Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- HUGE List of Security Blogs: Unix, Linux, Windows - Part 4
- ==> HUGE List of Security Blogs (Unix/Linux/Windows) <==
- ==> all packed with superb information & updated frequently <==
- --> <Updated> [01/05/2012] <==
- http://blogs.adobe.com/psirt/
- http://anti-virus-rants.blogspot.com/
- http://asert.arbornetworks.com/
- http://blog.avast.com/
- http://www.blackbag.nl/
- http://www.bunniestudios.com/wordpress/
- http://cansecwest.com/
- http://carnal0wnage.attackresearch.com/
- http://www.cerias.purdue.edu/site/blog
- http://cerias.purdue.edu/site/blog/author/spaf
- http://blogs.cisco.com/security
- http://blog.clamav.net/
- http://blog.commandlinekungfu.com/
- http://computer.forensikblog.de/en/
- http://www.cryptogon.com/
- http://www.cryptome.org/
- http://www.cutawaysecurity.com/blog/
- http://cyb3rcrim3.blogspot.com/
- http://garwarner.blogspot.com/
- http://cyberspeak.libsyn.com/
- http://ddanchev.blogspot.com/
- http://darknet.org.uk/
- http://darkreading.com/
- http://www.thedarkvisitor.com/
- http://blog.didierstevens.com/
- http://digfor.blogspot.com/
- http://edsmiley.com/
- http://emergentchaos.com/
- http://blog.emsisoft.com/
- http://blog.eset.com/
- http://fasthorizon.blogspot.com/
- http://www.financialcryptography.com/
- http://blog.fireeye.com/research
- http://www.forensickb.com/
- http://fraudwar.blogspot.com/
- http://www.f-secure.com/weblog
- http://blog.oxff.net/
- http://gleeda.blogspot.com/
- http://googleonlinesecurity.blogspot.com/
- http://www.sophos.com/blogs/gc
- http://grandstreamdreams.blogspot.com/
- http://www.hackaday.com/
- http://ha.ckers.org/blog
- http://www.hexblog.com/
- http://holisticinfosec.blogspot.com/
- http://honeyblog.org/
- http://www.h-online.com/security/
- http://blogs.iss.net/
- http://invisiblethings.org/
- http://theinvisiblethings.blogspot.com/
- http://jeremiahgrossman.blogspot.com/
- http://krebsonsecurity.com/
- http://www.l0t3k.org/en/
- http://blog.layeredsec.com/
- http://www.lightbluetouchpaper.org/
- http://blog.trendmicro.com/
- http://www.malwaredomainlist.com/
- http://chargen.matasano.com/
- http://www.avertlabs.com/research/blog/
- http://blog.metasploit.com/
- http://blogs.technet.com/mmpc/default.aspx
- http://securityincite.com/blog/mike-rothman
- http://www.milw0rm.com/
- http://blog.mandiant.com/
- http://www.offensivecomputing.net/
- http://www.offensive-security.com/blog/
- http://www.openrce.org/articles/
- http://www.packetstormsecurity.org/
- http://philosecurity.org/
- http://praetorianprefect.com/
- http://www.prevx.com/blog.asp
- http://pseudo-flaw.net/log/
- http://www.rationalsurvivability.com/blog/
- http://rdist.root.org/
- http://blogs.sans.org/
- https://blogs.sans.org/computer-forensics/
- http://www.schneier.com/blog
- http://blog.zoller.lu/
- http://www.fas.org/blog/secrecy/
- http://www.secsocial.com/blog/
- http://secunia.com/advisories/
- http://www.securelist.com/en/weblog
- http://blogs.securiteam.com/
- http://blog.security4all.be/
- http://securosis.com/blog
- http://www.shmoocon.org/
- http://www.shmoo.com/news/
- http://blog.snort.org/
- http://blog.stopbadware.org/
- http://sunbeltblog.blogspot.com/
- http://www.symantec.com/business/security_response/weblog/
- http://taosecurity.blogspot.com/
- http://www.teamfurry.com/wordpress/
- http://blogs.technet.com/msrc/
- http://blog.threatexpert.com/
- http://threatpost.com/
- http://blog.tsa.gov/
- http://blog.uncommonsensesecurity.com/
- http://volatility.tumblr.com/
- http://securitylabs.websense.com/
- http://windowsir.blogspot.com/
- http://www.wired.com/threatlevel/
- http://blogs.zdnet.com/security/
- http://blog.zynamics.com/
- http://www.afcea.org/signal/signalscape/
- http://dhs-daily-report.blogspot.com/
- https://blog.torproject.org/
- http://www.securitywire.com/
- http://pauldotcom.com/
- http://www.exploit-db.com/
- http://www.networkworld.com/topics/security.html
- http://www.acunetix.com/blog/
- http://www.allspammedup.com/
- http://www.gfi.com/blog/
- http://www.infosecblog.org/
- http://www.techrepublic.com/blog/security
- http://www.theemailadmin.com/
- http://www.theregister.co.uk/security/
- http://seclists.org/
- http://www.afcea.org/signal/signalscape/
- http://www.woodmann.com/forum/blog.php
- http://www.nsa.gov/
- http://blogs.technet.com/b/sysinternals/
- http://www.securityweek.com/
- http://superantispyware.com/blog/
- http://www.securitytracker.com/
- http://spyblog.org.uk/
- http://www.net-security.org/
- http://news.cnet.com/security
- http://www.fas.org/blog/ssp/
- Project/Wiki:
- Freedom Box: http://wiki.debian.org/freedombox
- http://blogs.pcmag.com/securitywatch/
- http://labs.m86security.com/
- http://www.irongeek.com/
- http://rijmenants.blogspot.com/
- Cipher Machines & Cryptology / Intelligence / Security
- "Cipher machines & cryptology, history of Signals Intelligence and Communications Security, espionage and intelligence services, from WW2, over the Cold World era, to date."
