Pastebin launched a little side project called HostCabi.net, check it out ;-)Don't like ads? PRO users don't see any ads ;-)
Guest

HUGE List of Security Blogs: Unix, Linux, Windows - Part 4

By: a guest on Jan 5th, 2012  |  syntax: None  |  size: 9.16 KB  |  hits: 3,170  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. HUGE List of Security Blogs: Unix, Linux, Windows - Part 4
  2.  
  3. ==> HUGE List of Security Blogs (Unix/Linux/Windows)        <==
  4. ==> all packed with superb information & updated frequently <==
  5.           --> <Updated> [01/05/2012] <==
  6.  
  7. http://blogs.adobe.com/psirt/
  8. http://anti-virus-rants.blogspot.com/
  9. http://asert.arbornetworks.com/
  10. http://blog.avast.com/
  11. http://www.blackbag.nl/
  12. http://www.bunniestudios.com/wordpress/
  13. http://cansecwest.com/
  14. http://carnal0wnage.attackresearch.com/
  15. http://www.cerias.purdue.edu/site/blog
  16. http://cerias.purdue.edu/site/blog/author/spaf
  17. http://blogs.cisco.com/security
  18. http://blog.clamav.net/
  19. http://blog.commandlinekungfu.com/
  20. http://computer.forensikblog.de/en/
  21. http://www.cryptogon.com/
  22. http://www.cryptome.org/
  23. http://www.cutawaysecurity.com/blog/
  24. http://cyb3rcrim3.blogspot.com/
  25. http://garwarner.blogspot.com/
  26. http://cyberspeak.libsyn.com/
  27. http://ddanchev.blogspot.com/
  28. http://darknet.org.uk/
  29. http://darkreading.com/
  30. http://www.thedarkvisitor.com/
  31. http://blog.didierstevens.com/
  32. http://digfor.blogspot.com/
  33. http://edsmiley.com/
  34. http://emergentchaos.com/
  35. http://blog.emsisoft.com/
  36. http://blog.eset.com/
  37. http://fasthorizon.blogspot.com/
  38. http://www.financialcryptography.com/
  39. http://blog.fireeye.com/research
  40. http://www.forensickb.com/
  41. http://fraudwar.blogspot.com/
  42. http://www.f-secure.com/weblog
  43. http://blog.oxff.net/
  44. http://gleeda.blogspot.com/
  45. http://googleonlinesecurity.blogspot.com/
  46. http://www.sophos.com/blogs/gc
  47. http://grandstreamdreams.blogspot.com/
  48. http://www.hackaday.com/
  49. http://ha.ckers.org/blog
  50. http://www.hexblog.com/
  51. http://holisticinfosec.blogspot.com/
  52. http://honeyblog.org/
  53. http://www.h-online.com/security/
  54. http://blogs.iss.net/
  55. http://invisiblethings.org/
  56. http://theinvisiblethings.blogspot.com/
  57. http://jeremiahgrossman.blogspot.com/
  58. http://krebsonsecurity.com/
  59. http://www.l0t3k.org/en/
  60. http://blog.layeredsec.com/
  61. http://www.lightbluetouchpaper.org/
  62. http://blog.trendmicro.com/
  63. http://www.malwaredomainlist.com/
  64. http://chargen.matasano.com/
  65. http://www.avertlabs.com/research/blog/
  66. http://blog.metasploit.com/
  67. http://blogs.technet.com/mmpc/default.aspx
  68. http://securityincite.com/blog/mike-rothman
  69. http://www.milw0rm.com/
  70. http://blog.mandiant.com/
  71. http://www.offensivecomputing.net/
  72. http://www.offensive-security.com/blog/
  73. http://www.openrce.org/articles/
  74. http://www.packetstormsecurity.org/
  75. http://philosecurity.org/
  76. http://praetorianprefect.com/
  77. http://www.prevx.com/blog.asp
  78. http://pseudo-flaw.net/log/
  79. http://www.rationalsurvivability.com/blog/
  80. http://rdist.root.org/
  81. http://blogs.sans.org/
  82. https://blogs.sans.org/computer-forensics/
  83. http://www.schneier.com/blog
  84. http://blog.zoller.lu/
  85. http://www.fas.org/blog/secrecy/
  86. http://www.secsocial.com/blog/
  87. http://secunia.com/advisories/
  88. http://www.securelist.com/en/weblog
  89. http://blogs.securiteam.com/
