky.social unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets.

๐Ÿ’€ tinyurl.com/mu9aht95

31.10.2025 17:05 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Photo of Mikko's book with a CyberCanon bookmark

Photo of Mikko's book with a CyberCanon bookmark

If your mission this October is to elevate awareness, not just compliance, here is a book worth putting in your teamโ€™s hands...

๐™„๐™› ๐™„๐™ฉโ€™๐™จ ๐™Ž๐™ข๐™–๐™ง๐™ฉ, ๐™„๐™ฉโ€™๐™จ ๐™‘๐™ช๐™ก๐™ฃ๐™š๐™ง๐™–๐™—๐™ก๐™š by Mikko Hypponen weaves technical insight with human stories, showing how every connected thing holds risk.

tinyurl.com/y9ne2uzk

30.10.2025 14:36 โ€” ๐Ÿ‘ 5    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐Ÿง  New CyberCanon review!

Jeffrey Pierdomenico dives into Mark Baileyโ€™s Unknowable Minds, exploring AI, ethics, and security.

โ€œPutting humanity above all elseโ€ has never felt more urgent.

๐Ÿ”— cybercanon.org/unknowable-minds

From: @imprintacademic.bsky.social

#AIsecurity #CybersecurityBooks

28.10.2025 14:35 โ€” ๐Ÿ‘ 3    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
A creative Transformer-themed graphic recommending the book, Transformational Security Awareness, for Cybersecurity Awareness Month

A creative Transformer-themed graphic recommending the book, Transformational Security Awareness, for Cybersecurity Awareness Month

This #CybersecurityAwarenessMonth, remember security awareness isnโ€™t about information. Itโ€™s about ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ. ๐Ÿ›->๐Ÿฆ‹

We celebrate books that go beyond technical defense to ๐™ฉ๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข our understanding of security, like @perrycarpenter.bsky.social 's ๐™๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ก ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜ผ๐™ฌ๐™–๐™ง๐™š๐™ฃ๐™š๐™จ๐™จ

(1/2)...

23.10.2025 18:58 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Artwork of CyberCanon's review of AI-Driven Cybersecurity and Threat Intelligence

Artwork of CyberCanon's review of AI-Driven Cybersecurity and Threat Intelligence

๐Ÿค–๐Ÿ”๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ!

This week, Daniel "Rags" Ragsdale provides a timely review of Dr. Iqbal H. Sarker's ๐˜ผ๐™„-๐˜ฟ๐™ง๐™ž๐™ซ๐™š๐™ฃ ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™–๐™ฃ๐™™ ๐™๐™๐™ง๐™š๐™–๐™ฉ ๐™„๐™ฃ๐™ฉ๐™š๐™ก๐™ก๐™ž๐™œ๐™š๐™ฃ๐™˜๐™š, from Springer.

Full review ๐Ÿ‘‰ tinyurl.com/4k263a9c

#Cybersecurity #AI #CybersecurityBooks #IoT #OT #ThreatIntelligence

(1/3)...

21.10.2025 15:08 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

...(2/2)

0๏ธโƒฃ Hall of Famer ๐™‹๐™ง๐™ค๐™Ÿ๐™š๐™˜๐™ฉ ๐™•๐™š๐™ง๐™ค ๐™๐™ง๐™ช๐™จ๐™ฉ by George Finney for a fun novel: tinyurl.com/44dsc967

0๏ธโƒฃ Hall of Fame candidate ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™๐™ž๐™ง๐™จ๐™ฉ ๐™‹๐™ง๐™ž๐™ฃ๐™˜๐™ž๐™ฅ๐™ก๐™š๐™จ by @rick-howard.bsky.social for overall cyber strategies, including ZT: tinyurl.com/msr8wrwy

#CybersecurityAwarenessMonth #CybersecurityBooks

17.10.2025 00:12 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
CyberCanon artwork with a glowing digital ID along with 3 books to help implement Zero Trust strategies

CyberCanon artwork with a glowing digital ID along with 3 books to help implement Zero Trust strategies

Valid account usage is the #1 access vector in identity threat reports per @talosintelligence.com: tinyurl.com/2twf98ry

Implementing #ZeroTrust has never been more important. Here are 3 book recsโ€ฆ

0๏ธโƒฃ Hall of Famer ๐™•๐™š๐™ง๐™ค ๐™๐™ง๐™ช๐™จ๐™ฉ ๐™‰๐™š๐™ฉ๐™ฌ๐™ค๐™ง๐™ ๐™จ by Evan Gilman and Doug Barth: tinyurl.com/3h5mnbyd

(1/2)...