- http://blog.webroot.com/
- http://crypto.stanford.edu/
- https://ssd.eff.org/
- http://publicintelligence.net/
- http://www.wikileaks.org/
- http://www.itstactical.com/
- http://www.forensicswiki.org/
- http://p4r4n0id.com/
- http://cryptocomb.org/
- http://anonymous.livelyblog.com/
- https://trac.torproject.org/projects/tor/wiki
- http://www.security-ray.com/
- http://ticklethewire.com/
- http://vulnfactory.org/blog/
- https://psal.cs.drexel.edu/index.php/Main_Page
- http://www.pgpboard.com/
- https://yorkporc.wordpress.com/
- http://www.catonmat.net/
- http://www.heinz.cmu.edu/~acquisti/shb/participants.htm
- http://www.cyberciti.biz/
- http://www.omgubuntu.co.uk/
- http://www.ledge.co.za/software/lpinotes/
- http://inciweb.org/
- https://www.ibm.com/developerworks/linux/
- https://www.ibm.com/developerworks/topics/
- https://www.ibm.com/developerworks/
- https://www.ibm.com/developerworks/aix/library/
- http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
- http://www.hackinglinuxexposed.com/articles/
- http://dankaminsky.com/
- http://blog.bodhizazen.net/
- http://askubuntu.com/
- -==> New Links below! 01/05/2012 <==-
- http://computer-forensics.sans.org/blog
- https://365.rsaconference.com/blogs/rsa-conference-blog
- https://365.rsaconference.com/blogs/critical-infrastructure
- https://365.rsaconference.com/blogs/ira-winkler
- https://365.rsaconference.com/blogs/ediscovery
- https://365.rsaconference.com/blogs/securityreading
- https://365.rsaconference.com/blogs/fred-stock
- http://securityblog.verizonbusiness.com/
- http://www.flyingpenguin.com/
- https://blog.whitehatsec.com/
- http://robert.penz.name/
- https://fightinginsecurity.wordpress.com/
- http://www.cristoncox.com/
- http://www.paranoidprose.com/
- http://dvlabs.tippingpoint.com/blog/
- "For those who are interested in mobile/wireless in general, and wireless LANs in particular, this page provides resource links about 802.11 and related security and mobility topics"
- -- Lisa Phifer, Core Competence, Inc.
- http://www.corecom.com/html/wlan.html
- http://www.wmarkbrooks.com/
- https://www.veracode.com/blog/
- http://devcentral.f5.com/weblogs/macvittie/Default.aspx
- http://chuvakin.blogspot.com/
- http://gigaom.com/cloud/
- http://lastwatchdog.com/
- http://www.cryptosmith.com/
- http://blogs.verisign.com/innovation/
- https://chainmailcheck.wordpress.com/
- http://superconductor.voltage.com/
- http://www.educatedguesswork.org/
- https://techbuddha.wordpress.com/
- http://www.scmagazine.com/the-data-breach-blog/section/1263/
- https://www.brandenwilliams.com/blog/
- http://infosecplace.com/blog/
- http://www.thetechherald.com/security
- http://www.clerkendweller.com/
- http://blog.tenablesecurity.com/
- http://coffeetocode.net/
- http://technicalinfodotnet.blogspot.com/
- http://www.teamshatter.com/
- http://www.stratumsecurity.com/blog/
- http://www.cgisecurity.com/
- http://blog.spywareguide.com/
- https://amtso.wordpress.com/
- http://blog.spiderlabs.com/
- https://gregness.wordpress.com/
- http://daveshackleford.com/
- https://marienfeldt.wordpress.com/
- http://blog.rootshell.be/
- http://www.thesecuritysamurai.com/
- http://community.websense.com/blogs/securitylabs/default.aspx
- http://securitybraindump.blogspot.com/
- http://dsecrg.blogspot.com/
- http://blog.c22.cc/
- http://securityandrisk.blogspot.com/
- http://www.social-engineer.org/framework/Social_Engineering_Framework
- http://blog.gerhards.net/
- http://www.paranoidprose.com/
- http://www.sensepost.com/blog/
- https://pinvoke.wordpress.com/
- http://www.liquidmatrix.org/blog/
- http://www.standalone-sysadmin.com/blog/
- http://infolookup.securegossip.com/
- http://blog.watchfire.com/wfblog/
- http://www.frontlinesentinel.com/
- http://elie.im/blog/
- http://maliciousattacker.blogspot.com/
- Most Powerful Voices in Security Who are the Top 25?
- The Rest of the Top 100 -
- * 100 security guru's listed with their Twitter pages
- and personal/blog sites: (Sep. 8, 2011) Posted here as one
- link rather than posting around 100 Twitter personal pages.
- http://www.sys-con.com/node/1974029
- - Publications:
- http://bsdmag.org/
- http://hakin9.org/
- http://magazine.hackinthebox.org/
- http://www.uninformed.org/
- https://www.net-security.org/insecuremag.php
- - Forums:
- http://www.wilderssecurity.com/
- http://www.wilderssecurity.com/showthread.php?t=242949
- http://hardforum.com/showthread.php?t=781545
- http://www.binrev.com/forums/
- http://hak5.org/forums/
- Link to part 3, older previous posting: http://pastebin.com/vgj3qKDW
- We'll continue with another post in the future here @ pastebin.com !
Add Comment
Please, Sign In to add comment