CWE (Common Weakness Enumeration) is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts.
Distributed Denial of Secrets (DDoSecrets) is a journalist 501(c)(3) non-profit publishing and archiving leaks, and devoted to the free transmission of data in the public interest.
Sparked by a leak of emails from the Colombian prosecutor’s office, NarcoFiles is the largest investigative project on organized crime to originate in Latin America.
Introducing a project to track down and catalogue the vast wealth held outside Russia by oligarchs and key figures close to Russian President Vladimir Putin.
This is the largest ever leak of account data from a major Swiss bank. Here are the stories we found inside.
How new surveillance states keep democracy and the public in check.
Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.
What Errors Are Included in the Top 25 Software Errors? Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.
The only non-profit, independent & volunteer based publication in the information security space. Cybersecurity articles written by hackers!
Blog about reverse-engineering, hacking and breaking your software in every way imaginable.
Get the latest news and views from the leading voices in cloud security and secure digital transformation. Subscribe to the Zscaler blog and stay in the know
Premier publication and forum for electrical engineers providing educational material, tools, industry insight, videos, podcasts and conferences.
Stay updated about the latest in the application security industry with news, tips and best practices from the security research team at Beagle Security.
The web application vulnerabilities index lists vulnerabilities according to its severity and is classified by the compliance standard it falls under.
The Software Engineering Institute is leading and advancing software and cybersecurity to solve the nation's toughest problems.
Criminal IP is an OSINT-based Cyber Threat Intelligence Search Engine. Discover everything about cybersecurity, including IP addresses, URLs, IoT devices, C2 servers, CVE vulnerabilities, exploits, and data integration into Criminal IP API.
HackMag is an educational ecosystem where cybersecurity specialists share practical knowledge in exchange for financial rewards and recognition. Access to this knowledge significantly increases the hands-on educational level of fellow specialists and the security of computer systems throughout the world.
Check out the official Hunter's blog to get the latest insights on cold email outreach, sales, marketing, growth, company news, and product updates.
Websites contain several different types of information. Some of it is non-sensitive, for example the copy shown on the public pages. Some of it is sensitive, for example customer usernames, passwords, and banking information, or internal algorithms and private product information.
The Mozilla Observatory has helped over 240,000 websites by teaching developers, system administrators, and security professionals how to configure their sites safely and securely.
The Most Popular & Fastest Growing Open Source Security Projects on GitHub.
Product, Engineering, and Marketing updates from the developers of Sentry.
Level up your open source & cloud native application security knowledge. Stay up to date with news & happenings in cloud, container, serverless security & more!
Developer security training from Snyk. Snyk Learn teaches developers how to stay secure with interactive lessons exploring vulnerabilities across a variety of languages and ecosystems.
The leading database for open source vulnerabilities and cloud misconfigurations.
Arm yourself with up-to-date information & insights into building a successful cybersecurity strategy, w/ inputs from the StickmanCyber team & industry experts
Cybercrime Diaries offers an incisive exploration of the Russian language cybercriminal ecosystem. It aims to study how these hackers organize, interact, and attack their victims.
Check out top news and articles about cyber security, malware attack updates and more at Cyware.com. Our machine learning based curation engine brings you the top and relevant cyber security content.
Explore what matters in tech, productivity, and security.
Malpedia is a free service offered by Fraunhofer FKIE. The primary goal of Malpedia is to provide a resource for rapid identification and actionable context when investigating malware. Openness to curated contributions shall ensure an accountable level of quality in order to foster meaningful and reproducible research.
Third party vulnerabilities that have been reported by VulnCheck.
Attackers are using popular legitimate domains when conducting phishing, C&C, exfiltration and downloading tools to evade detection. The list of websites below allow attackers to use their domain or subdomain.
PC Magazine UK is your complete guide to computers, phones, tablets, peripherals and more. We test and review the latest gadgets, products and services, report technology news and trends, and provide shopping advice and price comparisons.
With offensive security, I have turned my passion into my core competency. With my services, I increase your technical IT security on the one hand and support you in setting up your internal defenders on the other.
Get the latest from VMware's security business including strategy, implementation, best practices, and updates from members of our staff.
The official Bitdefender blogs. News, views and insights from Bitdefender cybersecurity experts for a safer digital experience.
Cyber Security Review promotes dialogue and provides a platform for information exchange and cooperation between stakeholders, industry, academia and cyber security experts worldwide, CSR helps to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.
Hackaday serves up Fresh Hacks Every Day from around the Internet. Our playful posts are the gold-standard in entertainment for engineers and engineering enthusiasts.