๐Ÿ“œ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜† | ๐—๐—ฎ๐—ป๐˜‚๐—ฎ๐—ฟ๐˜† ๐Ÿญ๐Ÿณ, ๐Ÿฎ๐Ÿฌ๐Ÿญ๐Ÿต

Seven years ago today, Troy Hunt ( @troyhunt ) disclosed Collection #1, one of the largest known aggregations of breached credentials at the time.

๐Ÿ‘‰ See Troy's original write-up on this finding: https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/

Collection #1 showed how old breaches become new threats at scale when data is reused, automated, and repackaged. For deeper context on why this happens, we recommend two #CyberCanonHoF books published years before this incident.

๐™Ž๐™ฅ๐™–๐™ข ๐™‰๐™–๐™ฉ๐™ž๐™ค๐™ฃ - the economics of stolen data ( @briankrebs )
๐Ÿ“ Review: https://cybercanon.org/spam-nation/
๐Ÿ›๏ธ Amazon affiliate link: https://amzn.to/4o0m5wz

๐™†๐™ž๐™ฃ๐™œ๐™ฅ๐™ž๐™ฃ - how cybercrime gets monetized ( @Kpoulsen )
๐Ÿ“ Review: https://cybercanon.org/kingpin-how-a-hacker-took-over-the-billion-dollar-cybercrime-underground/
๐Ÿ›๏ธ Amazon affiliate link: https://amzn.to/4nWQCv4

#CybersecurityHistory #CybersecurityBooks #DataBreach

#CybersecurityHistory #CybersecurityBooks #DataBreach

This weekend is brought to you by this quote from Mark Bowden, author of ๐™’๐™ค๐™ง๐™ข: ๐™๐™๐™š ๐™๐™ž๐™ง๐™จ๐™ฉ ๐˜ฟ๐™ž๐™œ๐™ž๐™ฉ๐™–๐™ก ๐™’๐™ค๐™ง๐™ก๐™™ ๐™’๐™–๐™ง, a 2017 CyberCanon Hall of Fame winner.

Check out Rick's review if you have never read it, as it is an entertaining read in itself ๐Ÿ‘‰ https://cybercanon.org/worm-the-first-digital-world-war/

If you want your own copy, this affiliate link helps support the Canon: https://amzn.to/47Xfr3Q

#Cybersecurity #CyberCanonHoF #CybersecurityBooks #CyberWar

@raceBannon99 @TheAtlantic

๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโ€™s โ€œexperimentโ€ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโ€™s most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.

To learn more, ๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โžก๏ธ https://tinyurl.com/r2b3zc2u

๐Ÿ’ฅAnd as a bonus, many may not be aware that ๐™๐™๐™š ๐˜พ๐™ช๐™˜๐™ ๐™ค๐™ค'๐™จ ๐™€๐™œ๐™œ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.

#CyberCanonHoF review โžก๏ธ https://tinyurl.com/3rywf7zw

#CyberCanon #CybersecurityHistory #CybersecurityBooks

๐ŸŽƒIt's Halloween. But forget ghost stories, the scariest stories are true.

In ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข, @agreenberg unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets. No jump scares. Just power grids going dark, global companies paralyzed, and governments scrambling in the shadows.

At #CyberCanon, we honor books that reveal how close the digital and physical worlds really are and how fragile our sense of safety can be when the next exploit lurks unseen.

๐Ÿ’€ https://tinyurl.com/mu9aht95

#Cybersecurity #CybersecurityBooks #CyberCanonHoF #Halloween

This #CybersecurityAwarenessMonth, remember security awareness isnโ€™t about information. Itโ€™s about ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ. ๐Ÿ›->๐Ÿฆ‹

At CyberCanon, we celebrate books that go beyond technical defense to ๐™ฉ๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข our understanding of security.

