This is a cross-reference of the ReactOS source code produced using the excellent Doxygen package. It is refreshed on a daily basis.
Computer Weekly stands out from the many technology news websites on offer through its unique history, extensive reader community and in-depth coverage of the issues, challenges and trends facing today’s IT leaders.
CVEDetails.com is a vulnerability intelligence solution providing CVE security vulnerability database, exploits, advisories, product and CVE risk scores, attack surface intelligence, open source vulnerabilities, code changes, vulnerabilities affecting your attack surface and software inventory/tech stack. You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time
Search, discover, visualize, refine, and access NASA Earth Observation data in your browser with Earthdata Search
Query and order satellite images, aerial photographs, and cartographic products through the U.S. Geological Survey
Image Hunter is a one-stop-shop for all your imagery and elevation data needs. These short videos will help you make the most of our search engine, from saving imagery searches to submitting your quote. If you have any questions that are not answered here, please send us an email at sales@apollomapping.com.
Tenable maintains a list of Common Vulnerabilities and Exposures (CVEs) and their affected products. Tenable augments the data to include related Tenable Plugins that detect each vulnerability. 252428 CVEs are indexed from NVD.
Interactive world weather map. Track hurricanes, cyclones, storms. View LIVE satellite images, rain radar, forecast maps of wind, temperature for your location.
A collection of observations, guidance, information and opinion, on all things cyber, and information security, as well as company updates.
Security conference and hacking contest founded and organized by @orangecyberch since 2008.
Explore our latest articles and stay updated with the latest insights, guides, and best practices for LLM and AI cybersecurity.
theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis, we have decided to gather all of them for you in an accessible and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.
The latest Security news, analysis, and insight from VentureBeat, the most authoritative source on transformative technology.
The Forensics Wiki has transitioned to this new domain and platform; read more about it at Transitioning Forensics Wiki to GitHub.
TIPS & GUIDANCE Ransomware incidents can severely impact business processes and leave organizations without the data they need to operate and deliver.
Read and watch the latest news, multimedia, and other important communications from CISA. View a calendar of upcoming events CISA hosts and participates in.
Keeping You Informed. Keeping You Aware. Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Scammers are ruthless, and that is why I am here. My channel is all about bringing awareness to this critical problem with humor and fun. We will learn a lot of things along the way and if I help one person through this, it will be worth it.
Expert insight, best practices, and advice on Secure DevOps, security for containers, Kubernetes, and cloud services. Review Sysdig blog posts today!
All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more.
A comprehensive module-based malware development course that provides fundamental to advanced level training|
Read articles covering industry thought leadership, PlexTrac updates, cybersecurity foundations, and much more.
Collection of various malicious functionality to aid in malware development.
0day Today is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals. Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database. This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage.
Useful online security tips and articles. True cyber security combines advanced technology and best practice. Get tips and read articles on how to take your online security even further.
The award winning online magazine dedicated to the strategy, insight and technology of information security.
Learn about what is cyber security, computer security, cyberfraud, cybercrime and more.
The Ultimate Cybersecurity Resource List. A curated directory of cybersecurity tools and resources for infosec professionals.
Cyble Research and Intelligence Lab's latest findings and blogs.