CyberCanon's Avatar

CyberCanon

@cybercanon.org

We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits. www.cybercanon.org Also known as the Cybersecurity Canon Project Founded: 2013

802
Followers
893
Following
233
Posts
15.06.2023
Joined
Posts Following

Latest posts by CyberCanon @cybercanon.org

CyberCanon Volunteer Sales Associates Needed

CyberCanon Volunteer Sales Associates Needed

Cybersecurity community, we need a little help... ๐Ÿ™

Weโ€™re looking for ๐™‘๐™ค๐™ก๐™ช๐™ฃ๐™ฉ๐™š๐™š๐™ง ๐™Ž๐™–๐™ก๐™š๐™จ ๐˜ผ๐™จ๐™จ๐™ค๐™˜๐™ž๐™–๐™ฉ๐™š๐™จ to help grow the CyberCanon Speakerโ€™s Bureau.

Help connect cybersecurity conferences and organizations with experts from the CyberCanon community.

Details and how to apply: tinyurl.com/5yxf4hby

05.03.2026 16:45 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

๐˜–๐˜ฏ๐˜ฆ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฃ๐˜ฐ๐˜ฐ๐˜ฌโ€™๐˜ด ๐˜ด๐˜ต๐˜ณ๐˜ฐ๐˜ฏ๐˜จ๐˜ฆ๐˜ด๐˜ต ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ณ๐˜ช๐˜ฃ๐˜ถ๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ช๐˜ด ๐˜ช๐˜ต๐˜ด ๐˜ข๐˜ณ๐˜จ๐˜ถ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜จ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ช๐˜ด ๐˜ฏ๐˜ฐ๐˜ต ๐˜ข ๐˜ด๐˜ต๐˜ข๐˜ต๐˜ช๐˜ค ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ณ๐˜ต๐˜บ, ๐˜ฃ๐˜ถ๐˜ต ๐˜ข ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ช๐˜ฏ๐˜ถ๐˜ฐ๐˜ถ๐˜ด ๐˜ฎ๐˜ฆ๐˜ข๐˜ด๐˜ถ๐˜ณ๐˜ฆ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต ๐˜ฑ๐˜ณ๐˜ฐ๐˜ค๐˜ฆ๐˜ด๐˜ด ๐˜ณ๐˜ฐ๐˜ฐ๐˜ต๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ ๐˜ฉ๐˜ข๐˜ณ๐˜ฅ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ข๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด. ๐˜›๐˜ฉ๐˜ฆ ๐˜ฃ๐˜ฐ๐˜ฐ๐˜ฌ ๐˜ฉ๐˜ข๐˜ด ๐˜ณ๐˜ฐ๐˜ฃ๐˜ถ๐˜ด๐˜ต ๐˜บ๐˜ฆ๐˜ต ๐˜ข๐˜ฑ๐˜ฑ๐˜ณ๐˜ฐ๐˜ข๐˜ค๐˜ฉ๐˜ข๐˜ฃ๐˜ญ๐˜ฆ ๐˜ฑ๐˜ข๐˜ด๐˜ด๐˜ข๐˜จ๐˜ฆ๐˜ด ๐˜ฐ๐˜ฏ ๐˜ค๐˜ณ๐˜บ๐˜ฑ๐˜ต๐˜ฐ๐˜จ๐˜ณ๐˜ข๐˜ฑ๐˜ฉ๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฅ๐˜ฆ๐˜ด๐˜ช๐˜จ๐˜ฏ ๐˜ต๐˜ณ๐˜ข๐˜ฅ๐˜ฆ-๐˜ฐ๐˜ง๐˜ง๐˜ด, ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ค๐˜ข๐˜ด๐˜ฆ ๐˜ด๐˜ต๐˜ถ๐˜ฅ๐˜ช๐˜ฆ๐˜ด...

03.03.2026 14:09 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon's Review of Engineering Secure Devices

CyberCanon's Review of Engineering Secure Devices

๐Ÿข ๐—Ÿ๐—ฎ๐˜๐—ฒ๐˜€๐˜ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—ต๐—ฎ๐˜€ ๐—ฏ๐—ฒ๐—ฒ๐—ป ๐—ฑ๐—ฟ๐—ผ๐—ฝ๐—ฝ๐—ฒ๐—ฑ! ๐Ÿ‘‡

This week, Jose Miguel Parrella evaluates an embedded security book, ๐™€๐™ฃ๐™œ๐™ž๐™ฃ๐™š๐™š๐™ง๐™ž๐™ฃ๐™œ ๐™Ž๐™š๐™˜๐™ช๐™ง๐™š ๐˜ฟ๐™š๐™ซ๐™ž๐™˜๐™š๐™จ by Dominik Merli...

