I was inspired by this tweet to compile a master-list of infosec-related blogs. Of course I knew this would turn up quite a few results but I’ve really been amazed by how much is out there! Infosec blogs of all shapes and sizes are out there in the wild and I want to find ‘em all. Will try to keep this up-to-date as I run across new sites. I’ve split it into blogs from “individuals” versus those run by larger commercial organizations. If i’m missing one you know of, or it’s your blog that is missing, please contact me!
For anyone interested, I’ve made available my exported .opml file (last exported: November 8, 2023) with the sources listed below. You can import this into the RSS reader of your choice! Personally, I use Feedly and can highly recommend the service. (I will try to update this export semi-regularly).
- Boutique Security Blogs
- Commercial Blogs
- Writeup Blogs
- Aggro Sites
Search is not overly optimized, may be a little jittery...
Total:
Boutique Security Blogs
- ./s1gh.sh
- #_shellintel
- /dev/null
- /dev/random
- 003Random’s Blog
- 0DAY
- 0DAY IN {REA_TEAM}
- 0day.click
- 0reg
- 0x1c
- 0x36
- 0x7D0
- 0xacb
- 0xash
- 0xblockz
- 0xbro
- 0xdeadbeef.info
- 0xdeadbeefJERKY Blog
- 0xDEADCODE
- 0xdeaddood
- 0xdstn
- 0xIvan
- 0xjams
- 0xPat blog
- 0patch
- 0x00sec
- 0x01 Team
- 0x41.cf
- 0x41414141 in ?? ()
- 0x44.cc
- 0X74696D
- 0x90r00t
- 0xbb
- 0xd4y
- 0xdf hacks stuff
- 0xdln
- 0xEdward
- 0xf00sec
- 0xf0x
- 0XFFFF
- 0xhuesca
- 0xinfection’s security ramblings
- 0xkasper
- 0xNinja
- 0xR3p41rm4n’s Cybersecurity Blog
- 0xReverse
- 0xRick’s Blog
- 0xrishabh
- 0xSaiyanGod.eth
- 0xsha.io
- 0xsp
- 0xStarlight
- 0xTriboulet
- 0DAY IN {REA_TEAM}
- 0ut3r Space
- 1 t0 Zero
- 1024MEGAS
- 10DEGRES
- 1234n6
- 128nops and counting
- 2019’s blog
- 2CODEMONTE
- 32x33
- 3OHA
- 3xpl01tc0d3r
- 3xp0rt
- 404 Security Not Found
- 4pfsec
- The 500 Hats of LambdaCalculus
- 5alt’s Blog
- 5pider.net
- 78ResearchLab
- 8051enthusiast
- A blog about rootkits research and the Windows kernel
- A Few Thoughts on Cryptographic Engineering
- a place of anatomical precision
- a real poke in the eye… oh…
- A2nkF’s Blog
- AaLI86 Security
- aalsuwaidi
- Aaron Schlitt
- Aaron’s Blog
- Abdallah Elnoty
- Abdelhamid Blog
- Abdillah Muhamad
- Abdulrah33m’s Blog
- Abdulrahman Makki
- Abdullah Hussam
- Abhiram’s Blog
- Aboullaite Med
- Abss
- The Abyss Labs
- accalon
- Access Vector
- The Accidental CISO Blog
- AccidentalRebel.com
- ACEResponder
- Ack Cyber
- acmpxyz
- acrypthash
- Active Directory Security
- acut3
- Adam Caudill
- Adam Chovanec
- Adam Doupé
- Adam Svoboda
- adam-p
- Adi “Adico” Cohen - Security Research Blog
- Adapt and Attack
- ADD / XOR / ROL
- Addictive Hackers
- Addison Crump
- Adepts of 0xCC
- ading2210
- Aditya Telange
- Aditya’s Blog
- Adnan Khan
- adnanmalikinfo
- Advance Programs and Tricks in Java
- Adversarial Stance
- AERMORed Blog
- aeternusmalus
- Aethlios
- affinesecurity
- AGARRi
- AGDC Security
- AGDERINTHE.CLOUD
- Agora Security
- AGS_Syndrome
- Ahmed Sherif
- AI Village
- Air Academy
- Ajinkya Pathare
- AK>
- Akenofu’s Blog
- Akijosberry
- Akshay’s Blog
- Al’s blog
- al3x in cyberland
- Alaa Abdulridha
- Alayi Hacker
- Albert Pedersen
- aldeid
- Alee’s Stories
- Alex Chapman
- Alex Franco
- Alex Haydock
- Alex Ionescu’s Blog
- Alex Levinson
- Alex Morgan
- Alex Plaskett
- Alex Santee’s Blog
- Alex Studer
- Alexander Bakker’s Blog
- Alexander Korznikov. A bit of security.
- Alexander Popov
- Alexander Slesarev
- Alexander V. Leonov
- Alexandre Dulaunoy
- Alexandre Pujol
- Alexy Vishnyakov
- Alfie CG
- Alfie Champion
- Alfie Njeru
- Ali Aqeel
- Alice Climent-Pommeret
- aliyun
- All About OSCP
- All Things Time Related…
- All Your Base Are Belong To Me
- Allele Security
- Allowsome Denyall
- allysonomalley.com
- ALMADJ.US
- Almond Offensive Security Blog
- Alice, Eve and Bob
- Alice Goldfuss
- Almost Secure
- Alpha Cyber Security
- Alpha Lab of Topsec
- Alsid
- AM0NSEC or this
- Amal Murali
- Amanjeev Sethi
- AmberWolf
- ambiso’s blog
- Amer Hukic
- Amethyst Systems
- Amin Bohio
- amirr0r
- Amit Schendel
- Ammar’s Blog
- Amol Baikar
- AMOSSYS
- An Analytical Approach
- an endless xploration..