  90. http://blog.security4all.be/
  91. http://securosis.com/blog
  92. http://www.shmoocon.org/
  93. http://www.shmoo.com/news/
  94. http://blog.snort.org/
  95. http://blog.stopbadware.org/
  96. http://sunbeltblog.blogspot.com/
  97. http://www.symantec.com/business/security_response/weblog/
  98. http://taosecurity.blogspot.com/
  99. http://www.teamfurry.com/wordpress/
  100. http://blogs.technet.com/msrc/
  101. http://blog.threatexpert.com/
  102. http://threatpost.com/
  103. http://blog.tsa.gov/
  104. http://blog.uncommonsensesecurity.com/
  105. http://volatility.tumblr.com/
  106. http://securitylabs.websense.com/
  107. http://windowsir.blogspot.com/
  108. http://www.wired.com/threatlevel/
  109. http://blogs.zdnet.com/security/
  110. http://blog.zynamics.com/
  111. http://www.afcea.org/signal/signalscape/
  112. http://dhs-daily-report.blogspot.com/
  113. https://blog.torproject.org/
  114. http://www.securitywire.com/
  115. http://pauldotcom.com/
  116. http://www.exploit-db.com/
  117. http://www.networkworld.com/topics/security.html
  118. http://www.acunetix.com/blog/
  119. http://www.allspammedup.com/
  120. http://www.gfi.com/blog/
  121. http://www.infosecblog.org/
  122. http://www.techrepublic.com/blog/security
  123. http://www.theemailadmin.com/
  124. http://www.theregister.co.uk/security/
  125. http://seclists.org/
  126. http://www.afcea.org/signal/signalscape/
  127. http://www.woodmann.com/forum/blog.php
  128. http://www.nsa.gov/
  129. http://blogs.technet.com/b/sysinternals/
  130. http://www.securityweek.com/
  131. http://superantispyware.com/blog/
  132. http://www.securitytracker.com/
  133. http://spyblog.org.uk/
  134. http://www.net-security.org/
  135. http://news.cnet.com/security
  136. http://www.fas.org/blog/ssp/
  137.  
  138. Project/Wiki:
  139. Freedom Box: http://wiki.debian.org/freedombox
  140.  
  141. http://blogs.pcmag.com/securitywatch/
  142. http://labs.m86security.com/
  143. http://www.irongeek.com/
  144.  
  145. http://rijmenants.blogspot.com/
  146. Cipher Machines & Cryptology / Intelligence / Security
  147. "Cipher machines & cryptology, history of Signals Intelligence and Communications Security, espionage and intelligence services, from WW2, over the Cold World era, to date."
  148.  
  149. http://blog.webroot.com/
  150. http://crypto.stanford.edu/
  151. https://ssd.eff.org/
  152. http://publicintelligence.net/
  153. http://www.wikileaks.org/
  154. http://www.itstactical.com/
  155. http://www.forensicswiki.org/
  156. http://p4r4n0id.com/
  157. http://cryptocomb.org/
  158. http://anonymous.livelyblog.com/
  159. https://trac.torproject.org/projects/tor/wiki
  160. http://www.security-ray.com/
  161. http://ticklethewire.com/
  162. http://vulnfactory.org/blog/
  163. https://psal.cs.drexel.edu/index.php/Main_Page
  164. http://www.pgpboard.com/
  165. https://yorkporc.wordpress.com/
  166. http://www.catonmat.net/
  167. http://www.heinz.cmu.edu/~acquisti/shb/participants.htm
  168. http://www.cyberciti.biz/
  169. http://www.omgubuntu.co.uk/
  170. http://www.ledge.co.za/software/lpinotes/
  171. http://inciweb.org/
  172. https://www.ibm.com/developerworks/linux/
  173. https://www.ibm.com/developerworks/topics/
  174. https://www.ibm.com/developerworks/
  175. https://www.ibm.com/developerworks/aix/library/
  176. http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
  177. http://www.hackinglinuxexposed.com/articles/
  178. http://dankaminsky.com/
  179. http://blog.bodhizazen.net/
  180. http://askubuntu.com/
  181.  
  182. -==> New Links below! 01/05/2012 <==-
  183.  