๐Ÿ“ Check out Jose's full review: cybercanon.org/engineering-...

#CybersecurityBooks #EmbeddedSecurity | @bureado.bsky.social

03.03.2026 14:09 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
CyberCanon's February Reviews

CyberCanon's February Reviews

It's already March, but did you catch all of our February Reviews?

๐Ÿข The Nvidia Way: cybercanon.org/the-nvidia-w...
๐Ÿช– Chip War: cybercanon.org/chip-war-the...
๐Ÿงฑ CISO Guide to Cyber Resilience: cybercanon.org/a-ciso-guide...
๐Ÿซ CyBOK: cybercanon.org/cybok-the-cy...

#CybersecurityBooks

02.03.2026 13:45 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

"๐˜–๐˜ฏ๐˜ฆ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜จ๐˜ณ๐˜ฆ๐˜ข๐˜ต๐˜ฆ๐˜ด๐˜ต ๐˜ด๐˜ต๐˜ณ๐˜ฆ๐˜ฏ๐˜จ๐˜ต๐˜ฉ๐˜ด ๐˜ฐ๐˜ง ๐˜Š๐˜บ๐˜‰๐˜–๐˜’ ๐˜ช๐˜ด ๐˜ช๐˜ต๐˜ด ๐˜ถ๐˜ฏ๐˜ช๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ข๐˜ญ ๐˜ข๐˜ฑ๐˜ฑ๐˜ญ๐˜ช๐˜ค๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ. ๐˜๐˜ต ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ฆ๐˜ด ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ช๐˜ฏ๐˜จ ๐˜ค๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ง๐˜ฆ๐˜ด๐˜ด๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ๐˜ด ๐˜ข๐˜ด ๐˜ข ๐˜ง๐˜ฐ๐˜ถ๐˜ฏ๐˜ฅ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ ๐˜ณ๐˜ฆ๐˜ด๐˜ฐ๐˜ถ๐˜ณ๐˜ค๐˜ฆ ๐˜ง๐˜ฐ๐˜ณ ๐˜ฃ๐˜ณ๐˜ฐ๐˜ข๐˜ฅ๐˜ฆ๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ฐ๐˜ณ ๐˜ณ๐˜ฆ๐˜ง๐˜ณ๐˜ฆ๐˜ด๐˜ฉ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฉ๐˜ฆ๐˜ช๐˜ณ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ต๐˜ช๐˜ด๐˜ฆ, ๐˜ธ๐˜ฉ๐˜ช๐˜ญ๐˜ฆ ๐˜ฆ๐˜ฎ๐˜ฑ๐˜ฐ๐˜ธ๐˜ฆ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜ฃ๐˜ถ๐˜ด๐˜ช๐˜ฏ๐˜ฆ๐˜ด๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜น๐˜ฆ๐˜ค๐˜ถ๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ข๐˜ถ๐˜ฅ๐˜ช๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ฆ๐˜น๐˜ต๐˜ถ๐˜ข๐˜ญ..."
#CyberCanonHallofFameCandidiate

24.02.2026 14:03 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon's Review of CyBOK

CyberCanon's Review of CyBOK

๐Ÿ“ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—œ๐—ป๐—ฐ๐—ผ๐—บ๐—ถ๐—ป๐—ด!

This week, Jeff Sauntry provides a Hall of Fame Recommendation for ๐—–๐˜†๐—•๐—ข๐—ž (Cyber Security Body of Knowledge), a free community-driven resource.