Perry Carpenterโ€™s ๐™๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ก ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜ผ๐™ฌ๐™–๐™ง๐™š๐™ฃ๐™š๐™จ๐™จ reframes awareness as a human challenge, not a compliance task ๐Ÿ‘‰https://tinyurl.com/u6kr7dzz

Read about this Hall of Famer and more CyberCanon-approved books that shape the culture of security.

#CyberCanonHoF #CybersecurityBooks #SecurityAwareness #SecurityCulture

๐Ÿ—ž๏ธDid you miss our October Newsletter?

๐Ÿ”ฆhttps://tinyurl.com/33n4y4w9

Be sure to read and subscribe over on Substack. In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:

๐ŸฆŠ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ˆ๐™ฎ๐™ฉ๐™๐™จ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™จ๐™˜๐™ค๐™ฃ๐™˜๐™š๐™ฅ๐™ฉ๐™ž๐™ค๐™ฃ๐™จ by Gene Spafford, @theladyofgeek, and @dykstra

#CyberCanonHoF #CybersecurityBooks #CybersecurityNewsletter

๐Ÿ—“๏ธREMINDER๐Ÿ—“๏ธ

Thursday, 9/25, our very own Rick Howard will be presenting at
Bitwarden's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg.

It's free, it's virtual, and it's only 2 hours, so no excuses. โ˜บ๏ธ

๐Ÿ‘‰ https://bitwarden.com/open-source-security-summit/

Andy is a rare 2X #CyberCanon Hall of Fame winner for his books Sandworm and Tracers in the Dark.

๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข review: tinyurl.com/mu9aht95

๐™๐™ง๐™–๐™˜๐™š๐™ง๐™จ ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐˜ฟ๐™–๐™ง๐™  review: tinyurl.com/3xw76xxp

@bitwarden
@agreenberg
#CyberCanonHoF #Cybersecurity #CybersecurityBooks

Have you heard about this new thing called #AI?!

(Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)

This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for the #CyberCanon Hall of Fame ๐Ÿฆ.

Read why ๐˜ผ๐™ง๐™ฉ๐™ž๐™›๐™ž๐™˜๐™ž๐™–๐™ก ๐™„๐™ฃ๐™ฉ๐™š๐™ก๐™ก๐™ž๐™œ๐™š๐™ฃ๐™˜๐™š ๐™–๐™ฃ๐™™ ๐™ˆ๐™–๐™˜๐™๐™ž๐™ฃ๐™š ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ค๐™ช๐™ฃ๐™™๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ: ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ง๐™ค๐™ข ๐™€๐™ญ๐™ฅ๐™š๐™ง๐™ž๐™š๐™ฃ๐™˜๐™š by Andrew Lowe and Steve Lawless is a #CyberCanonHoF candidate ๐Ÿ‘‰ tinyurl.com/326sztx9

Publisher: BCS, The Chartered Institute for IT

#CyberSecurityBooks #CyberSecurity

Our August Newsletter ๐Ÿ—ž๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

Definitely worth taking a peek ๐Ÿ‘‰ https://tinyurl.com/canon-aug25-nl

#CyberSecurityBooks #CyberCanonHoF #HackerSummerCamp #BHUSA

๐Ÿ“† ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—–๐—ผ๐—บ๐—บ๐—ถ๐˜๐˜๐—ฒ๐—ฒ ๐— ๐—ฒ๐—ฒ๐˜๐—ถ๐—ป๐—ด ๐—›๐—ถ๐—ด๐—ต๐—น๐—ถ๐—ด๐—ต๐˜๐˜€ ๐Ÿ“†

We had our monthly review committee meeting this week and the Canon keeps getting better! Here are some quick highlights:

๐Ÿ…’ Stephanie Pirman and Joanna Grama led very engaged discussions of their detailed reviews.
๐Ÿ…’ Trying out new Hall of Fame scoring criteria
๐Ÿ…’ Welcomed 4 new committee members
๐Ÿ…’ 50 new reviews are currently staged with more arriving weekly!

#CyberCanon #CyberCanonHoF #CybersecurityBooks #EDR #cyberespionage