- An00bRektn
- AnarSec
- Anas Mahmood - Hacker Inside
- ancailliau’s brain dump
- andpalmier
- Andrea Brancaleoni
- Andrea Fortuna
- Andreas Happe
- Andres Riancho
- Andrew Ayer
- Andrew Clark
- Andrew Kerr
- Andrew Nohawk
- Andrew Roderos
- Andrew S Taylor
- Andrew Zonenberg
- Andrey Konovalov
- Android Offensive Security Blog
- andy.codes
- Anh Duc Nguyen
- Ankit Anubhav
- Ansari Osama
- Anshuman Bhartiya
- anthok
- Anthony Weems
- anti.computer
- AntiTree
- anvbis
- apageinsec
- Apapedulimu
- Apeleg
- apenwarr
- apjone
- AppSec Ezine
- AppSec Monkey
- appsec.space
- AppSecGuy
- April King
- APT::WTF
- APT29a Security Blog
- Arash’s Blog
- arben.sh
- Arcade Hacker
- arcanian.is
- arcfour.cc
- Arch Cloud Labs
- Archie’s reversing diary
- Are We Safer Yet?
- areyou1or0
- argp
- Ariadne’s Space
- Aris’ Blog
- Arjen Wiersma
- Arjun Shibu
- Arkadiy Tetelman
- Arne Swinnen’s Security Blog
- Arseniy Sharoglazov
- The Art of Machinery
- Artegium
- Artem Baranov
- Artem Golubin
- Artem Kondratenko
- Artificial truth
- ArtResilia
- Artsploit
- arttnba3’s reservation
- arty-hlr
- Arun Raghavan
- arxenix’s blog
- Aryeh Goretsky
- Asahi Lina
- Aseem Shrey
- Ash King
- Ashish Rana
- Ashley Pearson
- The Asshat
- Astr0baby
- astr.al
- AstralVX
- Aswin Thambi Panikulangara
- AtomicNico
- Attack Debris
- attack ships on fire
- Attactics
- Attila Suszter
- attl4s.github.io
- Atum
- Aura Research Division
- AURORA4N6
- AUTOMA
- avasdream
- AwakeCoding
- Awakened
- Awarau
- Axel Persinger
- Axelarator
- Ayaz Mammadov
- Azid’s Infosec Journey
- Azr43lKn1ght
- azuki.vip
- Azure AD Stuff
- Azure Viking
- b.27p.de
- b1ack0wl
- Babligan
- Back Engineering
- B’AD Samurai
- bad5ect0r
- badbit.vc
- BadCyber
- BadOption.eu
- Bahruz Jabiyev
- Baibhav Anand Jha
- Baker Street Forensics
- Bálint Magyar
- Baltazar Studios
- Banana Mafia
- The Bandit’s Bytes
- Barbells and Root Shells
- bartunek.me
- BashBreach
- Bastian Bloessl
- batsec
- bazad.github.io
- BBQSec
- Be The Adversary
- Be4Sec
- BEELOG
- Beesley.tech
- Beetles Blog
- Belette Timorée
- Believe and Persist
- BelovedTech
- <Ben>
- Ben Balter
- Ben Heise
- Ben Prime
- Ben Stone Online
- Ben Tasker
- Ben’s Blog
- Ben’s ideas and projects
- BEND0US
- Benjamin Heald Personal Security Blog
- Benji Vesterby
- Bentham’s Gaze
- Bergee’s Stories on Bug Hunting
- Bernardo de Araujo
- better appsec
- {BETTER} HACKER
- Between The Hacks
- Between Two Firewalls
- Beyond XSS
- Bhashit Pandya
- Bhavuk Jain
- bi.tk
- big0us
- Bill Demirkapi’s Blog
- Bill Sempf
- Bill’s Blog
- Binary Debt
- Binary Research
- Binary’s Blog
- BinaryChunk
- BinaryLabs
- Binge on Cyber
- BishopFox
- The Bit Explorer
- Bitquark
- Bits of Security
- Bitsadmin
- Björn Kimminich
- bl4ckarch
- Black Swan Security
- BlackCloud
- Blah Cats
- Blake Eakin
- Blake’s R&D
- Blake Regan
- Blas
- Blawg
- Blaze’s Security Blog
- Bleekseeks
- Blog de Alevsk
- Blog de Ciberseguridad en Latinoamérica
- Blog du CRI
- BLOG OF F1SH
- Blog of Osanda
- The blog of a gypsy engineer
- BLOG_TITLE
- BlooTeem
- Blue Team Blog
- Bob Galley
- Bof.