  184. http://computer-forensics.sans.org/blog
  185. https://365.rsaconference.com/blogs/rsa-conference-blog
  186. https://365.rsaconference.com/blogs/critical-infrastructure
  187. https://365.rsaconference.com/blogs/ira-winkler
  188. https://365.rsaconference.com/blogs/ediscovery
  189. https://365.rsaconference.com/blogs/securityreading
  190. https://365.rsaconference.com/blogs/fred-stock
  191. http://securityblog.verizonbusiness.com/
  192. http://www.flyingpenguin.com/
  193. https://blog.whitehatsec.com/
  194. http://robert.penz.name/
  195. https://fightinginsecurity.wordpress.com/
  196. http://www.cristoncox.com/
  197. http://www.paranoidprose.com/
  198. http://dvlabs.tippingpoint.com/blog/
  199.  
  200. "For those who are interested in mobile/wireless in general, and wireless LANs in particular, this page provides resource links about 802.11 and related security and mobility topics"
  201. -- Lisa Phifer, Core Competence, Inc.
  202. http://www.corecom.com/html/wlan.html
  203.  
  204. http://www.wmarkbrooks.com/
  205. https://www.veracode.com/blog/
  206. http://devcentral.f5.com/weblogs/macvittie/Default.aspx
  207. http://chuvakin.blogspot.com/
  208. http://gigaom.com/cloud/
  209. http://lastwatchdog.com/
  210. http://www.cryptosmith.com/
  211. http://blogs.verisign.com/innovation/
  212. https://chainmailcheck.wordpress.com/
  213. http://superconductor.voltage.com/
  214. http://www.educatedguesswork.org/
  215. https://techbuddha.wordpress.com/
  216. http://www.scmagazine.com/the-data-breach-blog/section/1263/
  217. https://www.brandenwilliams.com/blog/
  218. http://infosecplace.com/blog/
  219. http://www.thetechherald.com/security
  220. http://www.clerkendweller.com/
  221. http://blog.tenablesecurity.com/
  222. http://coffeetocode.net/
  223. http://technicalinfodotnet.blogspot.com/
  224. http://www.teamshatter.com/
  225. http://www.stratumsecurity.com/blog/
  226. http://www.cgisecurity.com/
  227. http://blog.spywareguide.com/
  228. https://amtso.wordpress.com/
  229. http://blog.spiderlabs.com/
  230. https://gregness.wordpress.com/
  231. http://daveshackleford.com/
  232. https://marienfeldt.wordpress.com/
  233. http://blog.rootshell.be/
  234. http://www.thesecuritysamurai.com/
  235. http://community.websense.com/blogs/securitylabs/default.aspx
  236. http://securitybraindump.blogspot.com/
  237. http://dsecrg.blogspot.com/
  238. http://blog.c22.cc/
  239. http://securityandrisk.blogspot.com/
  240. http://www.social-engineer.org/framework/Social_Engineering_Framework
  241. http://blog.gerhards.net/
  242. http://www.paranoidprose.com/
  243. http://www.sensepost.com/blog/
  244. https://pinvoke.wordpress.com/
  245. http://www.liquidmatrix.org/blog/
  246. http://www.standalone-sysadmin.com/blog/
  247. http://infolookup.securegossip.com/
  248. http://blog.watchfire.com/wfblog/
  249. http://www.frontlinesentinel.com/
  250. http://elie.im/blog/
  251. http://maliciousattacker.blogspot.com/
  252.  
  253. Most Powerful Voices in Security Who are the Top 25?
  254. The Rest of the Top 100 -
  255. * 100 security guru's listed with their Twitter pages
  256. and personal/blog sites: (Sep. 8, 2011) Posted here as one
  257. link rather than posting around 100 Twitter personal pages.
  258. http://www.sys-con.com/node/1974029
  259.  
  260. - Publications:
  261. http://bsdmag.org/
  262. http://hakin9.org/
  263. http://magazine.hackinthebox.org/
  264. http://www.uninformed.org/
  265. https://www.net-security.org/insecuremag.php
  266.  
  267. - Forums:
  268. http://www.wilderssecurity.com/
  269. http://www.wilderssecurity.com/showthread.php?t=242949
  270. http://hardforum.com/showthread.php?t=781545
  271. http://www.binrev.com/forums/
  272. http://hak5.org/forums/
  273.  
  274. Link to part 3, older previous posting: http://pastebin.com/vgj3qKDW
  275.  
  276. We'll continue with another post in the future here @ pastebin.com !