TOOLS FOR ANONYMITY
Oracle Virtualbox - Free Virtual Machine Platform
Oracle VMWare Player- Free Non-Commercial Virtual Platform
WHONIX Virtual Anonymity Platform
THREAT INTELLIGENCE RESOURCES AND DEFENSE STRATEGIES
Thinking Clearly About Communicating AI Risk - Daniel Miessler
Metamorphic and Polymorphic Malware - uses and defenses... Another AT&T Security Breach... Time to Opt Out of Sharing Your Cellular Info With Provider How Machine Learning, AI & Deep Learning Improve Cybersecurity Vast Portal to Container and Operational Security Throughout Development and Deployment Lifecycles The Pegasus Project: The Guardian and Washington Post Surveilling Israeli Surveillance Malware Beating Ransomware With Advanced Backup and Data Defense Technologies Wazuh: Free Open Source Data and Network Protection Software Google SRE Secure Systems Methodology White Paper Protect Your Wordpress Site from SQL Injection! Mandiant's annual "M-Trends" report: Insights into Top Cyber Trends and Attacks Review of Active APT (Advanced Persistent Threat) Groups Worldwide by Mandiant Group Thorough Overview of Dark Web Legal and Criminal Implications Tripwire Explains: Defense Against Common Phishing Attacks Beginner's Guide to Understanding BGP - Border Gateway Protocol Definitive Guide to Cyber Threat Intelligence Skynet, a Tor-powered botnet straight from Reddit 2020 Cyber THreat Intelligence Report from Digital Shadows Separation and Cloud Security Modeling Guidance from NCSC How to Keep Your Healthcare Organization Safe Connecting OT to the Wider Net Can Lead to "Indefensible Levels of Risk" Risk Quantum Computing Poses to Universal Authentication Protocols How A Responsible Vulnerability Researcher takes on Sonic Wall: CVE-2020-5135 5 Ways to Take Action on Threat Intelligence Cloud Security Overview from Team at tripwire.com DUO Zero Trust Platform Support from CISCO All Cybersecurity and Infrastructure Security Agency (NSA/HS Spinoff) Advisory Publications All the Ways Your Wi-Fi Router Can Spy on You Bad Actors Exposed: Extremely Detailed Realtime Real-World Threat Vector Procedural Enumeration Free Port Security Scanner (and MUCH MUCH More!) Surveillance Self-Defense from Electronic Frontier Foundation Official Debian Hardening (Securing) Manual 10 Immutable Laws of Security... heh... What Microsoft IS good for... lol Cryptography-Understanding Zero Knowledge Proof Systems Queryable Malware Analysis Database - VirusTotal (Breaking: In Depth) Help/News for All You Microsoft Platform Victims Out There... lol Protecting Personally Identifiable Information Distinguishing Real Access Points from Evil Twins Breaking the Kill Chain... pdf White Paper End to End Email Encryption with Signal - android/pc Vectra AI Driven Threat Response Online Password Checking and Cracking