- Bogner.sh
- bohops
- boku
- boku7
- Borderline
- br0k3nlab
- Br0nw3n’s World
- bracamontesman dot click
- Brain on Fire
- brainattic.in
- BrainOverfl0w
- Brandon Shi
- Brane Dump
- Brazil’s Blog
- BreakDev
- Breaking Bits
- BreakInSecurity
- Breanne Boland
- Brendan Chamberlain
- Brendon
- Brett Buerhaus
- Brett Shavers | Ramblings
- Brian Beaudry
- Brian Smith
- bricked.tech
- Bridgeblog
- Bright Engineering
- BrightProgrammer
- Broken By Design
- brute ratel By Dark Vortex
- Brute XSS
- brutecat
- Bryan McNulty
- brycec.me
- Bug bounty
- Bug Bounty Findings By Meals
- Bug Zero
- bugra.ninja
- The bugs you are looking for and this
- bunnie:studios
- Burninator Sec
- BushidoToken
- bussink
- The Butcher Shop
- bw3.dev
- bWlrYQ
- Byte Breach
- byte.how
- c-APT-ure
- c-skills
- C:\HRISTINA MORILLO
- c0nfusion
- C2Links
- Cafaro’s Ramblings
- Caffeine’s Site
- Caleb Sima
- Calif
- Call4Cloud
- campbell.scot
- Can I Haz Security
- Can.ac
- Canada VPNs
- CANIS Automative Labs CTO blog
- Capt. Meelo
- CaptainFreak
- Carlo Maragno
- Carnal 0wnage
- Carrie Bartle
- Cas van Cooten
- Cascadia Crow
- Cassie Cage
- castilho
- Casual Digits
- cat /dev/brain
- cat /etc/shadow
- Catching Phish
- Catileptic.tech
- catnip
- CATSCRDL
- cawan’s blog
- Cem’s Blog
- Cendyne.dev
- cerbersec
- ceres-c
- CH. Nesrine
- Chaah
- champtar.fr
- chancej715
- Chandrapal Badshah
- Chao-tic
- Charles Roop
- Charlie’s blog
- Chatter From a Charlatan
- Chebuya
- Cheeky4N6Monkey
- Chester Wisniewski
- ChiefGyk3D
- chompie at the bits
- Chovid99
- Chris Clarkson
- Chris Dale
- Chris Farris
- Chris Fenner
- Chris Long
- Chris Mullins
- Chris Partridge
- Chris Sanders
- Chris’s Security and Tech Blog
- Christian Bortone
- Christian Huitema
- Christoph Michel
- Christophe Brocas
- Christophe Tafani-Dereeper
- Christopher Jerkeby
- Christopher Tarquini’s Blog
- Chuong Dong
- Chybeta
- cinzinga
- Ciofeca Forensics
- CirrusTech
- CIRT.net
- CISO.PM
- Claire Levin
- Clayton Errington
- clayton’s site
- clearbluejar
- Clement Briens
- Clément Notin
- Clever Title Goes Here
- Clinically Awesome
- Cloud Native Security Talks
- Cloudbrothers
- Cloudy Minds
- cnblogs
- Co0nan
- cocomelonc
- Cocoon
- Coda Hale
- Code White
- codeblog
- CodeColorist
- CODEINSECURITY
- codemuch.tech
- CoderOasis
- Cody Dostal
- Coen Goedegebure
- Collier Jam
- Colins Security Blog
- colton1skees
- Communication Breakdown
- Computer Insecurities
- Computers Are Bad
- COMSEC
- Conor Richard
- Connor McGarr
- Considerations on Codecrafting
- Console Cowboys
- Container Security Site
- CoolerVoid tavern
- Corben Leo
- Cornelius Aschermann
- CornerPirate
- costaskou
- Count Upon Security
- counterintellligence.pl
- Courk’s Blog
- covert.io
- CQCore
- The cr.yp.to blog
- cr0
- Cra0
- Crader Security
- Craig Andrews
- Craig Hays
- CramHacks
- CrankySec
- Crash Override
- Crash Security
- crnković
- Cronop.io
- Crumbs of Cybersecurity
- Crypt0ace
- crypt0g30rgy
- CryptoGotchas
- Cryptograph3r
- Cryptohack
- CryptoLek
- Cryptologie
- cryptrz
- CS Dev Blog
- csandker
- Cshark.dev
- CSIRT CTI
- ctfiot
- cti.monster
- ctrl.red
- CTurt
- cube0x0
- Culbert Report
- cupc4k3
- Curated Intelligence
- Curmudgeonly Ways
- CuteKernel Space
- cutesmilee’s blog
- cxiao.net
- cyanpencil’s blog
- Cyb3rSecurity Tips
- CYB3RSN0RLAX
- Cyber 5W
- Cyber Army
- Cyber Detective
- Cyber Experience Input|Output
- Cyber Geeks
- Cyber Gladius
- Cyber Judo
- Cyber Sec Nelly
- Cyber Security Crumbs
- Cyber Security (Why For Me?)
