hack,hacker,hacker news,cybersecurity,penetration testing, hackerspace, cyberwar, cybercrime

Border Cyber Group Security Gladiators Maltronics Hacker Gear Crypto Anarchy Wiki Crypto Anarchy Telecomix Corelan Security Bruce Schneir Security Affairs Obey FilFar ippsec hackthebox hackertarget seytonic crypto hudson phrack shevirah georgia skillset eagleeye kodachi tor qubes tryhackme vmware synergetic-web-group kali offensive w3schools github |\|070r|0u5 stackoverflow hackercombat stackexchange speedguide speedguide  


The Internet Con - How to Sieze the Means of Computation - Corey Doctorow

Red Team Blues - A Novel - Cory Doctorow

Chokepoint Capitalism - Cory Doctorow

Landmark 2021 Study on Worldwide Scope and Distribution of Phishing Attacks

The Coming AI Hackers by Bruce Schneier

Resilient Botnet Control

Recent Update to:"A Wake-up Call for SATCOM Security"

How to Hack A Satellite: "A Wake-up Call for SATCOM Security"

Review of "Modified Elephant", "Indian Government Sponsored" Anti-Hacktivist APT Group from SentinelOne

Google SRE Secure Systems Methodology White Paper

Deep Analysis of the Cybercrime Landscape

Mitnik: A Study of Social Engineering

How the Effectiveness of Cybersecurity Policies Varies across Cybercrime Types

A Concise But Scholarly Overview of the Dark Web

Advanced Battlespace and CybermaneuverConcepts

MUST Read Kill Chain White Paper from Lockheed Martin

Expanding Combat Power Through Military Cyber Power Theory

Digital Shadows Initial Access Brokers Analysis, 2021

Definitive Guide to Cyber Threat Intelligence

Old Dogs New Tricks:Attackers Adopt Exotic Programming Languages... Report from Blackberry

DoD CyberSecurity Report Summary 2019-2020

Common Knowledge Attacks on Democracy

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News

2017 GAO report on Nuclear Command, Control, and Communications

Department of Defense 2018 U.S. Nuclear Posture Review

Domain Monitoring: Detection, Context and Remediation

European Union's "Data Protection Act 2018" - Cybersecurity Into Law

Initial Access Broker Detailed White Paper from Digital Shadows Team

Free Computer Science E-Books and .pdf File

Super Imperialism The Economic Strategy of American Empire

2019 Summary of DoD Reports Issued

2018 Summary of DoD Reports Issued

Joint Force Theory and Transdimensional Warfare

Fifth Operational Domain USAF White Paper

Listen to Cory Doctorow's HOMELAND Audiobook

Listen to Cory Doctorow's CONTENT Audiobook

Dragos Oil and Gas Threat-Actor Assessment

The Loopix Anonymity System

CISCO's 2018 Executive Security Assessment

Book Review: Kingdom of Lies: Unnerving Adventures in the World of Cybercrime by Kate Fazzini

Check Out Internet Archive Resources

Free Information Technology Book Downloads

Invisible Women: Exposing Data Bias....

The Shadow Factory - James Bamford

Snowden Digital Archive

NATO Cyber Defense Command (CCDOE) Full .pdf Download List

Anonymous: Survival Guide for Citizens in a Revolution

Life 3.0: Being Human in an Age of Artificial Intelligence by Max Tegmark

Click Here to Kill Everybody

Free Cybersecurity Archived Collection

(UPDATED):DoD CyberSecurity Report Summary 2017-2018

Wikileaks Dictionary of Military Terminology