OffensiveCon Berlin is a highly technical international security conference focused on offensive security only. The aim of OffensiveCon is to bring the hacker community together for high quality and deep technical talks, engaging and renowned technical trainings. The talks at OffensiveCon are focused on offensive IT security topics such as vulnerability discovery, advanced exploitation techniques and reverse engineering.
Cybercrime Magazine by Cybersecurity Ventures provides research and reports on cybercrime costs, cybersecurity market size and spending forecasts, cybersecurity jobs & more.
SourceSecurity.com, the complete industry guide for security products, including CCTV cameras, access control systems, wireless security cameras, network security cameras, biometric readers, smart card readers, infrared cameras, security surveillance and wireless security system.
Discover real-world cybersecurity case studies on how organizations build resilience and upskill teams with Immersive’ hands-on training platform.
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.
Grow your cyber security skills with our real world. Offensive and Defensive Security Labs.
Find out the technical based penetration testing, vulnerability management, cybersecurity blogs by wesecureapp. We cover entire issues on security.....
Explore the Mysterium VPN Blog for tech insights, privacy tips, and the latest news in VPN technology. Stay informed and secure in the digital world!
Discovering the latest attacks and providing defensive measures to keep organizations safe.
Well in this new book I will start to learn some Red Team Topics, and I will work on learning as much as possible, I will try to keep this updated, to newer things that I may find, I think this will help around in my future projects. I am following the MITRE ATTACK Framework and just adapting it to something for me to understand, I will make this public for anyone that want's to learn in this awesome field. If anything is wrong I will try my best to fix it.
Find and explore CTF solutions and writeups. This search engine allows you to explore CTF (Capture The Flag) writeups and solutions from a curated collection.
Learn about the latest trends and news in cybersecurity. Educate yourself with quality thought leadership articles.
watchTowr Labs is the epicentre of offensive security expertise at watchTowr - injecting offensive security insight, innovation and research into the watchTowr Platform.
Malva․RE is an innovative solution developed by Yneos, a French startup specializing in creating software for cybersecurity professionals. Designed to meet the specific needs of CERTs, CSIRTs, incident response analysts, antivirus vendors, and other cybersecurity experts, Malva․RE is transforming the way static and structural malware analysis is performed.
Software has bugs, and catching bugs can involve lots of effort. This book addresses this problem by automating software testing, specifically by generating tests automatically. Recent years have seen the development of novel techniques that lead to dramatic improvements in test generation and software testing. They now are mature enough to be assembled in a book – even with executable code.
The goal of HardBreak is to collect knowledge about Hardware Hacking / IoT hacking in one place. HardBreak aims to organize all information in one accessible and easy-to-use platform.
A gamified platform for defenders to practice their skills in security investigations and challenges covering; Incident Response, Digital Forensics, Security Operations, Reverse Engineering, and Threat Hunting. Free and paid tiers available.
Your Anti-Scam Partner, Keeping You Safe! Quick check for scams, and report scams with a single click to help protect others.
Software and Application Security Blog. Get expert insights from the Black Duck software and application security blog. Explore topics from DevOps security, software news, analysis, intel and more.
Hacking the cloud is an encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure. The goal is to share this knowledge with the security community to better defend cloud native technologies.
The annual Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.
Traceable's blog offers the latest news in API security, risk reduction, and attack protection from industry experts.
Hacking techniques and research. Focused on the ongoing discussion and documentation of vulnerabilities and exploitation techniques. Please read the rules before posting here.
Leading provider of SSL/TLS certificates, automated certificate management and website security solutions. Trusted by the world’s largest brands for 20+ years.
The Latest on VPNs, Privacy, Censorship. See what's happening now in the world of cybersecurity and online privacy. Get your news from a reliable, trustworthy group of cybersecurity experts.
The SecOps Automation Blog. Practical tips & threat analysis from Intezer's Research Team. Product news. Industry insights on the evolution of security operations, automation, and AI.
Analyze and share malware samples and threat intelligence to join the fight against cyber threats.
Valkyrie is a file verdict system. Different from traditional signature based malware detection techniques Valkyrie conducts several analysis using run-time behavior and hundreds of features from a file and based on analysis results can warn users against malware undetected by classic Anti-Virus products.
Government Technology has IT articles for state, local and city government. Find government news and events.
Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves.
We research and share the latest identity attack techniques to help blue teams understand the threats they face.