πŸ•ΈοΈ
Th4ntis CyberSec
  • πŸ•·οΈ>whoami_
  • πŸ–₯️General Info
    • CyberSec News
    • Getting Started and other Resources
      • CompTIA Certs
        • Security+
        • Pentest+
    • MITRE ATT&CK
    • Cyber Kill Chain
    • Docker
  • πŸ’»Networking
    • General Networking
    • Common Ports and Protocols
    • TCP/IP Model
    • OSI Model
    • Subnetting
    • Wireshark
    • NMap
    • Wireless
      • Wardriving/WiFi Sniffing
    • 3-Way Handshake
  • 🐧Linux
    • Common commands
    • Sudo
    • Files and File contents
    • Sed Awk and Grep
    • Permissions
  • πŸͺŸWindows
    • Event Codes
    • Powershell
    • Internals
    • Active Directory
  • πŸ”ŽOSINT
    • OSINT Tools
    • IP/Domain OSINT
    • Email/Username OSINT
    • URL OSINT and Sandboxing
    • Social Media OSINT
    • Website OSINT
    • Password OSINT
    • Physical Location OSINT
    • Image OSINT
    • People OSINT
    • Phone Number OSINT
    • Shodan
    • Google Dorking
  • πŸ› οΈTools
    • Brute Force
      • Hydra
    • Credential Dumping
      • Mimikatz
    • Enumeration
      • Bloodhound
      • Certipy
      • Dirb/Dirbuster
      • Enum4Linux
      • GoBuster
    • Exploitation Framework
      • Metasploit
      • Sliver
      • Cobalt Strike
    • Hash Cracking
      • Hashcat
      • JohnTheRipper
    • Methods
      • Powershell Obfuscation
      • Privilege Escalation
      • Pass-The-Hash
      • Kerberos and Kerberoasting
    • Vulnerability Scanners
      • Nessus
      • OpenVAS
    • Web App
      • BurpSuite
      • OWASP Zap
    • Wireless
      • Aircrack-ng
      • Kismet
      • Bettercap
      • HCXDumptool
      • Wifite
    • Impacket
    • Social-Engineer Toolkit (SET)
  • πŸ“”Guides and How-To's
    • Lab Setup
      • Ubuntu VM
      • Kali VM
      • Windows User VM
      • Windows Server VM
    • Wardriving
      • Pwnagotchi
    • Wireless Pentesting
      • WiFi Pineapple Basics
      • Evil-Twin Attack
    • Over The Wire
      • Bandit
      • Natas
      • Leviathan
      • Krypton
      • Narnia
      • Behemoth
      • Utumno
      • Maze
      • Vortex
      • Manpage
    • Docker and Kali Linux
    • Staying Private and goin Dark Online
  • πŸ“•Quick References
    • Tools
      • Tmux
      • NMap
      • Ffuf
      • NetExec
      • CrackMapExec
      • Proxychains
      • OneDriveUser Enum
      • Hashcat
    • One-liners
    • Reverse Shells
    • Post Exploitation
    • Enumeration
      • Google
      • Sublist3r
      • NMap
      • DNSDumpster
    • Hashcracking
    • Wireless
  • πŸ““Courses
    • PNPT
      • Practical Ethical Hacking
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • OSINT Fundamentals
      • External Pentest Playbook
  • ☁️TryHackMe
    • Attacking Kerberos
    • Hacking with Powershell
    • Powershell for Pentesters
    • Linux PrivEsc
    • Windows PrivEsc
    • Blue
    • Kenobi
  • πŸ“¦HackTheBox
    • Starting Point
      • Tier 0
        • Meow
        • Fawn
        • Dancing
        • Redeemer
        • Explosion
        • Preignition
        • Mongod
        • Synced
      • Tier 1
        • Appointment
        • Sequel
        • Crocodile
        • Responder
        • Three
        • Ignition
        • Bike
        • Funnel
        • Pennyworth
        • Tactics
      • Tier 2
        • Archetype
        • Oopsie
        • Vaccine
        • Unified
        • Included
        • Markup
        • Base
    • Walkthroughs
      • Lame
      • Analytics
      • Manager
      • Codify
Powered by GitBook
On this page
  • Reddit
  • Twitter
  • LinkedIn
  • Podcasts
  • RSS Readers
  • Feeds
  • Various Blogs
Edit on GitHub
  1. General Info

