Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ForbiddenProgrammer/awesome-cybersecurity-news
List of sources for cybersecurity news
https://github.com/ForbiddenProgrammer/awesome-cybersecurity-news
List: awesome-cybersecurity-news
awesome awesome-list blueteaming cyber-security cybersecurity cybersecurity-blog cybersecurity-news news pentesting redteaming
Last synced: 2 months ago
JSON representation
List of sources for cybersecurity news
- Host: GitHub
- URL: https://github.com/ForbiddenProgrammer/awesome-cybersecurity-news
- Owner: ForbiddenProgrammer
- Created: 2020-11-08T19:38:52.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2022-12-16T15:38:54.000Z (about 2 years ago)
- Last Synced: 2024-05-20T00:04:46.377Z (8 months ago)
- Topics: awesome, awesome-list, blueteaming, cyber-security, cybersecurity, cybersecurity-blog, cybersecurity-news, news, pentesting, redteaming
- Homepage:
- Size: 45.9 KB
- Stars: 29
- Watchers: 4
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- project-awesome - ForbiddenProgrammer/awesome-cybersecurity-news - List of sources for cybersecurity news (Others)
- ultimate-awesome - awesome-cybersecurity-news - List of sources for cybersecurity news. (Other Lists / Monkey C Lists)
README
![alt text](https://www.campussafetymagazine.com/wp-content/uploads/2020/03/cybersecurity-2019.jpg)
In the IT industry, especially cybersecurity one, being up to date is key to success.
In this repository, you will find a lot of sources to get fresh cybersecurity news/informations.
No matter if you are regular user, pentester, programmer or cybersecurity expert, you will find something for you.## News websites
[malware.news](https://malware.news/) - Latest malware news and threat information exchange website. It basicly lists news/articles about cybersecurity from
a lot of diffrent sources. (some websites from malware.news you will find in this repository aswell)[bleepingcomputer.com](https://www.bleepingcomputer.com/) - News about cybersecurity, especially: data breaches, malware, and recent ransomware attacks on companies (+ "The Week in Ransomware" series, which sums up latest ransomware attacks). Posts contains nice thumbnails, and content which will also be understood by less technical folks.
[zdnet.com](https://www.zdnet.com/) - Technology news, analysis, comments and product Reviews for IT Professionals.
[thehackernews.com](https://thehackernews.com/) - Infosec source of the latest hacking news, cyber attacks, computer security, and cybersecurity for ethical hackers, penetration testers, and information technology professionals
[difesaesicurezza.com](https://www.difesaesicurezza.com/en/category/cyber-en/) - News and info on defense and security in Italy and around the world, keep yourself informed
*soonTM*
## Blogs
[krebsonsecurity.com](https://krebsonsecurity.com/) - In-depth security news and investigation by Brian Krebs[krabsonsecurity.com](https://krabsonsecurity.com/) - Reverse engineering malware blog.
[hexacorn.com](https://www.hexacorn.com/index.html) - Cybersecurity (especially Windows one)
[vkremez.com](https://www.vkremez.com/) - Reverse engineering blog
[blog.rootshell.be](https://blog.rootshell.be/) - Cybersecurity blog
[modexp.wordpress.com](https://modexp.wordpress.com/) - Random posts about computer security. (a lot of windows injection tricks explained)
[andreafortuna.org](https://www.andreafortuna.org/category/cybersecurity/) - Cybersecurity, forensics
[lab52.io/blog/](https://lab52.io/blog) - APT / special services operations analysis, cybersecurity.
*soonTM*
## Cybersecurity companies blogs
[research.checkpoint.com](https://research.checkpoint.com/) - Cybersecurity threats analysis (technical blog)
[fireeye.com](https://www.fireeye.com/blog.html) - Provides information and insight on advanced cyber attacks, threat research and cyber security issues facing organizations today. Posts contains more technical aspect of threats (for example, showing parts of vulnerable code or showing parts of malware functions)
[proofpoint.com](https://www.proofpoint.com/us/blog) - Blog provides you with advanced cybersecurity intelligence and insights, threat research, and breaking cyber attack news. Get the latest news about advanced threats.
[fortinet.com](https://www.fortinet.com/blog) - Explore the latest cybersecurity trends and innovations, leading edge threat intelligence from FortiGuard Labs, Fortinet executive insights, and customer perspectives
[cybereason.com](https://www.cybereason.com/blog) - Get the latest research, expert insights, and security industry news. Blog contains reviews of newset threats, with attack scheme used by actors, step by step.
[cyberark.com](https://www.cyberark.com/resources/threat-research-blog) - Threat research blog.
[malwarebytes.com](https://blog.malwarebytes.com/) - The security blog from Malwarebytes
[cycrafttechnology.medium.com/](https://cycrafttechnology.medium.com/)
[lastline.com](https://www.lastline.com/blog/) - Security blog
*soonTM*## Twitter (cybersecurity related content)
*soonTM*[twitter.com/ochsenmeier](https://twitter.com/ochsenmeier)
[twitter.com/kinugawamasato](https://twitter.com/kinugawamasato)
[twitter.com/MalwareTechBlog](https://twitter.com/MalwareTechBlog)
[twitter.com/threatpost](https://twitter.com/threatpost)
[twitter.com/nas_bench](https://twitter.com/nas_bench)
[twitter.com/malwareunicorn](https://twitter.com/malwareunicorn)
[twitter.com/reach2ratan](https://twitter.com/reach2ratan)
[twitter.com/garymetz](https://twitter.com/garymetz)
[twitter.com/Bank_Security](https://twitter.com/Bank_Security)
[twitter.com/rimpq](https://twitter.com/rimpq)
[twitter.com/blueteamsec1](https://twitter.com/blueteamsec1)
[twitter.com/USCERT_gov](https://twitter.com/USCERT_gov)
[twitter.com/VK_Intel](https://twitter.com/VK_Intel)
[twitter.com/malwrhunterteam](https://twitter.com/malwrhunterteam)
[twitter.com/io_strap](https://twitter.com/io_strap)
[twitter.com/CioAmaro](https://twitter.com/CioAmaro)
[twitter.com/cyb3rops](https://twitter.com/cyb3rops)
[twitter.com/malware_traffic](https://twitter.com/malware_traffic)
[twitter.com/CatherineAdenle](https://twitter.com/CatherineAdenle)
[twitter.com/SecurityMB](https://twitter.com/SecurityMB)
[twitter.com/ale_sp_brazil](https://twitter.com/ale_sp_brazil)
[twitter.com/bit_reader](https://twitter.com/bit_reader)
[twitter.com/PwnFunction](https://twitter.com/PwnFunction)
[twitter.com/TalBeerySec](https://twitter.com/TalBeerySec)
[twitter.com/iSecurity](https://twitter.com/iSecurity)
[twitter.com/samwcyo](https://twitter.com/samwcyo)
## Exploits / bug bounty
[chromium-disclosed-bugs.appspot.com](https://chromium-disclosed-bugs.appspot.com) - hub of security bugs that have recently been published, with date and bounty amount (great for learning purposes)
[keenlab.tencent.com/en/](https://keenlab.tencent.com/en/) - well-known security research. The team is focusing on the cutting-edge security research of mainstream PC/Mobile operating systems, applications, cloud computing technologies, IOT smart devices etc
[h1.nobbd.de/index.php](http://h1.nobbd.de/index.php) - the unofficial HackerOne disclosure timeline.
[mksben.l0.cm](https://mksben.l0.cm/) - blog of Masato Kinugawa