mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-12-18 10:56:09 +00:00
Update README.md
This commit is contained in:
parent
1a94afffec
commit
6e69bbef65
@ -1,4 +1,78 @@
|
||||
# YouTube Channels, Twitch Streamers, and Podcasts
|
||||
# Blogs, YouTube Channels, Twitch Streamers, and Podcasts
|
||||
|
||||
## Cyber Security Blogs to Follow
|
||||
(sorted alphabetically)
|
||||
|
||||
- [Ars Technica ](http://arstechnica.com)
|
||||
- [Bruce Schneier's Blog: https://www.schneier.com)
|
||||
- [CIO ](http://www.cio.com/category/security)
|
||||
- [Cisco Security Blog: http://blogs.cisco.com/security)
|
||||
- [Continuum: https://continuum.cisco.com)
|
||||
- [CSO Online ](http://www.csoonline.com)
|
||||
- [Cyber Defense Magazine ](http://www.cyberdefensemagazine.com/)
|
||||
- [cyberscoop ](https://www.cyberscoop.com/)
|
||||
- [Darknet ](https://www.darknet.org.uk/)
|
||||
- [Dark Reading ](http://www.darkreading.com/)
|
||||
- [Data Breaches ](https://www.databreaches.net/)
|
||||
- [Didier Stevens Blog ](https://blog.didierstevens.com/)
|
||||
- [Epic ](https://epic.org/)
|
||||
- [Errata Security ](http://blog.erratasec.com/)
|
||||
- [Exploit Databse ](https://www.exploit-db.com/)
|
||||
- [F-Secure Safe & Savvy Blog ](http://safeandsavvy.f-secure.com)
|
||||
- [FireEye Blog ](https://www.fireeye.com/blog.html)
|
||||
- [Fox IT Security Blog ](http://blog.fox-it.com)
|
||||
- [Google Online Security Blog ](http://googleonlinesecurity.blogspot.ro)
|
||||
- [Graham Cluley ](https://www.grahamcluley.com)
|
||||
- [Hack Read ](https://www.hackread.com/)
|
||||
- [Heimdal Security Blog ](https://heimdalsecurity.com/blog/)
|
||||
- [Help Net Security ](http://www.net-security.org)
|
||||
- [Information Security Buzz ](http://www.informationsecuritybuzz.com/)
|
||||
- [InfoSecurity Magazine ](http://www.infosecurity-magazine.com)
|
||||
- [Kaspersky Lab’s Securelist ](https://securelist.com)
|
||||
- [Kaspersky Lab’s ThreatPost ](http://threatpost.com)
|
||||
- [KnowBe4 Blog ](https://blog.knowbe4.com/)
|
||||
- [Krebs on Security: http://krebsonsecurity.com)
|
||||
- [Malware Must Die: http://blog.malwaremustdie.org)
|
||||
- [Malwarebytes Labs ](https://blog.malwarebytes.org)
|
||||
- [Mashable ](http://mashable.com/category/cybersecurity)
|
||||
- [McAfee security blog ](http://blogs.mcafee.com)
|
||||
- [Microsoft Malware Protection Center ](http://blogs.technet.com/b/mmpc)
|
||||
- [Motherboard Vice ](http://motherboard.vice.com/en_us)
|
||||
- [Naked Security ](https://nakedsecurity.sophos.com)
|
||||
- [OpenDNS (Cisco Umbrella) Blog ](https://blog.opendns.com)
|
||||
- [OWASP -Not a blog, but a must - ](https://www.owasp.org)
|
||||
- [Packet Storm Security ](https://packetstormsecurity.com/)
|
||||
- [Paul’s Security Weekly ](http://securityweekly.com)
|
||||
- [PCMag’s Security Watch ](http://securitywatch.pcmag.com)
|
||||
- [Peerlyst ](https://www.peerlyst.com)
|
||||
- [Phish Labs Blog ](https://info.phishlabs.com/blog/)
|
||||
- [SANS Blogs ](https://www.sans.org/security-resources/blogs)
|
||||
- [SC Magazine ](http://www.scmagazine.com)
|
||||
- [Security Affairs ](http://securityaffairs.co/wordpress/)
|
||||
- [Security Magazine ](https://www.securitymagazine.com/)
|
||||
- [Security Week ](http://www.securityweek.com/)
|
||||
- [Softpedia ](http://www.softpedia.com/)
|
||||
- [Spiceworks Security ](https://community.spiceworks.com/security/general/)
|
||||
- [SpiderLabs Security Blog ](https://www.trustwave.com/Resources/SpiderLabs-Blog)
|
||||
- [Symantec's Blog: https://www.symantec.com/connect/blogs)
|
||||
- [TALOS: https://www.talosintelligence.com/)
|
||||
- [Tao Security ](https://taosecurity.blogspot.com)
|
||||
- [Techcrunch ](https://techcrunch.com/tag/security)
|
||||
- [TechTarget Security ](http://searchsecurity.techtarget.com/)
|
||||
- [Techworld Security ](http://www.techworld.com/security)
|
||||
- [The Art of Hacking courses GitHub repository ](https://github.com/The-Art-of-Hacking/art-of-hacking)
|
||||
- [The Guardian Information Security Hub ](https://www.theguardian.com/technology/data-computer-security)
|
||||
- [The Hacker News ](http://thehackernews.com)
|
||||
- [The Register ](http://www.theregister.co.uk)
|
||||
- [ThreatPost: https://threatpost.com)
|
||||
- [ThreatWire ](http://www.threatwire.net/)
|
||||
- [TrendMicro Blog ](https://blog.trendmicro.com/trendlabs-security-intelligence/)
|
||||
- [Tripwire Blog ](https://www.tripwire.com/state-of-security/)
|
||||
- [Troy Hunt ](https://www.troyhunt.com)
|
||||
- [US-CERT ](https://www.us-cert.gov)
|
||||
- [Webroot Blog ](https://www.webroot.com/blog/)
|
||||
- [Wired Threat Level ](http://www.wired.com/category/threatlevel )
|
||||
- [Zero Day ](http://www.zdnet.com/blog/security)
|
||||
|
||||
## YouTube
|
||||
- [AppSec Village](https://www.youtube.com/c/appsecvillage)
|
||||
|
Loading…
Reference in New Issue
Block a user