- Cyber Security Universe
- Cyber Sekler
- Cyber Sins
- The Cyber Union
- The Cyber Writer
- cyber.wtf
- The Cyberclopaedia
- Cybercrime Diaries
- Cybercrime Information Center
- CyberCrime & Doing Time
- CYBERDEFNERD
- Cyberdom
- Cyberdough
- CyberEthical.Me
- CyberForensics
- CyberFront
- Cybergibbons
- Cyberick
- CyberKACH
- Cybernotdienst
- CyberRaiju
- CyberSecPolitics
- Cybersecurity For All
- The Cybersecurity Librarian
- Cybersecurity World
- Cybershenanigans
- cybersim
- CyberSmash
- Cybersoc Digital Marketing
- Cyberspark
- cyberstoph
- Cybervandals
- cyberwhatnow
- CyberY
- CyberZombi3
- Cybher Diaries
- CybristerBoy
- cygnetix
- Cyphur Blog
- Cyrill Künzi
- d01a
- D20 Forensics
- d3lb3_
- D4 project
- Daax Rynd
- daddycocoaman
- Daehee Park
- daeken
- Daemonic Dispatches
- Dak.lol
- Damiri
- Dan Clemente
- Dan Glass
- Dan McNulty
- Dan Revah
- Dan Staples
- Dana Epp’s Blog
- Dancho Danchev
- Dangerous Payload
- Daniel B
- Daniel Chateau
- Daniel Chronlund Cloud Tech Blog
- Daniel Gebert
- Daniel Gorbe
- Daniel Grzelak
- Daniel Kelley
- Daniel Kliewer
- Dani Martinez
- Daniel Mayer
- Daniel Moghimi
- Daniel Plohmann
- Daniel Stenberg
- Daniel Thatcher
- Daniele Antonioli
- Daniele’s blog
- Danilo Rodrigues
- Danny Quist
- DANQ
- Dark Lord of the NIST
- Dark Symphonie
- Darknavy
- DarkwebDaily.Live
- Darren Martyn
- Darryn Brownfield
- Darvin’s Blog
- DataBreaches.net
- datalocaltmp
- Dataparty
- Datawok
- Dator Liberatitis
- Dave
- Dave Waterson on Security
- David Buchanan
- David Nechuta
- David Schutz
- David Sopas
- David Westerfield
- Dawid Potocki
- Dawns Lab
- DAY0
- Dazzy Ddos
- de engineering
- deadf00d
- DeathByTape
- Debasish Mandal’s Blog
- debugagent
- Decaff Hacking
- decidedlygray
- Dec0ne Blog
- Decoder’s Blog
- deeb blog
- Deepsec
- Dejan Zelic
- delroth
- DELTA
- Denis Donadel
- Dennis Babkin
- Dennis Kniep
- Denwp Research
- Deploying Securely
- Derek Abdine
- Derin Eryılmaz
- derp turkey
- Designing Secure Software
- Details of Note
- Detection Engineering
- DEV
- Devansh’s Blog
- DevSecOps Docs
- Deyda
- DFIR & Ramblings
- DFIR and Threat Hunting
- DFIR Diva
- DFIR notes
- The DFIR Report
- DFIR TNT
- dfir.blog
- dfir.ch
- DFIRLinks
- DFIRSec
- Dfreshalot
- DFSEC Research
- DFWORKS
- dgl.cx
- Dhole Moments
- DiabloHorn
- Dial Tone
- Diary of a reverse-engineer
- Didier Stevens
- DigiNinja
- Digital Forensic Science
- Digital Interruption
- Digital Skill
- Dillon Franke Security
- Dimitrios Slamaris
- Dirk-jan Mollema
- disconnect3d’s blog
- discrete blogarithm
- Dissecting Malwa.re
- Distributed Compute
- Divyanshu Mehta
- Dixit Aditya
- DJ Schleen
- DMFR Security
- Dmitry.GR
- dnsprincess
- DO1ALX
- docfate111
- Dominic Breuker
- Dominic White
- Doomsday Vault
- The DOS Blog
- Dosxuz
- doubleagent.net
- DoublePulsar
- [DoubleTake]
- dougallj
- Douglas Stebila
- DovTheLachman
- Down To The Wire
- downeg
- DownUnderCTF
- downwithup
- Doyensec
- doyler.net
- dozer.nz
- Dr. Chaos
- drakonia’s blog
- Drew DeVault
- DreyAnd
- DroneSec
- Dropsafe
- dtmsecurity
- Duale Siad
- Dungeon of the Domain Admins
- Dylan Katz
- Dylan Roussel
- Dynamic World
- easySIEM
- Eclectic Koala
- ecos.wtf
- edermi’s Blog
- EdOverflow
- Eduard Schwarzkopf
- Efiens CTF Team
- Egor Homakov
- ehpus
- eikendev
- Electrovolt Blog
- Eli Grey
- EliE
- Elisabeth’s Cybersecurity Blog
- elkemental Force
- Elli Shlomo
- Elliot on Security
- Elma
- ElMahdi and ElMahdi - マハディ
- Elmasy Blog
- Elon Gliksberg
- ElSec
- Emanuel Duss
- embed-me
- Embedded Systems Security and TrustZone
- embeddedbits
- Embee Research
- Embrace The Red
- Emily M. Stark
- Emily Trau
- EmptyDC
- Enigma Labs
- Enindu Alahapperuma
- Enitin Blog
- ENOSUCHBLOG
- Enrico Bassetti
- Enscribe
- Enterprise Detection & Response
- enumerated
- env.fail
- eostrix.net
- epi052
- The EPIC.blog
- eqqn Security blog
- erawlam
- erev0s
- Eric Conrad
- Eric Daigle
- Eric Hogue
- Eric on Identity
- Eric Ooi
- Eric’s Apparatus
- Erin Avllazagaj
- erfur’s bits and pieces
- erk3’s spot
- Errata Security
