Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.
The largest collection of malware source code, samples, and papers on the internet.
Displays images from hundreds of webcams, cameras around the world, including a description of the web cam location. and Displays worldwide webcam images on the Google map.
Blog about Windows NT.
ZoomEye really mapping global leader of cyberspace mapping.
The home to the largest curation of resources for beginners in AI/ML security, from leading AI/ML threat researchers at Protect AI. Start your journey into AI/ML hacking today.
An internationally recognized cybersecurity event series providing the most technical and relevant information security research.
Bugcrowd teams with elite security researchers to reduce risk & improve security ROI through our bug bounty, pen testing, & vulnerability disclosure programs.
The Intelligence and research arm of Check Point Technologies provides leading cyber threat intelligence to Check Point customers and the greater intelligence community.
Extremely passionate about Windows exploit development, internals, C, Assembly, or anything low-level.
The largest hacking and security conference with presentations, workshops, contests, villages and the premier Capture The Flag Contest.
The leading nonprofit defending digital privacy, free speech, and innovation.
RTC security Research, talks and tools. We are researchers in cyber-security, continually educating ourselves and developing knowledge and code. By sharing what we learn, we hope to push RTC security forward.
The best internet privacy and online security blog. Regular news, opinion, and product updates from the world’s leading ultra-fast VPN service.
Worldwide live positions of trains, busses, trams and other public transport vehicles. Find out if your train is on time and see where it is located right now.
At GreyNoise, we collect and analyze untargeted, widespread, and opportunistic scan and attack activity that reaches every server directly connected to the Internet.
The world's best dynamic repository for security vulnerabilities.
Welcome to the wiki where you will find each hacking trick/technique/whatever I have learnt from CTFs, real life apps, reading researches, and news.
Latest web security & vulnerabilities, product releases, product docs and faq blogs.
Cyber security insights and guidance from the frontlines. Read expert perspectives and get all the latest cyber security industry news at the Mandiant blog.
a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
What’s the deal with Virtual Private Networks? Discover how they work, why they’re important and what using a VPN can do for you.
Generating foreign intelligence insights. Applying cybersecurity expertise. Securing the future.
This repository is for the Offensive Security and Reverse Engineering Course. I used to teaching at Champlain College and currently sharing it for free online (check the YouTube channel for the recordings).
Global Security Resource. In these times where a new major data breach occurs on a daily basis, it is important for the personal Internet user, corporations, and governments to stay aware of vulnerabilities that may affect their systems. Packet Storm provides around-the-clock information and tools in order to help mitigate both personal data and fiscal loss on a global scale. As new information surfaces, Packet Storm releases everything immediately through it's RSS feeds, Twitter, and Facebook. The site is referenced in over a hundred books and has a history of being spotlighted in the news.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF.
The Proofpoint cybersecurity blog provides you with advanced cybersecurity intelligence and insights, threat research, and breaking cyber attack news. Get the latest news about advanced threats.
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.