The Latest on VPNs, Privacy, Censorship. See what's happening now in the world of cybersecurity and online privacy. Get your news from a reliable, trustworthy group of cybersecurity experts.
The SecOps Automation Blog. Practical tips & threat analysis from Intezer's Research Team. Product news. Industry insights on the evolution of security operations, automation, and AI.
Analyze and share malware samples and threat intelligence to join the fight against cyber threats.
Valkyrie is a file verdict system. Different from traditional signature based malware detection techniques Valkyrie conducts several analysis using run-time behavior and hundreds of features from a file and based on analysis results can warn users against malware undetected by classic Anti-Virus products.
Government Technology has IT articles for state, local and city government. Find government news and events.
Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves.
We research and share the latest identity attack techniques to help blue teams understand the threats they face.
CyberScoop delivers up-to-the-minute breaking cybersecurity news and is the leading public sector media company reaching top leaders.
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.
The Largest Password Recovery Community. Join our (discord) community, fully geared towards recovering the plains of hash algorithms. Fully supports non-binary hashcat algorithms. MD5, SHA1, ZIP, Bitcoin, Ethereum, Dogecoin Wallets - we have it all.
The latest Security breaking news, comment, reviews and features from the experts at TechRadar.
SiliconANGLE Media Inc. has dedicated itself to covering the massive, often underreported global impact of enterprise and emerging technologies, from semiconductors to computer and networking systems to the cloud, as well as the applications, cybersecurity, AI and machine learning, blockchain and other technologies built on top of that foundation.
Keep up with the latest attack trends, research, and cybersecurity industry updates on the Perception Point blog!
Perception Point’s learning center is full of useful and informative guides on every topic related to enterprise cybersecurity.
Stay up-to-date on the latest cybersecurity topics and security operations thought leadership from ReliaQuest experts.
HeroCTF is an online cybersecurity competition for beginners and intermediates that takes place once a year.
The ATT&CK Navigator is a web-based tool for annotating and exploring ATT&CK matrices. It can be used to visualize defensive coverage, red/blue team planning, the frequency of detected techniques, and more.
Sonar is the home of Clean Code. Our blog showcases our products. SonarLint, SonarQube & SonarCloud - trusted by 400k+ organizations globally.
IT Security expertise - Penetration tests, Security audits, Code review, Training, Consulting, Vulnerability research
CryptoBook is a community project, developed by members of CryptoHack to create a resource for people to learn cryptography. The focus of this project is to create a friendly resource for the mathematical fundamentals of cryptography, along with corresponding SageMath implementation.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. The collective is made up of elite security researchers that put a spotlight on the threats you know and don’t know about.
Read more about how Netskope is enabling security and networking transformation through secure access service edge (SASE).
Tackle tech challenges together. Join our IT community to connect, share your expertise, get answers, stay up with trends, advance your career, and keep IT fun!
Sinkholing is a technique whereby a resource used by malicious actors to control malware is taken over and redirected to a benign listener that can (to a varying degree) understand network connections coming from infected devices. This provides visibility of the distribution of infected devices worldwide, as well as protecting victims by preventing botnet command and control (C2) from cybercriminals.
Enter a domain or URL into the search engine to view details about its current URL categories. To request recategorization of this website, click Request Change below the search results.
PoC auto collect from GitHub. Be careful Malware.
Infosec's favorite weekly newsletter for news, tools, and tips with 18,000+ CISOs, founders, change-makers, and straight up hackers.
AttackIQ Academy combats cyberthreats with free courses by top experts. Enjoy hands-on learning in MITRE ATT&CK®, purple teaming, and breach & attack simulation, earning badges and certifications. Enhance your cybersecurity skills at no cost as part of the Informed Defender Community. Join us and become a cybersecurity hero today!
PolySwarm is a crowdsourced threat detection marketplace where security experts & AV companies compete to protect you.