hack,hacker,hacker news,cybersecurity, penetration testing, hackerspace, cyberwar, cybercrime
Site Map
Home
About Us
Research Tools
News
Economics
Dark Web
Cyber Defense
Reference
Sources
Multimedia
Contact
Tools For Anonymity
Qubes
Oracle Virtualbox - Free Virtual Machine Platform
Oracle VMWare Player- Free Non-Commercial Virtual Platform
WHONIX Virtual Anonymity Platform
Tor Browser
Threat Intelligence Resources
Stuxnet: In-Depth Malware Analysis White Paper
Cultivating the hacker mindset in cybersecurity defense
Achieving Zero Trust Security Architectures
Debian Hardening Walkthrough
Detailed Realtime Real-World Threat Vector Procedural Enumeration
Thinking Clearly About Communicating AI Risk - Daniel Miessler
Metamorphic and Polymorphic Malware - uses and defenses...
Another AT&T Security Breach... Time to Opt Out of Sharing Your Cellular Info With Provider
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Vast Portal to Container and Operational Security Throughout Development and Deployment Lifecycles
The Pegasus Project: The Guardian and Washington Post Surveilling Israeli Surveillance Malware
Beating Ransomware With Advanced Backup and Data Defense Technologies
Wazuh: Free Open Source Data and Network Protection Software
Site Reliability Engineering at Google
Protect Your Wordpress Site from SQL Injection!
Cyber Defense Assessment from Mandiant
Review of Active APT (Advanced Persistent Threat) Groups Worldwide by Mandiant Group
Mandiant: Exposing Top Chinese State-Sponsored APT Groups
Thorough Overview of Dark Web Legal and Criminal Implications
Tripwire Explains: Defense Against Common Phishing Attacks
Beginner's Guide to Understanding BGP - Border Gateway Protocol
Definitive Guide to Cyber Threat Intelligence
Malpedia
Kaspersky SecureList
Industrial Controller Firmware - Widespread Infrastructure Vulnerability
Skynet, a Tor-powered botnet straight from Reddit
2020 Cyber THreat Intelligence Report from Digital Shadows
Global Scalable Security Solutions
Separation and Cloud Security Modeling Guidance from NCSC
How to Keep Your Healthcare Organization Safe
Connecting OT to the Wider Net Can Lead to "Indefensible Levels of Risk"
Risk Quantum Computing Poses to Universal Authentication Protocols
How A Responsible Vulnerability Researcher takes on Sonic Wall: CVE-2020-5135
5 Ways to Take Action on Threat Intelligence
Cloud Security Overview from Team at tripwire.com
DUO Zero Trust Platform Support from CISCO
CISA - U.S. Cyber Defense Agency
State-sponsored actors from Russia and China are leveraging several of the same publicly known vulnerabilities in their attacks, all of which have patches available.
All the Ways Your Wi-Fi Router Can Spy on You
Surveillance Self-Defense from Electronic Frontier Foundation
Zero Trust Architecture
Official Debian Hardening (Securing) Manual
10 Immutable Laws of Security... heh...
Microsoft Bug Bounty Program
SD Card Tamperproofing Issues
Cryptography-Understanding Zero Knowledge Proof Systems
Torsocks vs. Proxychains
Queryable Malware Analysis Database - VirusTotal
Bleeping Computer - Cyber Security News, Analysis and Education
Protecting Personally Identifiable Information
Distinguishing Real Access Points from Evil Twins
Breaking the Kill Chain... pdf White Paper
End to End Email Encryption with Signal - android/pc
Vectra AI Driven Threat Response
Open Source Security Research and Implementation for Linux
Linux Babe - Secure SSH Service Using Port Knocking
Harden the SSH access security on Debian