- erri120’s random Blog
- es3n1n’s Blog
- Esjay’s Blog
- Eslam
- esp0x31
- Estrellas’s Blog
- eta
- ETenal
- Ethical Chaos
- ethicalhacking.sh
- Etienne “tek” Maynier
- ETTIC blog
- eu90h
- Evan Boehs
- Evan Connelly
- Evan Ottinger
- Evan Ricafort
- eversinc33
- Everything DFIR…
- Everything is Fine
- Evi1cg’s blog
- THEEVILBIT
- EvilPacket
- evilsocket
- EvKIROSpem
- Evonide
- evren’s blog
- Ex Android Dev
- Exfiltrated.com
- Exploit
- Exploit Research Blog
- Exploit Reversing
- Exploits For Sale
- exploits.club
- Explore Security
- Eyal Daniel
- Eyal Itkin
- Ezequiel Pereira
- Ezhes
- Ezra Buckingham
- f0rg’s blog
- f33d by Prelude
- f4d3
- Fabien Sanglard’s Website
- Fabio Freitas
- Fabio Pires
- Faded Lab
- Fady Othman
- Faith
- Faith 2
- FalconSpy
- Falling Forward
- Family Guy | The Quest For Stuff
- Fancy Bear Friends
- Fareed Fauzi
- Farewell Song
- fdvoid0
- Federico De Meo
- Felipe Molina de la Torre
- Felix Krause
- Felix M
- Ferib’s Blog
- Fernale
- Fernando Guisso
- Fernweh
- files.ninja
- The Final Hop
- fin3ss3g0d’s Blog
- FinchSec
- finixbit
- FIREFART
- Fireshell Security Team
- The Firewall
- Firewalls Don’t Stop Dragons
- Firzens Blog
- Flaksec
- Flaviu Popescu
- flawed.net.nz
- floyd.ch
- Fluxsec
- FO-Sec
- footstep.ninja
- Forces Unseen
- forensicmike1
- Forensics | Exchange
- ForensicXLab
- Forgotten Nook
- Forrest Orr
- forsec
- Forward Slash Security
- Francisco Correa Security.log
- fred’s notes
- Frederik Braun
- Frederik Reiter
- freeZion
- Fresh Eggs
- Friends & Security
- FrizK
- FrizN
- fudgedotdotdot
- Full of Miracles
- Full Spectrum Things
- Fumik0_’s box
- Fun With Tech
- Fura Labs
- Furrtek
- Futurelopment
- Fuxsocy
- Fuzzing Science
- fuzzysecurity 2.0
- fyr.io
- g0blin Research
- G3tSyst3m’s Infosec Blog
- Gabriel Durdiak
- Gabriel Kerneis
- Gabriel Schneider
- Gabriel Vasseur
- Gal Nagli
- Gal Weizman
- Gamozo Labs
- Garbage Institute
- Garrett Brown
- Garrett Mills
- Garrit’s Notes
- Gary’s hacking stuff
- Gaurang Bhatnagar
- Gaurav Narwani
- gccybermonks
- Geek Freak
- Geek Girl
- GeekMasher’s Blog
- Geeky Cat
- GeneralEG 0x01
- George Osterweil
- George Skouroupathis
- Georgia Crossland
- Gergely Kalman
- Gerhard Steinbeis
- GhettoBastler
- GhostCCamm’s Cyber Misadventures
- GhostInTheHive
- GHOSTLULZ HACKS
- ghozt
- Gianluca Pacchiella
- Giovanna Chadid
- Giovanni Rocca
- Giraffe Security
- Gironsec
- Glenn Pegden
- Glitch Cat
- Go350
- Goblin Loot
- GoDiego
- GoggleHeadedHacker
- Going Beyond Grep
- Gokberk Yaltirakli
- Goku
- Gonçalo Ribeiro
- Good Debate
- Good Workaround!
- got 0day?
- Graham Helton
- Grapl
- Gravitywall Blog
- Grazfather
- Greek geek
- Greg Lesnewich
- Greg Molnar
- The Grey Corner
- GrimBins
- GrimmzSec
- Group-IB
- Growing Web Security Blog
- GTFOBins
- Guido Vranken
- Guillaume Quere
- gum3t
- Gupta Shubham
- Guy Lewin’s Blog
- gynvael.coldwind//vx.log
- h.acker.is
- h0wdy partners
- h3xStream’s blog
- H4cking Labs
- Haacked
- Haboob
- hacefresk0
- HACK
- Hack N Patch
- Hack The Planet
- Hack The World
- Hackademic.in
- hackademix.net
- hackArcana
- HackCommander
- hackcompute
- hackd
- The Hacker Blog
- The Hacker Factor Blog
- Hacker AI
- The Hacker Factor
- Hacker Fiction Net
- HackerChai
- Hackerman’s Hacking Tutorials
- Hackerspot
- HackGuru.tech
- Hacking & Coffee
- Hacking and security
- Hacking but Legal
- Hacking Articles
- Hacking Exposed Computer Forensics
- Hacking Journey
- Hacking Lab
- Hacking The Cloud
- Hacking the planet…
- Hackintosh 5
- Hacklad’s Blog
- HackLiu’Blog
- HackMD
- hackndo
- Hackrate
- hacks.gr
- hackso.me
- hackster.io
- Hacktive Security Blog
- HackTricks
- Hacktus
- hacky.solutions
- Hackyboiz
- Haft of the Spear
- Haider Mahmood
- Haircutfish
- HAKLUKE
- Hal Pomeranz
- Half Full of Security
- Hanno’s blog
- HanseSecure
- Hardik Nanda
- Hardware hacking tutorials by Ori
- Harel Security Research
- harmj0y
- Harry Gill
- Harry Sintonen
- Harsh Jaiswal
- Harshad Gaikwad
- hasherezade’s 1001 nights
- Hassan Khan | Security Researcher
- Hatena Blog
- hateshape
- hatless1der
