Data hosted with ♥ by Pastebin.com - Download Raw - See Original
  1. HUGE List of Security Blogs: Unix, Linux, Windows - Part 2
  2.  
  3. ==> HUGE List of Security Blogs (Unix/Linux/Windows) <==
  4. ==> all packed with superb information & updated frequently <==
  5. 8==============D ~ <Updated> [01/03/2012] 8==============D ~
  6.  
  7. http://blogs.adobe.com/psirt/
  8. http://anti-virus-rants.blogspot.com/
  9. http://asert.arbornetworks.com/
  10. http://blog.avast.com/
  11. http://www.blackbag.nl/
  12. http://www.bunniestudios.com/wordpress/
  13. http://cansecwest.com/
  14. http://carnal0wnage.attackresearch.com/
  15. http://www.cerias.purdue.edu/site/blog
  16. http://cerias.purdue.edu/site/blog/author/spaf
  17. http://blogs.cisco.com/security
  18. http://blog.clamav.net/
  19. http://blog.commandlinekungfu.com/
  20. http://computer.forensikblog.de/en/
  21. http://www.cryptogon.com/
  22. http://www.cryptome.org/
  23. http://www.cutawaysecurity.com/blog/
  24. http://cyb3rcrim3.blogspot.com/
  25. http://garwarner.blogspot.com/
  26. http://cyberspeak.libsyn.com/
  27. http://ddanchev.blogspot.com/
  28. http://darknet.org.uk/
  29. http://darkreading.com/
  30. http://www.thedarkvisitor.com/
  31. http://blog.didierstevens.com/
  32. http://digfor.blogspot.com/
  33. http://edsmiley.com/
  34. http://emergentchaos.com/
  35. http://blog.emsisoft.com/
  36. http://blog.eset.com/
  37. http://fasthorizon.blogspot.com/
  38. http://www.financialcryptography.com/
  39. http://blog.fireeye.com/research
  40. http://www.forensickb.com/
  41. http://fraudwar.blogspot.com/
  42. http://www.f-secure.com/weblog
  43. http://blog.oxff.net/
  44. http://gleeda.blogspot.com/
  45. http://googleonlinesecurity.blogspot.com/
  46. http://www.sophos.com/blogs/gc
  47. http://grandstreamdreams.blogspot.com/
  48. http://www.hackaday.com/
  49. http://ha.ckers.org/blog
  50. http://www.hexblog.com/
  51. http://holisticinfosec.blogspot.com/
  52. http://honeyblog.org/
  53. http://www.h-online.com/security/
  54. http://blogs.iss.net/
  55. http://invisiblethings.org/
  56. http://theinvisiblethings.blogspot.com/
  57. http://jeremiahgrossman.blogspot.com/
  58. http://krebsonsecurity.com/
  59. http://www.l0t3k.org/en/
  60. http://blog.layeredsec.com/
  61. http://www.lightbluetouchpaper.org/
  62. http://blog.trendmicro.com/
  63. http://www.malwaredomainlist.com/
  64. http://chargen.matasano.com/
  65. http://www.avertlabs.com/research/blog/
  66. http://blog.metasploit.com/
  67. http://blogs.technet.com/mmpc/default.aspx
  68. http://securityincite.com/blog/mike-rothman
  69. http://www.milw0rm.com/
  70. http://blog.mandiant.com/
  71. http://www.offensivecomputing.net/
  72. http://www.offensive-security.com/blog/
  73. http://www.openrce.org/articles/
  74. http://www.packetstormsecurity.org/
  75. http://philosecurity.org/
  76. http://praetorianprefect.com/
  77. http://www.prevx.com/blog.asp
  78. http://pseudo-flaw.net/log/
  79. http://www.rationalsurvivability.com/blog/
  80. http://rdist.root.org/
  81. http://blogs.sans.org/
  82. https://blogs.sans.org/computer-forensics/
  83. http://www.schneier.com/blog
  84. http://blog.zoller.lu/
  85. http://www.fas.org/blog/secrecy/
  86. http://www.secsocial.com/blog/
  87. http://secunia.com/advisories/
  88. http://www.securelist.com/en/weblog
  89. http://blogs.securiteam.com/
  90. http://blog.security4all.be/
  91. http://securosis.com/blog
  92. http://www.shmoocon.org/
  93. http://www.shmoo.com/news/
  94. http://blog.snort.org/
  95. http://blog.stopbadware.org/