โœ๏ธ Jeff's assessment of #๐—–๐˜†๐—•๐—ข๐—ž: cybercanon.org/cybok-the-cy...
๐Ÿซ Visit ๐—–๐˜†๐—•๐—ข๐—ž and download the PDF: www.cybok.org

@cybok.bsky.social

24.02.2026 14:03 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
CyberCanon Newsletter

CyberCanon Newsletter

๐Ÿ—ž๏ธ ๐—™๐—ฒ๐—ฏ๐—ฟ๐˜‚๐—ฎ๐—ฟ๐˜† ๐—ก๐—ฒ๐˜„๐˜€๐—น๐—ฒ๐˜๐˜๐—ฒ๐—ฟ ๐—ถ๐˜€ ๐—ต๐—ฒ๐—ฟ๐—ฒ! ๐Ÿ—ž๏ธ

This edition includes a variety of topics from building on a recent review, a Hall of Fame book highlight, #RSAC, and more...

๐Ÿ‘‰ cybercanon.substack.com/p/the-cyberc...

#CybersecurityBooks #CyberCanonHallofFame

19.02.2026 19:50 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
CyberCanon's review of A CISO Guide to Resilience

CyberCanon's review of A CISO Guide to Resilience

๐Ÿ›ก๏ธ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜†'๐˜€ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„! ๐Ÿงฑ

This week, our #CyberCanon Committee provides you with Debra Baker's ๐˜ผ ๐˜พ๐™„๐™Ž๐™Š ๐™‚๐™ช๐™ž๐™™๐™š ๐™ฉ๐™ค ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™๐™š๐™จ๐™ž๐™ก๐™ž๐™š๐™ฃ๐™˜๐™š.

Read Jack Freund, Ph.D.'s assessment ๐Ÿ‘‰ lnkd.in/ezhBCVAs

#CybersecurityBooks #CISO #CyberResilience

17.02.2026 18:56 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

โ€ฆ
Seems like we have a couple more books to add to our review queue. ๐Ÿ“š

Very well run day by BIll Bowman, CISSP, CIPM, and the ISC2 Eastern Massachusetts Chapter and (ISC)2 Southern Connecticut Chapter!

#CybersecurityBooks

14.02.2026 18:40 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CPE at the Sun event shirt with the books, Hacking APIs and FAIK

CPE at the Sun event shirt with the books, Hacking APIs and FAIK

We enjoyed the โ€˜CPE at the Sunโ€™ ISC2 event Friday.

Two speakers were also authors; Canon Hall to Fame author, @perrycarpenter.bsky.social, and Corey Ball.

The first 100 attendees received Perryโ€™s most recent book, โ€˜FAIKโ€™.

Coreyโ€™s โ€˜Hacking APIsโ€™ was a โ€˜22 SANS Difference Maker award winner.
โ€ฆ

14.02.2026 18:40 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Our cross platform tagging skills need work: @haxorthematrix.bsky.social

10.02.2026 18:19 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

๐Ÿ›๏ธ Reminder: Our review pages contain links to purchase via Amazon or your local bookstore via Bookshop(dot)org. Doing so supports the #CyberCanon, a 100% volunteer-run nonprofit. ๐Ÿ™

10.02.2026 14:11 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

โ€œChip War belongs on your shelf, right next to Countdown to Zero Day and Sandworm. It doesnโ€™t just explain the problem; it helps us understand how we got here. And if we want any chance of getting out with our tech stacks (and our values) intact, this is a book we need to read." -Larry Pesce

10.02.2026 14:11 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
CyberCanon's review of Chip War

CyberCanon's review of Chip War

โœ๏ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ๐—ฝ๐—ฒ๐—ฑ ๐Ÿช–

We have back-to-back reviews from Larry Pesce. Today, Larry offers his insights on Chris Miller's widely well-regarded book, ๐˜พ๐™๐™ž๐™ฅ ๐™’๐™–๐™ง, from a cyber pro's perspective:

๐Ÿ“ You'll want to read this review cybercanon.org/chip-war-the...

#CybersecurityBooks | @haxorthematrix

10.02.2026 14:11 ๐Ÿ‘ 3 ๐Ÿ” 3 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0
CybeCanon Reviews for January

CybeCanon Reviews for January

๐Ÿ—“๏ธ ๐—๐—ฎ๐—ป๐˜‚๐—ฎ๐—ฟ๐˜† ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—ฅ๐—ฒ๐—ฐ๐—ฎ๐—ฝ ๐Ÿ“–

We're well into February, but we like to provide monthly review recaps in case you've missed any of our recent reviews. Check out our January reviews...

