hack,hacker,hacker news,cybersecurity,penetration testing, hackerspace, cyberwar, cybercrime

Border Cyber Group Security Gladiators Maltronics Hacker Gear Crypto Anarchy Wiki Crypto Anarchy Telecomix Corelan Security Bruce Schneir Security Affairs Obey FilFar ippsec hackthebox hackertarget seytonic crypto hudson phrack shevirah georgia skillset eagleeye kodachi tor qubes tryhackme vmware synergetic-web-group kali offensive w3schools github |\|070r|0u5 stackoverflow hackercombat stackexchange speedguide speedguide  




Oracle Virtualbox - Free Virtual Machine Platform

Oracle VMWare Player- Free Non-Commercial Virtual Platform

WHONIX Virtual Anonymity Platform

Tor Browser


Metamorphic and Polymorphic Malware - uses and defenses...

Another AT&T Security Breach... Time to Opt Out of Sharing Your Cellular Info With Provider

How Machine Learning, AI & Deep Learning Improve Cybersecurity

Vast Portal to Container and Operational Security Throughout Development and Deployment Lifecycles

The Pegasus Project: The Guardian and Washington Post Surveilling Israeli Surveillance Malware

Beating Ransomware With Advanced Backup and Data Defense Technologies

Wazuh: Free Open Source Data and Network Protection Software

Google SRE Secure Systems Methodology White Paper

Protect Your Wordpress Site from SQL Injection!

Mandiant's annual "M-Trends" report: Insights into Top Cyber Trends and Attacks

Review of Active APT (Advanced Persistent Threat) Groups Worldwide by Mandiant Group

Thorough Overview of Dark Web Legal and Criminal Implications

Tripwire Explains: Defense Against Common Phishing Attacks

Beginner's Guide to Understanding BGP - Border Gateway Protocol

Definitive Guide to Cyber Threat Intelligence


Kaspersky SecureList

(AGAIN??) Massive Widespread Infrastructure Vulnerability caused by Industrial Controller Firmware Issue

Skynet, a Tor-powered botnet straight from Reddit

2020 Cyber THreat Intelligence Report from Digital Shadows

Separation and Cloud Security Modeling Guidance from NCSC

How to Keep Your Healthcare Organization Safe

Connecting OT to the Wider Net Can Lead to "Indefensible Levels of Risk"

Risk Quantum Computing Poses to Universal Authentication Protocols

How A Responsible Vulnerability Researcher takes on Sonic Wall: CVE-2020-5135

5 Ways to Take Action on Threat Intelligence

Cloud Security Overview from Team at tripwire.com

DUO Zero Trust Platform Support from CISCO

All Cybersecurity and Infrastructure Security Agency (NSA/HS Spinoff) Advisory Publications

State-sponsored actors from Russia and China are leveraging several of the same publicly known vulnerabilities in their attacks, all of which have patches available.

All the Ways Your Wi-Fi Router Can Spy on You

Bad Actors Exposed: Extremely Detailed Realtime Real-World Threat Vector Procedural Enumeration

Zero Trust Architecture

Free Port Security Scanner (and MUCH MUCH More!)

Surveillance Self-Defense from Electronic Frontier Foundation

Official Debian Hardening (Securing) Manual

10 Immutable Laws of Security... heh...

What Microsoft IS good for... lol

SD Card Tamperproofing Issues

Cryptography-Understanding Zero Knowledge Proof Systems

Torsocks vs. Proxychains

Queryable Malware Analysis Database - VirusTotal

(Breaking: In Depth) Help/News for All You Microsoft Platform Victims Out There... lol

Protecting Personally Identifiable Information

Distinguishing Real Access Points from Evil Twins

Breaking the Kill Chain... pdf White Paper

End to End Email Encryption with Signal - android/pc

Vectra AI Driven Threat Response

Debian Hardening Walkthrough

Online Password Checking and Cracking

Secure SSH Service Using Port Knocking

Harden the SSH access security on Debian