Source of the domain task list: (ISC)ยฒ CISSP Exam Outline. [isc2.org]
Domain 2 covers the identification, classification, handling, protection, tracking, and lifecycle management of information and assets. All responsibilities revolve…
Coverage: 1.1โ1.12 in the (ISC)ยฒ outline. [cisa.gov]
1.1 Professional Ethics
What the CISSP expects of you
(ISC)ยฒ Code of Professional Ethics requires you to: protect society and the common good;…
Theme: Cybercrime / Supply Chain / AI-Driven Social Engineering / Exploited Vulnerabilities
Audience: Novice โ Pro ๐ก | Mode: Learn + Play ๐ฎ
๐ Story 1: Zendesk Ticket Systems Hijacked…
Focus: what happened, key technical concepts, what it looks like in real orgs, plus an XP Quest per story ๐ฎ
1) Google Gemini + Calendar Invites โ Indirect Prompt Injection…
๐ Sources
https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html
https://thehackernews.com/2026/01/security-bug-in-stealc-malware-panel.html
The Security Paradox: New Study Reveals 69 Vulnerabilities in AI-Generated Apps
VCs Invest Billions in AI Security to Combat Rogue Agents by…