- Hats Off Security
- Hausec
- Haxatron’s Research
- HAXOLOT.com
- Haxor.no
- haxrob
- Haxxin
- Hayden James
- Hayden Nolan
- haymiz
- Hazanasec
- Hazem’s Blog
- hckng
- HD Moore
- HEARTBURN
- hedgehog’s cave
- Hedysx
- Heitor Gouvêa
- Hela Lucas
- Hela’s Website
- Helich0pper
- Hella Secure
- herm1t
- hesec
- hethical
- Hex Fish’s Blog
- Hexacorn
- hexatomium
- HideAndSec
- High Signal Security
- HighOn.Coffee
- Himanshu Anand
- Himanshu Khokhar
- hipotermia
- HiR Information Report
- HoangND
- HOLDMYBEER
- Home of Pierre
- homecrew
- homjxi03
- Honoki
- Hop Infosec
- HOPE
- hosch3n
- hot3eed
- HoyaHaxa
- HTTP418 InfoSec
- Hugo Landau
- Huli
- The Hive
- The Human Machine Interface
- Hung Ngo
- HYDROX.fun
- hypervision tips and tricks
- Hypervisor Memory Introspection
- Hypn.za.net
- hyprblog
- I Am Security
- I CAN Hack
- I hate software
- Ian Carroll
- Ian Duffy
- iamelli0t
- iamse.blog
- Iandave’s Blog
- iblue.team
- Ibrahim Raidia
- ic3qu33n
- icanhaspii CTF Stuff
- Icyguider’s Blog
- idcaboutprivacy
- Ido Veltzman
- idontplaydarts
- Igor’s Blog
- iGuru
- IHTeam
- ijustwannaredteam
- ikuamike.io
- Ilan Kalendarov
- Illuminated Security News
- Ilya Kobzar
- Imaginative Realities
- imp0rtp3
- ImperialViolet
- Inane Observations
- Incendium.rocks
- incogbyte.sec
- incolumitas
- independent security evaluators
- Inderjeet Singh - rashahacks
- infernux.no
- infiltrateops
- Infosec Adalid
- Infosec Engineering
- Infosec House
- InfoSec Innovations
- Infosec Rabbit Holes
- Infosec Worrier
- infosec.tirol
- InfoSecDay
- InfosecMatter
- InfoSect
- InfosecVidya
- ing.zip
- ingredous &
- Inicio
- init infosec
- initblog.com
- Initialization vectors
- InkBridge Networks
- INPUTZERO
- Insane blabbering of an old man
- insec.life
- Insecure mode
- Inside Out Insights
- Insinuator
- Intel + Graphy
- Interrupt 0x80
- Into the Abyss
- Into The Symmetry
- Introvert Mac
- Intruder
- Intrusion Truth
- INulledMyself
- inversecos
- Invoke Reversing
- ioc.wiki
- io::pewpew()
- Ionut Balosin
- iOS Snapshot Fuzzing
- IP3C4C’s Infosec Adventure
- ipfyx
- ipsw
- ircmaxell
- Irene Y. Zhang
- iRISC research syndicate
- Irresponsible Disclosure
- Ishaq Mohammed
- Isira Adithya
- IT Security Expert Blog
- Itay lellin
- itm4n
- ITTavern
- Ivan Kwiatkowski
- Ivan Velichko
- iwantmore.pizza
- J0VSEC
- Jaap-Henk Hoepman
- Jack
- Jack Cable - Blog
- Jack Hacks
- Jack Philip Button
- Jack Rendor
- Jack Whitton
- jackfromeast’s blog
- Jackson Huff’s Blog
- Jackson T.
- Jacob Kaplan-Moss
- Jacob Riggs
- Jad Karaki
- Jake Archibald
- Jake Creps
- JakeWnuk
- Jakub Jarosz
- jamchamb’s blog
- James Clee
- James Coote
- James Kettle
- James Stevenson
- Jamie Finnigan
- Jamie Levy
- Jamie Scaife
- Jan0ski’s Security Blog
- Jane Manchun Wong
- Jarvis’s Blog
- Jasminder Pal Singh
- Jason Haddix
- jasono.io
- Jatin Dhankhar
- javierprtd Blog
- Jay Bosamiya
- jc0b
- Jean-Christoph von Oertzen
- Jeff Codes Things
- Jeffrey Appel
- Jeffrey Bencteux
- Jeffrey Paul
- Jeffrey Tigchelaar
- JeffSoh on NetSec
- Jelle van der Waa
- Jelle Vergeer
- Jeltz
- Jemma Issroff
- Jeroen Gui
- JerryGamblin
- Jesse Li
- Jeti’s blog
- Jilles
- Jim Fisher
- JimJourney
- Jineesh AK
- Jinone
- jjensn
- Joakim Uddholm
- Joe Dillon
- Joe Security Blog
- Joe T. Sylve, Ph.D.
- Joern
- joev.dev
- joeware
- Johannes Bader
- John D. Cook
- John Graham-Cumming
- John Hubbard
- John Jackson
- John Misczak
- John Opdenakker
- John Stawinski IV
- John Woodman’s Security Blog
- Jomar Website
- Jon Palmisciano
- Jonathan Claudius
- Ohnathan Protzenko
- Jonathan Schnittger
- JonLuca’s Blog
- Jonsdocs
- joonas.fi
- Joran Honig
- Jordan Potti
- Jordan Wright
- Joren Vrancken
- Jorge CTF
- Jorge Lajara
- Jorian Woltjer
- Joseph Kirwin
- Joseph Tulowiecki
- Josh
- Josh Grossman
- Josh Lemon
- Josh Merrill
- The Joshmeister on Security
- Joshua Jebaraj
- Joshua.Hu
- joshuamasek
- Josip Franjkovic + archive
- Jon’s Site
- Joxean Koret
- JPCERT
- JPRX
- JSPIN
- JTNYDV
- Juan Andrés Guerrero-Saade
- jub0bs
- Julien Vehent
- Jump ESP, jump!
