TOOLS FOR ANONYMITY
Oracle Virtualbox - Free Virtual Machine Platform
Oracle VMWare Player- Free Non-Commercial Virtual Platform
WHONIX Virtual Anonymity Platform
THREAT INTELLIGENCE RESOURCES AND DEFENSE STRATEGIES
Metamorphic and Polymorphic Malware - uses and defenses...
Another AT&T Security Breach... Time to Opt Out of Sharing Your Cellular Info With Provider
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Vast Portal to Container and Operational Security Throughout Development and Deployment Lifecycles
The Pegasus Project: The Guardian and Washington Post Surveilling Israeli Surveillance Malware
Beating Ransomware With Advanced Backup and Data Defense Technologies
Wazuh: Free Open Source Data and Network Protection Software
Google SRE Secure Systems Methodology White Paper
Protect Your Wordpress Site from SQL Injection!
Mandiant's annual "M-Trends" report: Insights into Top Cyber Trends and Attacks
Review of Active APT (Advanced Persistent Threat) Groups Worldwide by Mandiant Group
Thorough Overview of Dark Web Legal and Criminal Implications
Tripwire Explains: Defense Against Common Phishing Attacks
Beginner's Guide to Understanding BGP - Border Gateway Protocol
Definitive Guide to Cyber Threat Intelligence
Skynet, a Tor-powered botnet straight from Reddit
2020 Cyber THreat Intelligence Report from Digital Shadows
Separation and Cloud Security Modeling Guidance from NCSC
How to Keep Your Healthcare Organization Safe
Connecting OT to the Wider Net Can Lead to "Indefensible Levels of Risk"
Risk Quantum Computing Poses to Universal Authentication Protocols
How A Responsible Vulnerability Researcher takes on Sonic Wall: CVE-2020-5135
5 Ways to Take Action on Threat Intelligence
Cloud Security Overview from Team at tripwire.com
DUO Zero Trust Platform Support from CISCO
All Cybersecurity and Infrastructure Security Agency (NSA/HS Spinoff) Advisory Publications
All the Ways Your Wi-Fi Router Can Spy on You
Bad Actors Exposed: Extremely Detailed Realtime Real-World Threat Vector Procedural Enumeration
Free Port Security Scanner (and MUCH MUCH More!)
Surveillance Self-Defense from Electronic Frontier Foundation
Official Debian Hardening (Securing) Manual
10 Immutable Laws of Security... heh...
What Microsoft IS good for... lol
Cryptography-Understanding Zero Knowledge Proof Systems
Queryable Malware Analysis Database - VirusTotal
(Breaking: In Depth) Help/News for All You Microsoft Platform Victims Out There... lol
Protecting Personally Identifiable Information
Distinguishing Real Access Points from Evil Twins
Breaking the Kill Chain... pdf White Paper
End to End Email Encryption with Signal - android/pc
Vectra AI Driven Threat Response
Online Password Checking and Cracking