mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-10 13:44:12 +00:00
118 lines
6.1 KiB
Markdown
118 lines
6.1 KiB
Markdown
# Blogs, YouTube Channels, Twitch Streamers, and Podcasts
|
||
|
||
## Cyber Security Blogs to Follow
|
||
(sorted alphabetically)
|
||
|
||
- [Ars Technica ](https://arstechnica.com)
|
||
- [Becoming a Hacker](https://becomingahacker.org)
|
||
- [Bruce Schneier's Blog](https://www.schneier.com)
|
||
- [CIO](https://www.cio.com/category/security)
|
||
- [Cisco Security Blog](https://blogs.cisco.com/security)
|
||
- [CSO Online ](https://www.csoonline.com)
|
||
- [Cyber Defense Magazine ](https://www.cyberdefensemagazine.com/)
|
||
- [cyberscoop ](https://www.cyberscoop.com/)
|
||
- [Darknet ](https://www.darknet.org.uk/)
|
||
- [Dark Reading ](http://www.darkreading.com/)
|
||
- [Data Breaches ](https://www.databreaches.net/)
|
||
- [Decipher ](https://duo.com/decipher/)
|
||
- [Didier Stevens Blog ](https://blog.didierstevens.com/)
|
||
- [Epic ](https://epic.org/)
|
||
- [Errata Security ](https://blog.erratasec.com/)
|
||
- [Exploit Databse ](https://www.exploit-db.com/)
|
||
- [F-Secure Safe & Savvy Blog ](http://safeandsavvy.f-secure.com)
|
||
- [FireEye Blog ](https://www.fireeye.com/blog.html)
|
||
- [Fox IT Security Blog ](http://blog.fox-it.com)
|
||
- [Google Online Security Blog ](https://googleonlinesecurity.blogspot.ro)
|
||
- [Graham Cluley ](https://www.grahamcluley.com)
|
||
- [Hack Read ](https://www.hackread.com/)
|
||
- [Heimdal Security Blog ](https://heimdalsecurity.com/blog/)
|
||
- [Help Net Security ](https://www.net-security.org)
|
||
- [Information Security Buzz ](https://www.informationsecuritybuzz.com/)
|
||
- [InfoSecurity Magazine ](http://www.infosecurity-magazine.com)
|
||
- [Kaspersky Lab’s Securelist ](https://securelist.com)
|
||
- [Kaspersky Lab’s ThreatPost ](https://threatpost.com)
|
||
- [KnowBe4 Blog ](https://blog.knowbe4.com/)
|
||
- [Krebs on Security](https://krebsonsecurity.com)
|
||
- [Malware Must Die](https://blog.malwaremustdie.org)
|
||
- [Malwarebytes Labs ](https://blog.malwarebytes.org)
|
||
- [Mashable ](http://mashable.com/category/cybersecurity)
|
||
- [McAfee security blog ](http://blogs.mcafee.com)
|
||
- [Microsoft Malware Protection Center ](http://blogs.technet.com/b/mmpc)
|
||
- [Motherboard Vice ](http://motherboard.vice.com/en_us)
|
||
- [Naked Security ](https://nakedsecurity.sophos.com)
|
||
- [OpenDNS (Cisco Umbrella) Blog ](https://blog.opendns.com)
|
||
- [OWASP -Not a blog, but a must - ](https://www.owasp.org)
|
||
- [Packet Storm Security ](https://packetstormsecurity.com/)
|
||
- [Paul’s Security Weekly ](http://securityweekly.com)
|
||
- [PCMag’s Security Watch ](http://securitywatch.pcmag.com)
|
||
- [Peerlyst ](https://www.peerlyst.com)
|
||
- [Phish Labs Blog ](https://info.phishlabs.com/blog/)
|
||
- [SANS Blogs ](https://www.sans.org/security-resources/blogs)
|
||
- [SC Magazine ](https://www.scmagazine.com)
|
||
- [Security Affairs ](https://securityaffairs.co/wordpress/)
|
||
- [Security Magazine ](https://www.securitymagazine.com/)
|
||
- [Security Week ](https://www.securityweek.com/)
|
||
- [Softpedia ](https://www.softpedia.com/)
|
||
- [Spiceworks Security ](https://community.spiceworks.com/security/general/)
|
||
- [SpiderLabs Security Blog ](https://www.trustwave.com/Resources/SpiderLabs-Blog)
|
||
- [TALOS](https://www.talosintelligence.com/)
|
||
- [Tao Security ](https://taosecurity.blogspot.com)