- Jump ESP, jump!
- Just Another Hacker Blog
- Just Another Hacking blog
- Justin G. Mitchell
- Justin Gan
- Justin Hysler
- Justin Miller
- Justin’s Blog
- justinsteven
- justsecnow
- jwlss.pw
- K0de Less
- k3170
- K3XEC
- k4m1ll0
- Kai Greshake
- Kai Kaufman’s tech blog
- Kailash
- Kalmarunionen
- Kamil Onur Ozkaleli as ko2sec
- Kamil Vavra
- kanbach
- Kane Narraway
- Karim Rahal
- Karit
- Karma(In)Security
- Kat Traxler - Taste the IAM
- Katana Security
- Katie Paxton-Fear
- Kayssel
- kazet.cc
- kciredor’s information security blog
- keefer.io
- Keerok
- Keith Novak
- Kelly Shortridge
- Ken Shirriff’s blog
- Keowu
- kernal
- kernel panic
- KernelPicnic
- Kevin Jones
- KevSec
- kewde
- Key Findings
- Key Material
- Keyboard Warrior
- Khalid.SE
- khonggianmang
- kibty.town
- Kicksec.io
- Killing The Bear
- killrbunn3
- Kishan choudhary
- kiwidog’s blog
- Klecko
- klrgrz
- Kmille
- kmsec
- KnifeCoat
- Knightsbr1dge
- Knowledge Base
- Koen Rouwhorst
- Kristal’s Notebook
- Kristov Atlas
- Krypt3ia
- krystalgamer’s Lair
- Kuldeep’s Blog
- Kumar
- Kunai
- kuronosec
- KURU Lounge
- Kusto King
- Kusuwada
- Kuzey Arda Bulut
- Kyle B3nac
- kyleavery
- kylebot’s Blog
- kymBlog
- KZA
- L3o
- Lab of a Penetration Tester
- Laconic Wolf
- Ladislav Bačo::MWLab
- Lady Secspeare
- Lafdrew
- Lambda driver blog
- lambda.cx blog
- Land of Jacob’s Musings
- lander’s posts
- The Last Watchdog
- LastStandSecurity
- Lauren Weinstein
- Laurent Gaffie
- lcamtuf’s blog
- Le blog du Phil
- Le Bron Does Security?
- Learning by practicing
- Ledger Donjon
- Lee Holmes
- leethax0.rs
- Legacyy
- The Legend of Random
- Leigh-Anne Galloway
- Lenny Zeltser
- Leon Jacobs
- Leon Jza
- Lets Automate It
- Let’s Reverse!
- leucosite
- Level Up Info Sec
- Levi Schuck
- LFYSEC
- liberty-shell
- librondo
- Licencia para Hackear
- Life In Hex
- Light Blue Touchpaper
- Ligniform
- liman.io
- LimitedResults
- Lingua Diabolis
- linhlhq’s blog
- Linus Lagerhjelm
- Linux Audit
- LinuxForensics
- Linxz’ Blog
- LiquidSec
- Liran Tal
- Little Man In My Head
- lkmidas
- LlamaSec
- LockBoxx
- LODSB
- Logical Bimboo
- lolcads tech blog
- LOLWARE
- Lord_Idiot
- Lorenzo Meacci
- LoRexxar
- Lost In Security
- The Lost Notes
- Lotte’s Attic
- Loudwhisper
- Low Level Pleasure
- Low-level adventures
- Low-Level Software Security for Compiler Developers
- lowleveldesign.org
- Luan Herrera
- Luca Allodi
- Lucas Luitjes
- lude.rs
- LuemmelSec
- Luigi Auriemma
- Lukasz Olejnik
- Luke Craig
- LukeGix
- Luke Tucker
- Lupin & Holmes
- Lutfu Mert Ceylan
- lwt hiker
- ly0n.me
- lyra’s epic blog
- M. ȘTEFAN CRISTIAN
- m0chan
- m19o
- m417z
- m4gnum’s blog
- m4iler
- M4t35Z’s blog
- ma4ter
- Mac Chaffee
- Mac Pierce
- Machevalia
- Mad Irish
- Madaidan’s Insecurities
- madStacks.dev
- The Magic of Learning
- mahaloz
- Mahmoud Gamal
- maia blog
- MakoSec
- Malasada Tech
- Malay’s blog
- malgregator
- Malicious Group
- malicious.link | boot mubix.kernel
- malicious.pro
- Mallaichte
- Maloley.me
- Malware Analysis with Dingus
- Malware and Stuff
- Malware Foundation
- Malware Maloney
- Malware Musings
- Malware Must Die!