17.10.2025 00:12 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐Ÿ”๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜† ๐—ง๐˜‚๐—ฒ๐˜€๐—ฑ๐—ฎ๐˜†!๐Ÿ“–

#DifferentialPrivacy is an increasingly popular, though controversial, approach. This week, @benrothke.bsky.social provides a Hall of Fame recommendation of @simson.net 's ๐˜‹๐˜ช๐˜ง๐˜ง๐˜ฆ๐˜ณ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜—๐˜ณ๐˜ช๐˜ท๐˜ข๐˜ค๐˜บ, from @mitpress.bsky.social.

๐Ÿ‘‰ tinyurl.com/2s3jk4cn

#CybersecurityBooks #DP

14.10.2025 13:35 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
CyberCanon's review of Matt Mayberry's 'The Transformational Leader'

CyberCanon's review of Matt Mayberry's 'The Transformational Leader'

๐Ÿ›ฉ๏ธ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†!

"Itโ€™s not a cybersecurity book, but itโ€™s a book that will help you become the kind of cybersecurity leader we need more of."

This week, Caroline Wong reviews Matt Mayberry's:

๐™๐™๐™š ๐™๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ก ๐™‡๐™š๐™–๐™™๐™š๐™ง

Full review ๐Ÿ‘‰ tinyurl.com/94z7ujsu

#CybersecurityLeaders

(1/2)...

07.10.2025 13:43 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Chris Hoofnagle

Chris Hoofnagle

CyberCanon Review screenshot for Cybersecurity in Context

CyberCanon Review screenshot for Cybersecurity in Context

Golden Richard III

Golden Richard III

Post image

โš–๏ธ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ!โš–๏ธ

This week, @josiahdykstra.bsky.social provides a Hall of Fame recommendation review of ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ž๐™ฃ ๐˜พ๐™ค๐™ฃ๐™ฉ๐™š๐™ญ๐™ฉ: ๐™๐™š๐™˜๐™๐™ฃ๐™ค๐™ก๐™ค๐™œ๐™ฎ, ๐™‹๐™ค๐™ก๐™ž๐™˜๐™ฎ, ๐™–๐™ฃ๐™™ ๐™‡๐™–๐™ฌ by professors ๐Ÿง‘โ€๐Ÿซ Chris Hoofnagle and Golden Richard III. @nolaforensix.bsky.social

Full review ๐Ÿ‘‰ tinyurl.com/mv6255mk

(1/2)...

30.09.2025 13:49 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
The CyberNest x CyberCanon Partnership Announcement

The CyberNest x CyberCanon Partnership Announcement

๐Ÿ“ข ๐—ง๐—ต๐—ฒ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐—ก๐—ฒ๐˜€๐˜ ๐˜… ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐—–๐—ฎ๐—ป๐—ผ๐—ป ๐—ฃ๐—ฎ๐—ฟ๐˜๐—ป๐—ฒ๐—ฟ๐˜€๐—ต๐—ถ๐—ฝ ๐Ÿค

#Cybersecurity has no shortage of noise. What professionals need is ๐˜€๐—ถ๐—ด๐—ป๐—ฎ๐—น.

Thatโ€™s why weโ€™re excited to announce a new #partnership:

๐Ÿ“š #CyberCanon curates timeless, peer-reviewed cybersecurity books every professional should know.
...(1/3)

30.09.2025 16:10 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐Ÿ—“๏ธREMINDER๐Ÿ—“๏ธ

Thursday, 9/25, our very own Rick Howard will be presenting at
@bitwarden.bsky.social's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg agreenberg.bsky.social.

It's free, it's virtual, and it's only 2 hours, so no excuses. โ˜บ๏ธ

๐Ÿ‘‰ bitwarden.com/open-source-...

(1/2)

23.09.2025 19:09 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Artwork for the Canon's book review of Artificial Intelligence and Machine Learning Foundations.

Artwork for the Canon's book review of Artificial Intelligence and Machine Learning Foundations.

Have you heard about this new thing called #AI?!

(Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)

This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for...
(1/2)

23.09.2025 15:25 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
CyberCanon's Review of The Coming Wave

CyberCanon's Review of The Coming Wave

๐ŸŒŠ ๐—ก๐—ฒ๐˜„ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„(๐˜€)! ๐ŸŒŠ

This week, not 1, but 2๏ธโƒฃ #CyberCanon Committee Members review ๐™๐™๐™š ๐˜พ๐™ค๐™ข๐™ž๐™ฃ๐™œ ๐™’๐™–๐™ซ๐™š by @mustafasuleymanai.bsky.social with Michael Bhaskar.