CyberSec News

Last updated 8 months ago

Keeping up with various Cyber/Information Security can be done through various Social media, such as , , , or RSS Feeds. With some of the platforms dying or just going down hill, I wanted to show places of ways to get updates in the Cyber/Information Security world.

There is also Mastodon, I myself am on , and . Though Mastodon isn't always the easiest to Navigate and BlueSky has a relatively small user base at the moment.

There is also and .

Reddit

works, it just depends on which Subreddit you follow, since anyone can make a post at any time so it can be flooded with people asking questions or nonsense. So it depends n the moderators or bots to kind of keep things cleaned up. Some of the various subreddits I follow are:

Though there are plenty of others, there's a subreddit for just about anything/everything.

Twitter

is where a large things are posted often and first, but as of recently it's been on a down slope and more so after various rumors of it being you need to pay to use it. People and groups I follow include:

LinkedIn

and plenty more.

Podcasts

RSS Readers

Feeds

Feedly comes with a few 'kits' of feeds to Sec News, Threat Researcher, Vulnerability, etc.

I currently use:

Various Blogs

and plenty of others. .

Linked in is also a great place to follow people who have one and post a lot, like or . Some of the other people/group/companies I follow are:

- A go to one as it's via the web and has a mobile app, can follow Reddit on there as well, and others. Though some features of behind a paywall but the free version works great.

- Linux based terminal RSS Reader.

Alienvault Blogs /

Apple Security Updates /

Bleeping Computer /

Dark Reading /

Darknet – Hacking Tools, Hacker News & Cyber Security /

Deeplinks /

Graham Cluley /

HackerOne /

HaveIBeenPwned Latest breaches /

InfoSecurity /

Microsoft Security Blog /

Naked Security /

Packet Storm Security /

Security Affairs /

Security Latest /

Security Week /

The Hacker News /

Zero Day Initiative /

Microsoft Security Advisories - MSRC /

Siemens Security Advisories /

πŸ–₯️
Twitter
LinkedIn
Reddit
infosec.exchange
BlueSky
HackerNews from ycombinator
CyberWire
Reddit
r/CyberSecurity
r/Privacy
r/PrivacyGuides
r/OpSec
Twitter
@vxunderground
@packet_storm
@DailtOsint
@OSINTIndustries
@hackingarticles
@TrustedSec
Who I follow on Twitter
John Hammond
TCM Sec
CyberSecurityHub
National Institute of Standards and Technology (NIST)
John Strand
HackTheBox
SANS Digital Forensics and Incident Response
TrustedSec
CyberWire Daily
Feedly
Newsboat
Feed link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Feed Link
Website
Zscaler blog
Microsoft blog
Splunk blog
SentinelOne blog
eSentire blog
ReliaQuest blog
SANS Institute blog
Mandiant blog
Varonis blog
Qualys blog
Trellix blog
VMware Carbon Black blog
ThreatMon | Advanced Threat Intelligence Platform blog
Cybereason blog
CrowdStrike blog
Symantec blog
Elastic blog
Recorded Future blog
Red Canary blog
NIST blog
Cybersecurity and Infrastructure Security Agency blog
SANS Institute blog
SC Media blog
Cyber Security News blog
CSO Online blog
Tripwire blog
Troy Hunt blog
Akamai Technologies blog
Sophos blog
Dark Reading blog
Threatpost blog
The Hacker News blog
BleepingComputer blog
SecurityWeek blog