๐Ÿ’ต ๐™๐™ž๐™ฃ๐™จ๐™š๐™™
๐Ÿชผ ๐˜ฟ๐™š๐™š๐™ฅ ๐˜ฟ๐™ž๐™ซ๐™š
๐Ÿ“ฆ ๐™Ž๐™š๐™ข๐™–๐™ฃ๐™ฉ๐™ž๐™˜ ๐™ˆ๐™ค๐™™๐™š๐™ก๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ฟ๐™–๐™ฉ๐™–
๐Ÿง ๐™ƒ๐™ช๐™ข๐™–๐™ฃ-๐˜พ๐™š๐™ฃ๐™ฉ๐™š๐™ง๐™š๐™™ ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ

๐Ÿ‘‰ lnkd.in/e6B5tp5J

#CybersecurityBooks

09.02.2026 14:53 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon Newsletter

CyberCanon Newsletter

๐Ÿ“ฐ Did you check out our latest Newsletter?

This one covers #OSINT, a classic #CISO HoFamer, and more...

๐Ÿ‘‰ cybercanon.substack.com/p/the-cyberc...

#CybersecurityBooks #CyberCanonHallofFame

05.02.2026 13:45 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

From Larry's review:
"๐˜‘๐˜ถ๐˜ด๐˜ต ๐˜ฃ๐˜ฆ๐˜ค๐˜ข๐˜ถ๐˜ด๐˜ฆ ๐˜ข ๐˜ฃ๐˜ฐ๐˜ฐ๐˜ฌ ๐˜ช๐˜ด๐˜ฏโ€™๐˜ต ๐˜ข๐˜ฃ๐˜ฐ๐˜ถ๐˜ต ๐˜ค๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฅ๐˜ฐ๐˜ฆ๐˜ด๐˜ฏโ€™๐˜ต ๐˜ฎ๐˜ฆ๐˜ข๐˜ฏ ๐˜ช๐˜ต ๐˜ช๐˜ด๐˜ฏโ€™๐˜ต ๐˜ง๐˜ฐ๐˜ณ ๐˜ค๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ง๐˜ฆ๐˜ด๐˜ด๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ๐˜ด.[..] ๐˜ช๐˜ด ๐˜ฏ๐˜ฐ๐˜ต ๐˜ข ๐˜ฅ๐˜ณ๐˜บ ๐˜ง๐˜ช๐˜ฏ๐˜ข๐˜ฏ๐˜ค๐˜ช๐˜ข๐˜ญ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ช๐˜ด ๐˜ฐ๐˜ณ ๐˜ข๐˜ฏ ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ฉ๐˜บ๐˜ฑ๐˜ฆ๐˜ฅ ๐˜—๐˜™ ๐˜ฑ๐˜ถ๐˜ง๐˜ง ๐˜ฑ๐˜ช๐˜ฆ๐˜ค๐˜ฆ. ๐˜๐˜ตโ€™๐˜ด ๐˜ข ๐˜ฅ๐˜ฆ๐˜ฆ๐˜ฑ๐˜ญ๐˜บ ๐˜ณ๐˜ฆ๐˜ด๐˜ฆ๐˜ข๐˜ณ๐˜ค๐˜ฉ๐˜ฆ๐˜ฅ, ๐˜ฆ๐˜ฏ๐˜จ๐˜ข๐˜จ๐˜ช๐˜ฏ๐˜จ๐˜ญ๐˜บ ๐˜ธ๐˜ณ๐˜ช๐˜ต๐˜ต๐˜ฆ๐˜ฏ ๐˜ค๐˜ฉ๐˜ณ๐˜ฐ๐˜ฏ๐˜ช๐˜ค๐˜ญ๐˜ฆ ๐˜ฐ๐˜ง ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ณ๐˜ช๐˜ด๐˜ฌ-๐˜ต๐˜ข๐˜ฌ๐˜ช๐˜ฏ๐˜จ, ๐˜ท๐˜ช๐˜ด๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ณ๐˜บ ๐˜ญ๐˜ฆ๐˜ข๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ฉ๐˜ช๐˜ฑ..."

03.02.2026 15:40 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon's Review of The Nvidia Way

CyberCanon's Review of The Nvidia Way

โœ๏ธ ๐—Ÿ๐—ฎ๐˜๐—ฒ๐˜€๐˜ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„!