This book is widely known, but to what extent does it offer meaningful value to cybersecurity professionals? ๐Ÿค”

This is exactly...
(1/2)

16.09.2025 12:52 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Graphic of CyberCanon review of Hacked

Graphic of CyberCanon review of Hacked

๐Ÿšจ๐Ÿ“– ๐—ก๐—ฒ๐˜„ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ! ๐Ÿ“–๐Ÿšจ

This week Joanna Grama @runforserenity.bsky.social
submits her review of Jessica Barkerโ€™s ๐™ƒ๐™–๐™˜๐™ ๐™š๐™™: ๐™๐™๐™š ๐™Ž๐™š๐™˜๐™ง๐™š๐™ฉ๐™จ ๐˜ฝ๐™š๐™๐™ž๐™ฃ๐™™ ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐˜ผ๐™ฉ๐™ฉ๐™–๐™˜๐™ ๐™จ.

๐Ÿ“ Full review ๐Ÿ‘‰ tinyurl.com/mryyszv5

๐Ÿ›’ Get the book for $11! ๐Ÿ‘‰ amzn.to/4n5W6DC

#CyberCanon #Cybersecurity #CybersecurityBooks #Hacking

09.09.2025 18:51 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Preview
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. [Hand, Matt] on Amazon.com. *FREE* shipping on qualifying offers. Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.

๐Ÿšจ If Matt's book interests you, please consider purchasing here ๐Ÿ‘‰ amzn.to/4m1vLpC

We now have Amazon Affiliate links to purchase titles in the Canon library! Same cost to you, but a few ๐Ÿ’ต goes to the Canon to help keep us up and running. ๐Ÿ™

#CyberCanonHoFCandidate #CybersecurityBooks #EDR

02.09.2025 13:27 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
CyberCanon review screenshot

CyberCanon review screenshot

Evading EDR cover

Evading EDR cover

Matt Hand photo

Matt Hand photo

๐Ÿ’ฅ๐Ÿ“˜ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†!

This week, Stephanie Pirman provides a Hall of Fame recommendation for @matterpreter.bsky.social Matt Hand's ๐™€๐™ซ๐™–๐™™๐™ž๐™ฃ๐™œ ๐™€๐˜ฟ๐™ from @nostarchpress.bsky.social.

Evading EDR provides "๐˜ข ๐˜ค๐˜ฐ๐˜ฎ๐˜ฑ๐˜ณ๐˜ฆ๐˜ฉ๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ท๐˜ช๐˜ฆ๐˜ธ ๐˜ฐ๐˜ง ๐˜Œ๐˜‹๐˜™๐˜ด ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ฆ ๐˜ค๐˜ฐ๐˜ณ๐˜ฆ ๐˜ฑ๐˜ฆ๐˜ณ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ๐˜ด: ๐˜ฉ๐˜ฐ๐˜ธ ๐˜Œ๐˜‹๐˜™ ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ด, ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ข๐˜ฏ ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ฆ๐˜ณ ๐˜ค๐˜ข๐˜ฏ...

02.09.2025 13:27 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

At #DEFCON, we spent time talking with Kurtis Minder and Jon DiMaggio, industry leaders in cyber threat intelligence. Both are authors of books on the Canon's list to review. We came away quite impressed, especially by their immense passion for fighting cyber crime.

(1/2)...

28.08.2025 16:53 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
AI-Generated image of a steel mailbox with padlock, substack logo and a CyberCanon newsletter in its slot

AI-Generated image of a steel mailbox with padlock, substack logo and a CyberCanon newsletter in its slot

Our August Newsletter ๐Ÿ—ž๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

Definitely worth taking a peek ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

27.08.2025 16:54 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Screenshot of CyberCanon review of Silence on the Wire

Screenshot of CyberCanon review of Silence on the Wire

๐Ÿšจ๐Ÿ“š ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†! ๐Ÿ“š๐Ÿšจ

This week, Edwin Shuttleworth provides a review for Michal Zalewski's (@lcamtuf.coredump.cx) ๐™Ž๐™ž๐™ก๐™š๐™ฃ๐™˜๐™š ๐™ค๐™ฃ ๐™ฉ๐™๐™š ๐™’๐™ž๐™ง๐™š. This 2005 book from @nostarchpress.bsky.social is still well worth the read today.

Full review๐Ÿ‘‰https://tinyurl.com/323ytuwk

26.08.2025 13:38 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
CyberCanon New Book Review for The Security Culture Playbook

CyberCanon New Book Review for The Security Culture Playbook

๐Ÿšจ๐Ÿ“š ๐—œ๐˜'๐˜€ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†! ๐Ÿ“š๐Ÿšจ

This week, Crystal Kobe provides a Hall of Fame recommendation for Perry Carpenter @perrycarpenter.bsky.social and Kai Roer 's ๐™๐™๐™š ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜พ๐™ช๐™ก๐™ฉ๐™ช๐™ง๐™š ๐™‹๐™ก๐™–๐™ฎ๐™—๐™ค๐™ค๐™ : ๐˜ผ๐™ฃ ๐™€๐™ญ๐™š๐™˜๐™ช๐™ฉ๐™ž๐™ซ๐™š ๐™‚๐™ช๐™ž๐™™๐™š ๐™๐™ค ๐™๐™š๐™™๐™ช๐™˜๐™ž๐™ฃ๐™œ ๐™๐™ž๐™จ๐™  ๐™–๐™ฃ๐™™ ๐˜ฟ๐™š๐™ซ๐™š๐™ก๐™ค๐™ฅ๐™ž๐™ฃ๐™œ ๐™”๐™ค๐™ช๐™ง ๐™ƒ๐™ช๐™ข๐™–๐™ฃ ๐˜ฟ๐™š๐™›๐™š๐™ฃ๐™จ๐™š.

