cyber-security-resources/who-and-what-to-follow/README.md

117 lines
6.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Blogs, YouTube Channels, Twitch Streamers, and Podcasts
## Cyber Security Blogs to Follow
(sorted alphabetically)
- [Ars Technica ](https://arstechnica.com)
- [Bruce Schneier's Blog](https://www.schneier.com)
- [CIO](https://www.cio.com/category/security)
- [Cisco Security Blog](https://blogs.cisco.com/security)
- [CSO Online ](https://www.csoonline.com)
- [Cyber Defense Magazine ](https://www.cyberdefensemagazine.com/)
- [cyberscoop ](https://www.cyberscoop.com/)
- [Darknet ](https://www.darknet.org.uk/)
- [Dark Reading ](http://www.darkreading.com/)
- [Data Breaches ](https://www.databreaches.net/)
- [Decipher ](https://duo.com/decipher/)
- [Didier Stevens Blog ](https://blog.didierstevens.com/)
- [Epic ](https://epic.org/)
- [Errata Security ](https://blog.erratasec.com/)
- [Exploit Databse ](https://www.exploit-db.com/)
- [F-Secure Safe & Savvy Blog ](http://safeandsavvy.f-secure.com)
- [FireEye Blog ](https://www.fireeye.com/blog.html)
- [Fox IT Security Blog ](http://blog.fox-it.com)
- [Google Online Security Blog ](https://googleonlinesecurity.blogspot.ro)
- [Graham Cluley ](https://www.grahamcluley.com)
- [Hack Read ](https://www.hackread.com/)
- [Heimdal Security Blog ](https://heimdalsecurity.com/blog/)
- [Help Net Security ](https://www.net-security.org)
- [Information Security Buzz ](https://www.informationsecuritybuzz.com/)
- [InfoSecurity Magazine ](http://www.infosecurity-magazine.com)
- [Kaspersky Labs Securelist ](https://securelist.com)
- [Kaspersky Labs ThreatPost ](https://threatpost.com)
- [KnowBe4 Blog ](https://blog.knowbe4.com/)
- [Krebs on Security](https://krebsonsecurity.com)
- [Malware Must Die](https://blog.malwaremustdie.org)
- [Malwarebytes Labs ](https://blog.malwarebytes.org)
- [Mashable ](http://mashable.com/category/cybersecurity)
- [McAfee security blog ](http://blogs.mcafee.com)
- [Microsoft Malware Protection Center ](http://blogs.technet.com/b/mmpc)
- [Motherboard Vice ](http://motherboard.vice.com/en_us)
- [Naked Security ](https://nakedsecurity.sophos.com)
- [OpenDNS (Cisco Umbrella) Blog ](https://blog.opendns.com)
- [OWASP -Not a blog, but a must - ](https://www.owasp.org)
- [Packet Storm Security ](https://packetstormsecurity.com/)
- [Pauls Security Weekly ](http://securityweekly.com)
- [PCMags Security Watch ](http://securitywatch.pcmag.com)
- [Peerlyst ](https://www.peerlyst.com)
- [Phish Labs Blog ](https://info.phishlabs.com/blog/)
- [SANS Blogs ](https://www.sans.org/security-resources/blogs)
- [SC Magazine ](https://www.scmagazine.com)
- [Security Affairs ](https://securityaffairs.co/wordpress/)
- [Security Magazine ](https://www.securitymagazine.com/)
- [Security Week ](https://www.securityweek.com/)
- [Softpedia ](https://www.softpedia.com/)
- [Spiceworks Security ](https://community.spiceworks.com/security/general/)
- [SpiderLabs Security Blog ](https://www.trustwave.com/Resources/SpiderLabs-Blog)
- [TALOS](https://www.talosintelligence.com/)
- [Tao Security ](https://taosecurity.blogspot.com)
- [Techcrunch ](https://techcrunch.com/tag/security)
- [TechTarget Security ](http://searchsecurity.techtarget.com/)
- [Techworld Security ](http://www.techworld.com/security)
- [The Art of Hacking courses GitHub repository ](https://github.com/The-Art-of-Hacking/art-of-hacking)
- [The Guardian Information Security Hub ](https://www.theguardian.com/technology/data-computer-security)
- [The Hacker News ](http://thehackernews.com)
- [The Register ](http://www.theregister.co.uk)
- [ThreatPost](https://threatpost.com)
- [ThreatWire ](http://www.threatwire.net/)
- [TrendMicro Blog ](https://blog.trendmicro.com/trendlabs-security-intelligence/)
- [Tripwire Blog ](https://www.tripwire.com/state-of-security/)
- [Troy Hunt ](https://www.troyhunt.com)
- [US-CERT ](https://www.us-cert.gov)
- [Webroot Blog ](https://www.webroot.com/blog/)
- [Wired Threat Level ](http://www.wired.com/category/threatlevel )
- [Zero Day ](http://www.zdnet.com/blog/security)
## YouTube
- [AppSec Village](https://www.youtube.com/c/appsecvillage)
- [BlackHills InfoSec](https://www.youtube.com/channel/UCJ2U9Dq9NckqHMbcUupgF0A)
- [DEF CON](https://www.youtube.com/channel/UC6Om9kAkl32dWlDSNlDS9Iw)
- [HackerSploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q)
- [Jason Haddix](https://www.twitch.tv/nahamsec)
- [John Hammond](https://www.youtube.com/user/RootOfTheNull)
- [LiveOverFlow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)
- [NullByte](https://www.youtube.com/channel/UCgTNupxATBfWmfehv21ym-g)
- [Red Team Village](https://www.youtube.com/redteamvillage)
- [Security Weekly](https://www.youtube.com/user/SecurityWeeklyTV)
- [STÖK](https://www.youtube.com/channel/UCQN2DsjnYH60SFBIA6IkNwg)
- [The Art of Hacking](https://www.youtube.com/theartofhacking)
- [The Cyber Mentor](https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw)
## Twitch
- [Red Team Village](https://twitch.tv/redteamvillage)
- [Nahamsec](https://www.twitch.tv/nahamsec)
- [Blue Team Village](https://www.twitch.tv/blueteamvillage)
- [IoT Village](https://www.twitch.tv/iotvillage)
- [BugCrowd](https://www.twitch.tv/bugcrowd)
- [HackerOne](https://www.twitch.tv/hackeronetv)
- [The Cyber Mentor](https://www.twitch.tv/thecybermentor)
## Podcasts
- [DarkNet Diaries](https://darknetdiaries.com/)
- [Security Weekly](https://securityweekly.com/)
- [Risky Business](https://risky.biz/netcasts/risky-business/)
- [The Unsupervised Learning Podcast](https://danielmiessler.com/podcast/#gs.=RDc3aY)
- [Down the Security Rabbithole](http://podcast.wh1t3rabbit.net/)
- [Smashing Security](https://www.smashingsecurity.com/)
- [The Cyberwire](https://thecyberwire.com/)
- [The CyberJungle](http://www.thecyberjungle.com/)
- [Beer with Talos](https://talosintelligence.com/podcasts/shows/beers_with_talos)
- [Talos Takes](https://talosintelligence.com/podcasts/shows/talos_takes)
- [Open Source Security Podcast](https://opensourcesecurity.io/category/podcast/)
- [Crypto-Gram Security Podcast](http://crypto-gram.libsyn.com/)
- [The Privacy, Security and OSINT Show](https://inteltechniques.com/podcast.html)