Site Map
Home
About Us
Research Tools
News
HackThePlanet
Dark Web
Cyber Defense
Reference
Sources
Multimedia
Blog
Contact Us
Anonymity & Censorship Circumvention Tools
Qubes
Oracle Virtualbox – Free Virtual Machine Platform
Oracle VMWare Player – Free Non-Commercial Virtual Platform
WHONIX Virtual Anonymity Platform
Tor Browser
Telex – Advanced Censorship Circumvention (White Paper)
Implementing A Tactical Refraction Network Over Low-Footprint Autonomous Infrastructure
Threat Intelligence & Data Sources
Kraven Security – Active Defense and Cyber Deception
The Censys Threat Hunting Solution
Detailed Realtime Real-World Threat Vector Procedural Enumeration (MITRE Groups)
Definitive Guide to Cyber Threat Intelligence
2020 Cyber Threat Intelligence Report from Digital Shadows
Global Scalable Security Solutions (2023 NTT Data GTIR)
Malpedia
Queryable Malware Analysis Database – VirusTotal
Kaspersky SecureList
Cyber Defense Assessment (Mandiant)
Review of Active APT Groups Worldwide (Mandiant M-Trends 2020)
Mandiant – Exposing Top Chinese State-Sponsored APT Groups
Security Frameworks & Best Practices
Core Principles of Zero Trust Architecture
Achieving Zero Trust Security Architectures
Zero Trust Architecture (NIST SP 800-207)
DUO Zero Trust Platform Support from Cisco
Establishing A Strong CyberSecurity Baseline
Debian Hardening Walkthrough
Official Debian Hardening (Securing) Manual
Harden the SSH Access Security on Debian
Linux Babe – Secure SSH Service Using Port Knocking
Protect Your WordPress Site from SQL Injection!
Tripwire Explains: Defense Against Common Phishing Attacks
Protecting Personally Identifiable Information
Breaking the Kill Chain (White Paper)
10 Immutable Laws of Security… heh…
Microsoft Bug Bounty Program
Surveillance Self-Defense – Electronic Frontier Foundation
Cryptography-Understanding Zero Knowledge Proof Systems
Industry News & Analysis
Ransomware-as-a-Service Is Becoming a Structured Business Model
Breaking the Security As Theater Illusion
A Bluetooth-Presence-Sensing USB Security Dongle? Nope.
Evilginx Tool (Still) Bypasses MFA
Rise in Phishing Attacks Fuels Growth in Passwordless Security
Publicly Disclosed ASP.NET Machine Keys Open Webservers to RCE
How “LLMjacking” Operations Obtain Stolen Access to DeepSeek Models
Cultivating the Hacker Mindset in Cybersecurity Defense
Stuxnet: In-Depth Malware Analysis White Paper
Another AT&T Security Breach – Time to Opt Out of Sharing Your Cellular Info
The Pegasus Project: Surveillance Malware Investigation
Beating Ransomware With Advanced Backup and Data Defense Technologies
All the Ways Your Wi-Fi Router Can Spy on You
State-Sponsored Actors Exploiting Publicly Known Vulnerabilities
Thorough Overview of Dark Web Legal and Criminal Implications
Industrial Controller Firmware – Widespread Infrastructure Vulnerability
Skynet, a Tor-Powered Botnet Straight from Reddit