Read Larry Pesce's full review of Tae Kim's ๐™๐™๐™š ๐™‰๐™ซ๐™ž๐™™๐™ž๐™– ๐™’๐™–๐™ฎ ๐Ÿ‘‰ cybercanon.org/the-nvidia-w...

If interested, you can snag a copy and support the Canon using the Amazon or Bookshop links on our review page above.

@haxorthematrix | @firstadopter

#CybersecurityBooks

03.02.2026 15:40 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Ben Rothke's RSAC2026 blog screenshot

Ben Rothke's RSAC2026 blog screenshot

๐ŸŒ‰ ๐—”๐˜๐˜๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ฅ๐—ฆ๐—”๐—–?

Take a look at long-time Canon Committee Member Ben Rothke's #RSAC2026 attendee guide, which includes a section on CyberCanon's presence.

๐Ÿ‘‰ brothke.medium.com/making-the-m...

benrothke.bsky.social

02.02.2026 14:25 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
How I Rob Banks (And Other Such Places) - CyberCanon โ€œHow I Rob Banks: And Other Such Placesโ€ is an entertaining collection of real-world security exploits from professional penetration tester Freaky Clown.

...

๐™ƒ๐™ค๐™ฌ ๐™„ ๐™๐™ค๐™— ๐˜ฝ๐™–๐™ฃ๐™ ๐™จ: tinyurl.com/58m6becn
๐™๐™๐™š ๐™‡๐™–๐™ฃ๐™œ๐™ช๐™–๐™œ๐™š ๐™ค๐™› ๐˜ฟ๐™š๐™˜๐™š๐™ฅ๐™ฉ๐™ž๐™ค๐™ฃ: tinyurl.com/3cmx5x7w

01.02.2026 14:00 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Cybersecurity Humble Bundle

Cybersecurity Humble Bundle

Heads up - only days remain for this great Humble Bundle ๐Ÿ‘‰https://tinyurl.com/28fv6by6

Five are in our library:

๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™€๐™ฃ๐™œ๐™ž๐™ฃ๐™š๐™š๐™ง๐™ž๐™ฃ๐™œ: tinyurl.com/3s65b927
๐™Ž๐™š๐™˜๐™ง๐™š๐™ฉ๐™จ ๐™–๐™ฃ๐™™ ๐™‡๐™ž๐™š๐™จ: tinyurl.com/4uwcv227
๐™๐™ž๐™—๐™š ๐™ค๐™› ๐™ƒ๐™–๐™˜๐™ ๐™š๐™ง๐™จ: tinyurl.com/558pytxj
(cont'd...)

01.02.2026 14:00 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

...
"๐˜๐˜ข๐˜ท๐˜ช๐˜ฏ๐˜จ ๐˜ด๐˜ฑ๐˜ฆ๐˜ฏ๐˜ต ๐˜ฅ๐˜ฆ๐˜ค๐˜ข๐˜ฅ๐˜ฆ๐˜ด ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด ๐˜ข๐˜ค๐˜ณ๐˜ฐ๐˜ด๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฅ๐˜ฆ๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ฆ ๐˜ช๐˜ฏ๐˜ฅ๐˜ถ๐˜ด๐˜ต๐˜ณ๐˜ช๐˜ข๐˜ญ ๐˜ฃ๐˜ข๐˜ด๐˜ฆ, ๐˜โ€™๐˜ท๐˜ฆ ๐˜ด๐˜ฆ๐˜ฆ๐˜ฏ ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต๐˜ฉ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ณ๐˜ฐ๐˜ญ๐˜ด ๐˜ง๐˜ข๐˜ช๐˜ญ ๐˜ธ๐˜ฉ๐˜ฆ๐˜ฏ ๐˜ฉ๐˜ถ๐˜ฎ๐˜ข๐˜ฏ๐˜ด ๐˜ข๐˜ณ๐˜ฆ ๐˜ง๐˜ฐ๐˜ณ๐˜ค๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜ง๐˜ญ๐˜ข๐˜ธ๐˜ฆ๐˜ฅ ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ง๐˜ญ๐˜ฐ๐˜ธ๐˜ด. ๐˜๐˜ฆ๐˜ช๐˜ฅ๐˜ช ๐˜›๐˜ณ๐˜ฐ๐˜ด๐˜ตโ€™๐˜ด ๐˜๐˜ถ๐˜ฎ๐˜ข๐˜ฏ-๐˜Š๐˜ฆ๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ฆ๐˜ฅ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ป๐˜ฆ๐˜ณ๐˜ฐ๐˜ฆ๐˜ด ๐˜ช๐˜ฏ ๐˜ฐ๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฅ๐˜ช๐˜ด๐˜ค๐˜ฐ๐˜ฏ๐˜ฏ๐˜ฆ๐˜ค๐˜ต ๐˜ฃ๐˜ฆ๐˜ต๐˜ธ๐˜ฆ๐˜ฆ๐˜ฏ ๐˜ค๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฑ๐˜ฐ๐˜ญ๐˜ช๐˜ค๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฉ๐˜ถ๐˜ฎ๐˜ข๐˜ฏ ๐˜ฃ๐˜ฆ๐˜ฉ๐˜ข๐˜ท๐˜ช๐˜ฐ๐˜ณ."

