πŸ•ΈοΈ
Th4ntis CyberSec
  • πŸ•·οΈ>whoami_
  • πŸ–₯️General Info
    • CyberSec News
    • Getting Started and other Resources
      • CompTIA Certs
        • Security+
        • Pentest+
    • MITRE ATT&CK
    • Cyber Kill Chain
    • Docker
  • πŸ’»Networking
    • General Networking
    • Common Ports and Protocols
    • TCP/IP Model
    • OSI Model
    • Subnetting
    • Wireshark
    • NMap
    • Wireless
      • Wardriving/WiFi Sniffing
    • 3-Way Handshake
  • 🐧Linux
    • Common commands
    • Sudo
    • Files and File contents
    • Sed Awk and Grep
    • Permissions
  • πŸͺŸWindows
    • Event Codes
    • Powershell
    • Internals
    • Active Directory
  • πŸ”ŽOSINT
    • OSINT Tools
    • IP/Domain OSINT
    • Email/Username OSINT
    • URL OSINT and Sandboxing
    • Social Media OSINT
    • Website OSINT
    • Password OSINT
    • Physical Location OSINT
    • Image OSINT
    • People OSINT
    • Phone Number OSINT
    • Shodan
    • Google Dorking
  • πŸ› οΈTools
    • Brute Force
      • Hydra
    • Credential Dumping
      • Mimikatz
    • Enumeration
      • Bloodhound
      • Certipy
      • Dirb/Dirbuster
      • Enum4Linux
      • GoBuster
    • Exploitation Framework
      • Metasploit
      • Sliver
      • Cobalt Strike
    • Hash Cracking
      • Hashcat
      • JohnTheRipper
    • Methods
      • Powershell Obfuscation
      • Privilege Escalation
      • Pass-The-Hash
      • Kerberos and Kerberoasting
    • Vulnerability Scanners
      • Nessus
      • OpenVAS
    • Web App
      • BurpSuite
      • OWASP Zap
    • Wireless
      • Aircrack-ng
      • Kismet
      • Bettercap
      • HCXDumptool
      • Wifite
    • Impacket
    • Social-Engineer Toolkit (SET)
  • πŸ“”Guides and How-To's
    • Lab Setup
      • Ubuntu VM
      • Kali VM
      • Windows User VM
      • Windows Server VM
    • Wardriving
      • Pwnagotchi
    • Wireless Pentesting
      • WiFi Pineapple Basics
      • Evil-Twin Attack
    • Over The Wire
      • Bandit
      • Natas
      • Leviathan
      • Krypton
      • Narnia
      • Behemoth
      • Utumno
      • Maze
      • Vortex
      • Manpage
    • Docker and Kali Linux
    • Staying Private and goin Dark Online
  • πŸ“•Quick References
    • Tools
      • Tmux
      • NMap
      • Ffuf
      • NetExec
      • CrackMapExec
      • Proxychains
      • OneDriveUser Enum
      • Hashcat
      • Mimikatz
    • One-liners
    • Reverse Shells
    • Post Exploitation
    • Enumeration
      • Google
      • Sublist3r
      • NMap
      • DNSDumpster
    • Hashcracking
    • Wireless
  • πŸ““Courses
    • PNPT
      • Practical Ethical Hacking
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • OSINT Fundamentals
      • External Pentest Playbook
  • ☁️TryHackMe
    • Attacking Kerberos
    • Hacking with Powershell
    • Powershell for Pentesters
    • Linux PrivEsc
    • Windows PrivEsc
    • Blue
    • Kenobi
  • πŸ“¦HackTheBox
    • Starting Point
      • Tier 0
        • Meow
        • Fawn
        • Dancing
        • Redeemer
        • Explosion
        • Preignition
        • Mongod
        • Synced
      • Tier 1
        • Appointment
        • Sequel
        • Crocodile
        • Responder
        • Three
        • Ignition
        • Bike
        • Funnel
        • Pennyworth
        • Tactics
      • Tier 2
        • Archetype
        • Oopsie
        • Vaccine
        • Unified
        • Included
        • Markup
        • Base
    • Walkthroughs
      • Lame
      • Analytics
      • Manager
      • Codify
Powered by GitBook
On this page
  • Reddit
  • Twitter
  • LinkedIn
  • Podcasts
  • RSS Readers
  • Feeds
  • Various Blogs
Edit on GitHub
  1. General Info

CyberSec News

Keeping up with various Cyber/Information Security can be done through various Social media, such as Twitter, LinkedIn, Reddit, or RSS Feeds. With some of the platforms dying or just going down hill, I wanted to show places of ways to get updates in the Cyber/Information Security world.