|
||
- [Techcrunch ](https://techcrunch.com/tag/security)
|
||
- [TechTarget Security ](http://searchsecurity.techtarget.com/)
|
||
- [Techworld Security ](http://www.techworld.com/security)
|
||
- [The Art of Hacking courses GitHub repository ](https://github.com/The-Art-of-Hacking/art-of-hacking)
|
||
- [The Guardian Information Security Hub ](https://www.theguardian.com/technology/data-computer-security)
|
||
- [The Hacker News ](http://thehackernews.com)
|
||
- [The Register ](http://www.theregister.co.uk)
|
||
- [ThreatPost](https://threatpost.com)
|
||
- [ThreatWire ](http://www.threatwire.net/)
|
||
- [TrendMicro Blog ](https://blog.trendmicro.com/trendlabs-security-intelligence/)
|
||
- [Tripwire Blog ](https://www.tripwire.com/state-of-security/)
|
||
- [Troy Hunt ](https://www.troyhunt.com)
|
||
- [US-CERT ](https://www.us-cert.gov)
|
||
- [Webroot Blog ](https://www.webroot.com/blog/)
|
||
- [Wired Threat Level ](http://www.wired.com/category/threatlevel )
|
||
- [Zero Day ](http://www.zdnet.com/blog/security)
|
||
|
||
## YouTube
|
||
- [AppSec Village](https://www.youtube.com/c/appsecvillage)
|
||
- [BlackHills InfoSec](https://www.youtube.com/channel/UCJ2U9Dq9NckqHMbcUupgF0A)
|
||
- [DEF CON](https://www.youtube.com/channel/UC6Om9kAkl32dWlDSNlDS9Iw)
|
||
- [HackerSploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q)
|
||
- [Jason Haddix](https://www.twitch.tv/nahamsec)
|
||
- [John Hammond](https://www.youtube.com/user/RootOfTheNull)
|
||
- [LiveOverFlow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)
|
||
- [NullByte](https://www.youtube.com/channel/UCgTNupxATBfWmfehv21ym-g)
|
||
- [Red Team Village](https://www.youtube.com/redteamvillage)
|
||
- [Security Weekly](https://www.youtube.com/user/SecurityWeeklyTV)
|
||
- [STÖK](https://www.youtube.com/channel/UCQN2DsjnYH60SFBIA6IkNwg)
|
||
- [The Art of Hacking](https://www.youtube.com/theartofhacking)
|
||
- [The Cyber Mentor](https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw)
|
||
|
||
## Twitch
|
||
- [Red Team Village](https://twitch.tv/redteamvillage)
|
||
- [Nahamsec](https://www.twitch.tv/nahamsec)
|
||
- [Blue Team Village](https://www.twitch.tv/blueteamvillage)
|
||
- [IoT Village](https://www.twitch.tv/iotvillage)
|
||
- [BugCrowd](https://www.twitch.tv/bugcrowd)
|
||
- [HackerOne](https://www.twitch.tv/hackeronetv)
|
||
- [The Cyber Mentor](https://www.twitch.tv/thecybermentor)
|
||
|
||
## Podcasts
|
||
- [DarkNet Diaries](https://darknetdiaries.com/)
|
||
- [Security Weekly](https://securityweekly.com/)
|
||
- [Risky Business](https://risky.biz/netcasts/risky-business/)
|
||
- [Firewalls Don’t Stop Dragons](https://firewallsdontstopdragons.com/podcast/)
|
||
- [The Unsupervised Learning Podcast](https://danielmiessler.com/podcast/#gs.=RDc3aY)
|
||
- [Down the Security Rabbithole](http://podcast.wh1t3rabbit.net/)
|
||
- [Smashing Security](https://www.smashingsecurity.com/)
|
||
- [The Cyberwire](https://thecyberwire.com/)
|
||
- [The CyberJungle](http://www.thecyberjungle.com/)
|
||
- [Beer with Talos](https://talosintelligence.com/podcasts/shows/beers_with_talos)
|
||
- [Talos Takes](https://talosintelligence.com/podcasts/shows/talos_takes)
|
||
- [Open Source Security Podcast](https://opensourcesecurity.io/category/podcast/)
|
||
- [Crypto-Gram Security Podcast](http://crypto-gram.libsyn.com/)
|
||
- [The Privacy, Security and OSINT Show](https://inteltechniques.com/podcast.html)
|
||
|
||
|
||
|