27.01.2026 14:01 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon's Review of Human-Centered Security

CyberCanon's Review of Human-Centered Security

๐Ÿ“– ๐—ก๐—ฒ๐˜„ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†! ๐Ÿง

This week, we look at Heidi Trost's ๐™ƒ๐™ช๐™ข๐™–๐™ฃ-๐˜พ๐™š๐™ฃ๐™ฉ๐™š๐™ง๐™š๐™™ ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ.

๐Ÿ“ Check out Dr. Georgianna Shea's review cybercanon.org/human-center...

๐Ÿ›๏ธ Purchase and support the CyberCanon:
Bookshop: bookshop.org/a/119420/978...
Amazon: amzn.to/4r62EUY

#CybersecurityBooks
...

27.01.2026 14:01 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Support the CyberCanon

Support the CyberCanon

We are a decade-old all-volunteer nonprofit seeking to be the cybersecurity professional's first source for curated, timeless, and must-consume wisdom.

If you like what we are trying to do, there are many ways to support us.

See our web page for more details ๐Ÿ‘‰ cybercanon.org

Thank you!

23.01.2026 19:04 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon is on YouTube

CyberCanon is on YouTube

๐—ง๐—ต๐—ฒ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ฎ๐—ป๐—ผ๐—ป ๐—ถ๐˜€ ๐—ผ๐—ป ๐—ฌ๐—ผ๐˜‚๐—ง๐˜‚๐—ฏ๐—ฒ! ๐Ÿ“บ

๐Ÿ‘‰ Please view and subscribe: www.youtube.com/@CyberCanonC...

You'll find:
๐ŸŽฌ Our first 'Short' video by our volunteer YouTube lead, Jason Warner
๐Ÿ“ผ Playlist: Author Content
๐ŸŽฅ Playlist: CyberCanon Conversations

And a lot more to come...

22.01.2026 14:48 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

"...๐˜ธ๐˜ฉ๐˜ข๐˜ต ๐˜ช๐˜ด ๐˜ฎ๐˜ช๐˜ด๐˜ด๐˜ช๐˜ฏ๐˜จ ๐˜ช๐˜ด ๐˜ข ๐˜ค๐˜ญ๐˜ฆ๐˜ข๐˜ณ ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฃ๐˜ถ๐˜ด๐˜ช๐˜ฏ๐˜ฆ๐˜ด๐˜ด ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ฆ๐˜น๐˜ต ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง ๐˜ต๐˜ณ๐˜ถ๐˜ด๐˜ต๐˜ฆ๐˜ฅ & ๐˜ถ๐˜ฏ๐˜ต๐˜ณ๐˜ถ๐˜ด๐˜ต๐˜ฆ๐˜ฅ ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ต๐˜ฉ๐˜ฐ๐˜ด๐˜ฆ ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ต๐˜ด. โ€œ๐˜š๐˜ฆ๐˜ฎ๐˜ข๐˜ฏ๐˜ต๐˜ช๐˜ค ๐˜”๐˜ฐ๐˜ฅ๐˜ฆ๐˜ญ๐˜ช๐˜ฏ๐˜จโ€ ๐˜ช๐˜ญ๐˜ญ๐˜ถ๐˜ฎ๐˜ช๐˜ฏ๐˜ข๐˜ต๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ๐˜ด๐˜ฆ ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ข๐˜ต ๐˜ด๐˜ค๐˜ข๐˜ญ๐˜ฆ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ข๐˜ฑ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฑ๐˜ณ๐˜ช๐˜ข๐˜ต๐˜ฆ ๐˜ณ๐˜ช๐˜จ๐˜ฐ๐˜ณ, ๐˜ฆ๐˜ฏ๐˜ข๐˜ฃ๐˜ญ๐˜ช๐˜ฏ๐˜จ ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜บ ๐˜ฐ๐˜ณ๐˜จ ๐˜ต๐˜ฐ ๐˜ฆ๐˜ด๐˜ค๐˜ข๐˜ฑ๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฃ๐˜ฐ๐˜ถ๐˜ฏ๐˜ฅs..."