There is also Mastodon, I myself am on infosec.exchange, and BlueSky. Though Mastodon isn't always the easiest to Navigate and BlueSky has a relatively small user base at the moment.

There is also HackerNews from ycombinator and CyberWire.

Reddit

Reddit works, it just depends on which Subreddit you follow, since anyone can make a post at any time so it can be flooded with people asking questions or nonsense. So it depends n the moderators or bots to kind of keep things cleaned up. Some of the various subreddits I follow are:

  • r/CyberSecurity

  • r/Privacy

  • r/PrivacyGuides

  • r/OpSec

Though there are plenty of others, there's a subreddit for just about anything/everything.

Twitter

Twitter is where a large things are posted often and first, but as of recently it's been on a down slope and more so after various rumors of it being you need to pay to use it. People and groups I follow include:

  • @vxunderground

  • @packet_storm

  • @DailtOsint

  • @OSINTIndustries

  • @hackingarticles

  • @TrustedSec

and plenty of others. Who I follow on Twitter.

LinkedIn

Linked in is also a great place to follow people who have one and post a lot, like John Hammond or TCM Sec. Some of the other people/group/companies I follow are:

  • CyberSecurityHub

  • National Institute of Standards and Technology (NIST)

  • John Strand

  • HackTheBox

  • SANS Digital Forensics and Incident Response

  • TrustedSec

and plenty more.

Podcasts

  • CyberWire Daily

RSS Readers

Feedly - A go to one as it's via the web and has a mobile app, can follow Reddit on there as well, and others. Though some features of behind a paywall but the free version works great.

Newsboat - Linux based terminal RSS Reader.

Feeds

Feedly comes with a few 'kits' of feeds to Sec News, Threat Researcher, Vulnerability, etc.

I currently use:

  • Alienvault Blogs Feed link / Website

  • Apple Security Updates Feed Link / Website

  • Bleeping Computer Feed Link / Website

  • Dark Reading Feed Link / Website

  • Darknet – Hacking Tools, Hacker News & Cyber Security Feed Link / Website

  • Deeplinks Feed Link / Website

  • Graham Cluley Feed Link / Website

  • HackerOne Feed Link / Website

  • HaveIBeenPwned Latest breaches Feed Link / Website

  • InfoSecurity Feed Link / Website

  • Microsoft Security Blog Feed Link / Website

  • Naked Security Feed Link / Website

  • Packet Storm Security Feed Link / Website

  • Security Affairs Feed Link / Website

  • Security Latest Feed Link / Website

  • Security Week Feed Link / Website

  • The Hacker News Feed Link / Website

  • Zero Day Initiative Feed Link / Website

  • Microsoft Security Advisories - MSRC Feed Link / Website

  • Siemens Security Advisories Feed Link / Website

Various Blogs

  • Zscaler blog

  • Microsoft blog

  • Splunk blog

  • SentinelOne blog

  • eSentire blog

  • ReliaQuest blog

  • SANS Institute blog

  • Mandiant blog

  • Varonis blog

  • Qualys blog

  • Trellix blog

  • VMware Carbon Black blog

  • ThreatMon | Advanced Threat Intelligence Platform blog

  • Cybereason blog

  • CrowdStrike blog

  • Symantec blog

  • Elastic blog

  • Recorded Future blog

  • Red Canary blog

  • NIST blog

  • Cybersecurity and Infrastructure Security Agency blog

  • SANS Institute blog SC Media blog

  • Cyber Security News blog

  • CSO Online blog

  • Tripwire blog Troy Hunt blog

  • Akamai Technologies blog

  • Sophos blog

  • Dark Reading blog

  • Threatpost blog

  • The Hacker News blog

  • BleepingComputer blog

  • SecurityWeek blog

Last updated 10 months ago

πŸ–₯️