Security Links is a curated list of websites for cybersecurity. Find cutting edge information and trends.

Valve removed a game from Steam because it contained malware, the company also warned affected users to reformat their operating systems. Valve removed the game PirateFi from the Steam video game platform because it contained a Windows malicious code to steal browser cookies and hijack accounts. The company also warned affected users to fully reformatting […]
by Security Affairs

by Cyber Insider


DNSleaktest.com offers a simple test to determine if you DNS requests are being leaked which may represent a critical privacy threat. The test takes only a few seconds and we show you how you can simply fix the problem.
Stay up to date Cyber Security insights & trends. Our experts share their knowledge on the latest threats, security solutions & best practices to keep your business safe.
The site for people they like to build Network Servers with CentOS, Ubuntu, Fedora, Debian, Windows Server.
We discuss hot topics, malware behavior, techniques, practices for analyzing malicious files, and of course, we will talk more about our online interactive sandbox.
List of attack techniques.
Use tables, charts and maps generated from real-time data to discover where you are most likely to find cybercriminal activity and identify which countries and organisations are most and least proactive in their response to cybercrime.
Learn about the latest trends and news in cybersecurity. Educate yourself with quality thought leadership articles.
watchTowr Labs is the epicentre of offensive security expertise at watchTowr - injecting offensive security insight, innovation and research into the watchTowr Platform.
Malva․RE is an innovative solution developed by Yneos, a French startup specializing in creating software for cybersecurity professionals. Designed to meet the specific needs of CERTs, CSIRTs, incident response analysts, antivirus vendors, and other cybersecurity experts, Malva․RE is transforming the way static and structural malware analysis is performed.
Software has bugs, and catching bugs can involve lots of effort. This book addresses this problem by automating software testing, specifically by generating tests automatically. Recent years have seen the development of novel techniques that lead to dramatic improvements in test generation and software testing. They now are mature enough to be assembled in a book – even with executable code.
The goal of HardBreak is to collect knowledge about Hardware Hacking / IoT hacking in one place. HardBreak aims to organize all information in one accessible and easy-to-use platform.
A gamified platform for defenders to practice their skills in security investigations and challenges covering; Incident Response, Digital Forensics, Security Operations, Reverse Engineering, and Threat Hunting. Free and paid tiers available.
Your Anti-Scam Partner, Keeping You Safe! Quick check for scams, and report scams with a single click to help protect others.
Software and Application Security Blog. Get expert insights from the Black Duck software and application security blog. Explore topics from DevOps security, software news, analysis, intel and more.
Hacking the cloud is an encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure. The goal is to share this knowledge with the security community to better defend cloud native technologies.
The annual Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.
Traceable's blog offers the latest news in API security, risk reduction, and attack protection from industry experts.
Hacking techniques and research. Focused on the ongoing discussion and documentation of vulnerabilities and exploitation techniques. Please read the rules before posting here.
Leading provider of SSL/TLS certificates, automated certificate management and website security solutions. Trusted by the world’s largest brands for 20+ years.