20.01.2026 14:01 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon's Review of Semantic Modeling for Data

CyberCanon's Review of Semantic Modeling for Data

๐Ÿ“ฆ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐—–๐—ฎ๐—ป๐—ผ๐—ป ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ โœจ

Jeff Sauntry provides insight on Panos Alexopoulos' ๐™Ž๐™š๐™ข๐™–๐™ฃ๐™ฉ๐™ž๐™˜ ๐™ˆ๐™ค๐™™๐™š๐™ก๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ฟ๐™–๐™ฉ๐™–: ๐˜ผ๐™ซ๐™ค๐™ž๐™™๐™ž๐™ฃ๐™œ ๐™‹๐™ž๐™ฉ๐™›๐™–๐™ก๐™ก๐™จ ๐™–๐™ฃ๐™™ ๐˜ฝ๐™ง๐™š๐™–๐™ ๐™ž๐™ฃ๐™œ ๐˜ฟ๐™ž๐™ก๐™š๐™ข๐™ข๐™–๐™จ...

๐Ÿ“ Jeff's Review โ†’ tinyurl.com/22tsd2wn
๐Ÿ›๏ธ Amazon affiliate purchase link โ†’ amzn.to/4pQwEmL

#CybersecurityBooks #DataGovernance #CyberRisk
...

20.01.2026 14:01 ๐Ÿ‘ 3 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Spam Nation - CyberCanon Inย Spam Nation, Brian Krebs covers a key portion of our cybersecurity and cyber crime history: 2007โ€“2013, that period when we started to learn about the

...
๐™Ž๐™ฅ๐™–๐™ข ๐™‰๐™–๐™ฉ๐™ž๐™ค๐™ฃ - the economics of stolen data (by Brian Krebs)
๐Ÿ“ Review: tinyurl.com/34kjr2bj
๐Ÿ›๏ธ Affiliate link: amzn.to/4o0m5wz

๐™†๐™ž๐™ฃ๐™œ๐™ฅ๐™ž๐™ฃ - how cybercrime gets monetized (by Kevin Poulsen)
๐Ÿ“ Review: tinyurl.com/4j6b8b8y
๐Ÿ›๏ธ Affiliate link: amzn.to/4nWQCv4

#CybersecurityHistory #CybersecurityBooks

17.01.2026 18:33 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Today in Cybersecurity History - January 17, 2019 - Collection #1

Today in Cybersecurity History - January 17, 2019 - Collection #1

๐Ÿ“œ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜† | ๐Ÿญ-๐Ÿญ๐Ÿณ-๐Ÿฎ๐Ÿฌ๐Ÿญ๐Ÿต

7 yrs ago, @troyhunt.com disclosed Collection#1, one of the largest known aggregations of breached creds at the time.

Troy's original blog: tinyurl.com/5f8p4jwn

For deeper context on why this happens, see 2 #CyberCanonHoF books published yrs prior...

17.01.2026 18:33 ๐Ÿ‘ 2 ๐Ÿ” 3 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
CyberCanon 2026 Welcome to our first newsletter of 2026!

...
Some highlights:
๐Ÿ”นNew website launched in May
๐Ÿ”น29 new book reviews published
๐Ÿ”นExpanded leadership, volunteers, and committee
๐Ÿ”น7X growth in social media engagement with improved content
๐Ÿ”นNewsletter launched in June - 700 subscribers and growing

#CybersecurityBooks #Newsletter #Volunteers

15.01.2026 18:31 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0