Data hosted with ♥ by Pastebin.com - Download Raw - See Original
  1. ==> HUGE List of Security Blogs (Unix/Linux/Windows) <==
  2. ==> all packed with superb information & updated frequently <==
  3.  
  4. http://blogs.adobe.com/psirt/
  5. http://anti-virus-rants.blogspot.com/
  6. http://asert.arbornetworks.com/
  7. http://blog.avast.com/
  8. http://www.blackbag.nl/
  9. http://www.bunniestudios.com/wordpress/
  10. http://cansecwest.com/
  11. http://carnal0wnage.attackresearch.com/
  12. http://www.cerias.purdue.edu/site/blog
  13. http://cerias.purdue.edu/site/blog/author/spaf
  14. http://blogs.cisco.com/security
  15. http://blog.clamav.net/
  16. http://blog.commandlinekungfu.com/
  17. http://computer.forensikblog.de/en/
  18. http://www.cryptogon.com/
  19. http://www.cryptome.org/
  20. http://www.cutawaysecurity.com/blog/
  21. http://cyb3rcrim3.blogspot.com/
  22. http://garwarner.blogspot.com/
  23. http://cyberspeak.libsyn.com/
  24. http://ddanchev.blogspot.com/
  25. http://darknet.org.uk/
  26. http://darkreading.com/
  27. http://www.thedarkvisitor.com/
  28. http://blog.didierstevens.com/
  29. http://digfor.blogspot.com/
  30. http://edsmiley.com/
  31. http://emergentchaos.com/
  32. http://blog.emsisoft.com/
  33. http://blog.eset.com/
  34. http://fasthorizon.blogspot.com/
  35. http://www.financialcryptography.com/
  36. http://blog.fireeye.com/research
  37. http://www.forensickb.com/
  38. http://fraudwar.blogspot.com/
  39. http://www.f-secure.com/weblog
  40. http://blog.oxff.net/
  41. http://gleeda.blogspot.com/
  42. http://googleonlinesecurity.blogspot.com/
  43. http://www.sophos.com/blogs/gc
  44. http://grandstreamdreams.blogspot.com/
  45. http://www.hackaday.com/
  46. http://ha.ckers.org/blog
  47. http://www.hexblog.com/
  48. http://holisticinfosec.blogspot.com/
  49. http://honeyblog.org/
  50. http://www.h-online.com/security/
  51. http://blogs.iss.net/
  52. http://invisiblethings.org/
  53. http://theinvisiblethings.blogspot.com/
  54. http://jeremiahgrossman.blogspot.com/
  55. http://krebsonsecurity.com/
  56. http://www.l0t3k.org/en/
  57. http://blog.layeredsec.com/
  58. http://www.lightbluetouchpaper.org/
  59. http://blog.trendmicro.com/
  60. http://www.malwaredomainlist.com/
  61. http://chargen.matasano.com/
  62. http://www.avertlabs.com/research/blog/
  63. http://blog.metasploit.com/
  64. http://blogs.technet.com/mmpc/default.aspx
  65. http://securityincite.com/blog/mike-rothman
  66. http://www.milw0rm.com/
  67. http://blog.mandiant.com/
  68. http://www.offensivecomputing.net/
  69. http://www.offensive-security.com/blog/
  70. http://www.openrce.org/articles/
  71. http://www.packetstormsecurity.org/
  72. http://philosecurity.org/
  73. http://praetorianprefect.com/
  74. http://www.prevx.com/blog.asp
  75. http://pseudo-flaw.net/log/
  76. http://www.rationalsurvivability.com/blog/
  77. http://rdist.root.org/
  78. http://blogs.sans.org/
  79. https://blogs.sans.org/computer-forensics/
  80. http://www.schneier.com/blog
  81. http://blog.zoller.lu/
  82. http://www.fas.org/blog/secrecy/
  83. http://www.secsocial.com/blog/
  84. http://secunia.com/advisories/
  85. http://www.securelist.com/en/weblog
  86. http://blogs.securiteam.com/
  87. http://blog.security4all.be/
  88. http://securosis.com/blog
  89. http://www.shmoocon.org/
  90. http://www.shmoo.com/news/
  91. http://blog.snort.org/
  92. http://blog.stopbadware.org/
  93. http://sunbeltblog.blogspot.com/
  94. http://www.symantec.com/business/security_response/weblog/
  95. http://taosecurity.blogspot.com/
  96. http://www.teamfurry.com/wordpress/
  97. http://blogs.technet.com/msrc/
  98. http://blog.threatexpert.com/
  99. http://threatpost.com/
  100. http://blog.tsa.gov/
  101. http://blog.uncommonsensesecurity.com/
  102. http://volatility.tumblr.com/
  103. http://securitylabs.websense.com/
  104. http://windowsir.blogspot.com/
  105. http://www.wired.com/threatlevel/
  106. http://blogs.zdnet.com/security/
  107. http://blog.zynamics.com/
  108. http://www.afcea.org/signal/signalscape/
  109. http://dhs-daily-report.blogspot.com/
  110. https://blog.torproject.org/
  111. http://www.securitywire.com/
  112. http://pauldotcom.com/
  113. http://www.exploit-db.com/
  114. http://www.networkworld.com/topics/security.html
  115. http://www.acunetix.com/blog/
  116. http://www.allspammedup.com/
  117. http://www.gfi.com/blog/
  118. http://www.infosecblog.org/
  119. http://www.techrepublic.com/blog/security
  120. http://www.theemailadmin.com/
  121. http://www.theregister.co.uk/security/
  122. http://seclists.org/
  123. http://www.afcea.org/signal/signalscape/
  124. http://www.woodmann.com/forum/blog.php
  125. http://www.nsa.gov/
  126. http://blogs.technet.com/b/sysinternals/
  127. http://www.securityweek.com/
  128. http://superantispyware.com/blog/
  129. http://www.securitytracker.com/
  130. http://spyblog.org.uk/
  131. http://www.net-security.org/
  132. http://news.cnet.com/security
  133. http://www.fas.org/blog/ssp/
  134.  
  135. Project/Wiki:
  136. Freedom Box: http://wiki.debian.org/freedombox
  137.  
  138. http://blogs.pcmag.com/securitywatch/
  139. http://labs.m86security.com/
  140. http://www.irongeek.com/
  141.  
  142. http://rijmenants.blogspot.com/
  143. Cipher Machines & Cryptology / Intelligence / Security
  144. "Cipher machines & cryptology, history of Signals Intelligence and Communications Security, espionage and intelligence services, from WW2, over the Cold World era, to date."
  145.  
  146. http://blog.webroot.com/
  147. http://crypto.stanford.edu/
  148. https://ssd.eff.org/
  149. http://publicintelligence.net/
  150. http://www.wikileaks.org/
  151. http://www.itstactical.com/
  152. http://www.forensicswiki.org/
  153. http://p4r4n0id.com/