  96. http://sunbeltblog.blogspot.com/
  97. http://www.symantec.com/business/security_response/weblog/
  98. http://taosecurity.blogspot.com/
  99. http://www.teamfurry.com/wordpress/
  100. http://blogs.technet.com/msrc/
  101. http://blog.threatexpert.com/
  102. http://threatpost.com/
  103. http://blog.tsa.gov/
  104. http://blog.uncommonsensesecurity.com/
  105. http://volatility.tumblr.com/
  106. http://securitylabs.websense.com/
  107. http://windowsir.blogspot.com/
  108. http://www.wired.com/threatlevel/
  109. http://blogs.zdnet.com/security/
  110. http://blog.zynamics.com/
  111. http://www.afcea.org/signal/signalscape/
  112. http://dhs-daily-report.blogspot.com/
  113. https://blog.torproject.org/
  114. http://www.securitywire.com/
  115. http://pauldotcom.com/
  116. http://www.exploit-db.com/
  117. http://www.networkworld.com/topics/security.html
  118. http://www.acunetix.com/blog/
  119. http://www.allspammedup.com/
  120. http://www.gfi.com/blog/
  121. http://www.infosecblog.org/
  122. http://www.techrepublic.com/blog/security
  123. http://www.theemailadmin.com/
  124. http://www.theregister.co.uk/security/
  125. http://seclists.org/
  126. http://www.afcea.org/signal/signalscape/
  127. http://www.woodmann.com/forum/blog.php
  128. http://www.nsa.gov/
  129. http://blogs.technet.com/b/sysinternals/
  130. http://www.securityweek.com/
  131. http://superantispyware.com/blog/
  132. http://www.securitytracker.com/
  133. http://spyblog.org.uk/
  134. http://www.net-security.org/
  135. http://news.cnet.com/security
  136. http://www.fas.org/blog/ssp/
  137.  
  138. Project/Wiki:
  139. Freedom Box: http://wiki.debian.org/freedombox
  140.  
  141. http://blogs.pcmag.com/securitywatch/
  142. http://labs.m86security.com/
  143. http://www.irongeek.com/
  144.  
  145. http://rijmenants.blogspot.com/
  146. Cipher Machines & Cryptology / Intelligence / Security
  147. "Cipher machines & cryptology, history of Signals Intelligence and Communications Security, espionage and intelligence services, from WW2, over the Cold World era, to date."
  148.  
  149. http://blog.webroot.com/
  150. http://crypto.stanford.edu/
  151. https://ssd.eff.org/
  152. http://publicintelligence.net/
  153. http://www.wikileaks.org/
  154. http://www.itstactical.com/
  155. http://www.forensicswiki.org/
  156. http://p4r4n0id.com/
  157.  
  158. -==> New Links below! 01/03/2012 <==-
  159.  
  160. http://cryptocomb.org/
  161. http://anonymous.livelyblog.com/
  162. https://trac.torproject.org/projects/tor/wiki
  163. http://www.security-ray.com/
  164. http://ticklethewire.com/
  165. http://vulnfactory.org/blog/
  166. https://psal.cs.drexel.edu/index.php/Main_Page
  167. http://www.pgpboard.com/
  168. https://yorkporc.wordpress.com/
  169. http://www.catonmat.net/
  170. http://www.heinz.cmu.edu/~acquisti/shb/participants.htm
  171. http://www.cyberciti.biz/
  172. http://www.omgubuntu.co.uk/
  173. http://www.ledge.co.za/software/lpinotes/
  174. http://inciweb.org/
  175. https://www.ibm.com/developerworks/linux/
  176. https://www.ibm.com/developerworks/topics/
  177. https://www.ibm.com/developerworks/
  178. https://www.ibm.com/developerworks/aix/library/
  179. http://www.neowin.net/forum/topic/93...ernative-list/
  180. http://www.hackinglinuxexposed.com/articles/
  181. http://dankaminsky.com/
  182. http://blog.bodhizazen.net/
  183. http://askubuntu.com/
  184.  
  185. Until our next update, smoke em if you've got em!
  186.  
  187. References:
  188. - First (old) version of this list: http://pastebin.com/FwjBMJib