Full review ๐Ÿ‘‰ tinyurl.com/yzstbadx

19.08.2025 14:04 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐Ÿ“† ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—–๐—ผ๐—บ๐—บ๐—ถ๐˜๐˜๐—ฒ๐—ฒ ๐— ๐—ฒ๐—ฒ๐˜๐—ถ๐—ป๐—ด ๐—›๐—ถ๐—ด๐—ต๐—น๐—ถ๐—ด๐—ต๐˜๐˜€ ๐Ÿ“†

We had our monthly review committee meeting this week and the Canon keeps getting better!

๐Ÿ…’ Stephanie Pirman and Joanna Grama, JD led very engaged discussions of their detailed reviews.
๐Ÿ…’ Trying out new Hall of Fame scoring criteria
โ€ฆ

15.08.2025 11:45 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Photo of How I Rob Banks by FC aka Freakyclown at the Black Hat Book Store

Photo of How I Rob Banks by FC aka Freakyclown at the Black Hat Book Store

๐Ÿ”Ž ๐Ÿ“– ๐—ก๐—ฒ๐˜„ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„! ๐Ÿ“– ๐Ÿ”

โ€œ๐™ƒ๐™ค๐™ฌ ๐™„ ๐™๐™ค๐™— ๐˜ฝ๐™–๐™ฃ๐™ ๐™จ is an engaging, fast-paced read that offers a firsthand look into the world of physical penetration testing. Equal parts storytelling, security insight and personal reflection, the book aims to inform and entertain.โ€

-Walt Powell, #CyberCanon Committee

13.08.2025 15:27 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Image of the CyberCanon New book Review of Dark Wire by Joseph Cox

Image of the CyberCanon New book Review of Dark Wire by Joseph Cox

๐Ÿšจ๐Ÿ“– ๐—ก๐—ฒ๐˜„ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ! ๐Ÿ“–๐Ÿšจ

This week, Steve Winterfeld provides us with some great insights on โ€œ๐˜ฟ๐™–๐™ง๐™  ๐™’๐™ž๐™ง๐™š: ๐™๐™๐™š ๐™„๐™ฃ๐™˜๐™ง๐™š๐™™๐™ž๐™—๐™ก๐™š ๐™๐™ง๐™ช๐™š ๐™Ž๐™ฉ๐™ค๐™ง๐™ฎ ๐™ค๐™› ๐™ฉ๐™๐™š ๐™‡๐™–๐™ง๐™œ๐™š๐™จ๐™ฉ ๐™Ž๐™ฉ๐™ž๐™ฃ๐™œ ๐™Š๐™ฅ๐™š๐™ง๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™€๐™ซ๐™š๐™งโ€ by Joseph Cox (@josephcox).

In Steve's words, it's "a true crime thriller that tells the story...

๐Ÿ‘‰ tinyurl.com/48r3nzek

12.08.2025 20:38 โ€” ๐Ÿ‘ 11    ๐Ÿ” 2    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Author Nikki Robinson

Author Nikki Robinson

Effective Vulnerability Management Book

Effective Vulnerability Management Book

Author Chris Hughes

Author Chris Hughes

๐Ÿฒ ๐Ÿ“š ๐—œ๐˜'๐˜€ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†! ๐Ÿ“š๐Ÿฒ

"Chris Hughes and Nikki Robinson provide a valuable contribution to our profession with ๐˜Œ๐˜ง๐˜ง๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜๐˜ถ๐˜ญ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜”๐˜ข๐˜ฏ๐˜ข๐˜จ๐˜ฆ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต: ๐˜”๐˜ข๐˜ฏ๐˜ข๐˜จ๐˜ช๐˜ฏ๐˜จ ๐˜™๐˜ช๐˜ด๐˜ฌ ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜๐˜ถ๐˜ญ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ฃ๐˜ญ๐˜ฆ ๐˜‹๐˜ช๐˜จ๐˜ช๐˜ต๐˜ข๐˜ญ ๐˜Œ๐˜ค๐˜ฐ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ. The book offers an approachable overview of one of our industryโ€™s most challenging domains...

29.07.2025 15:40 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

@jon24cote is following 20 prominent accounts