- Malware Traffic Analysis
- Malware Werewolf
- malware-analysis
- Malware-Insight
- malware.pizza
- malware.re
- MalwareTech
- Manchester Grey Hats
- The Mandos Way
- mannharleen
- mannulinux
- Mantas Sabeckis
- MANTISEK
- Manuel Sousa
- Marco Lancini
- Marco Negro
- Marco Ramilli
- Marco Squarcina
- Marcus Botacin
- Marcus Edmondson
- Marcus Ranum
- Marcus Young
- Marek Geleta
- Mark F Hunt
- Mark Rowe
- markitzeroday.com
- Markus Krell
- Markuta
- martabyte
- Marten Seemann
- Martin Albrecht
- Martin Amps
- Martin Mielke
- Martin Vigo
- Martin’s Blog
- matan
- Mateo Mrvelj
- MatheuZ
- Mathy Vanhoef
- Matt Burrough
- Matt Glass
- Matt Langlois
- Matt Palmer
- Matt Traudt
- Matt’s internet home
- Matt’s Life Bytes
- Matteo Mandolini
- Matthew Green
- Mattias Geniar
- mattjay
- Maurice Heumann
- Maurice’s Blog
- Max Ammann
- Max Kersten
- Max Maass
- Maxwell Dulin
- Maya Kaczorowski
- Mayfly
- Mazin Ahmed
- MB blog
- Mcbuggy
- mcndt
- Mechanical Sympathy
- MEDI
- Mehloul Mohamed
- Mehmet Ergene
- Mehran Armiyon
- Memory Corruption
- Memory Forensic
- Menasec
- Mert Sarica
- mert’s blog
- mez0
- MG
- mgeeky’s lair
- Micah Lee
- Michah’s 0-Day
- Michał Bentkowski
- Michael Goodman
- Michael Hoefler
- Michael Horowitz
- Michael Hyndman
- Michael Kjörling
- Michael Lynch
- Michael Peters
- Michael Veale
- Michael W Lucas
- Michael Waterman
- Michael Weissbacher
- Michalis Kamprianis
- Michalis Michalos
- Michele Campa
- Michiel Evers - Infosec Blog
- Mickey’s Blogs
- Microsoft 365 Security
- Microsoft Browser Vulnerability Research
- Microsoft MORSE
- Microsoft Security Solutions
- Midi12’s blog
- Mika’s Blog
- Mikail’s Blog
- Mike Brancato
- mike gualtieri
- Milo2012’s Security Blog
- Minder-Security
- Mindslaves Blog
- Ming Y. Chow
- misconfig.io
- MitmLab
- mitmproxy
- mizu.re
- The Mitten Mac
- mjg59
- mkiesel.ch
- ML for Cyber Defenses Blog
- MLsec Musings
- mmmds’s blog
- MMPA
- mobile-hacker
- MÖBIUS STRIP REVERSE ENGINEERING
- modexp
- Mohamed Elbadry
- Mohamed Sayed
- Mohamed Sultan
- Mohamed Fakroud | Red Teaming’s Dojo
- Mohit Dabas’s Blog
- Mohit Mishra
- The Moloch
- Molx32
- Monke’s Cybersecurity Blog or pmoc.netsoc
- Moopinger
- Morten Linderud
- MOV AX, BX
- mr.d0x and this
- Mr Bruh’s Epic Blog
- Mrs Quis Will Think of a Better Title
- Mrvar0x - YME
- MRXstudios
- MSKB(en) and JP
- Mudit Gupta’s Blog
- muffSec
- Muhaddis
- Muhammad Adel
- Muhammad Hasan Ali
- Muhammad Thomas Fadhila Yahya
- Muirey03’s Blog
- Munrobotic Cyber Security Blog
- musana
- Musings of a cat torturer
- Musings of a lifelong n00b
- Mustafa Kemal Can ~ Muskecan
- Muzec’s Cyber Security Blog
- My “Public Evernote”
- My DFIR Blog
- my little techie blog
- MyCyberResources
- Mykola’s blog
- Mysk
- mzfr’s Blog
- N B Sri Harsha’s Blog
- n0.lol
- N00PY BLOG
- n0kovo
- n0nuser
- n0ps
- n0ps blog
- N1ght-W0lf
- N1k0la’s blog
- n4r1b
- Naci’s blog
- Nafiez
- NAHAMSEC
- nahoragg
- Najam Ul Saqib
- Naksyn’s blog
- Nandan Kumar
- nao_sec
- napongizero
- Naresh LamGade
- narly.me
- Nasty Stereo
- Nathan Farlow
- Nathan McNulty
- nathan’s security blog
- Navdeep
- NAVEEN
- Navendu Pottekkat
- Navigating The Shadows
- nc-lp.com
- ndevtk
- nee.lv
- Neil Madden
- Neiman
- neodymiumphi
- Neolex
- neonprimetime security
- NeroTeam Security Labs
- Netero1010 Security Lab
- NetSec Focus
- netspooky
- Network Logician
- The New Oil
- Nick Desaulniers
- Nick Frichette
- Nick G
- Nick Gregory
- Nick Selby
- Nick’s infrequently updated blog
- NickstaDB
- NickZero’s Blog
- Nicky Mouha
- Nico Dekens | Dutch OSINT Guy
- niconiconi’s blog
- Niebardzo’s Blog
- Niemand
- Nightwatch Cybersecurity
- Nikhil (niks)
- Nikolaj Schlej
- The Nimble Nerd
- Ninad Mathpati
- ninetyn1ne
- Nirmal Dahal
- Nirmal Thapa
- Nishant Jain
- NixIntel
- nns.ee
- No Security
- no-sec.net
- Noah Clements
- Noah Gregory
- Noah Lab
- Noah Weinberg
- Nodauf
- Node.js Secure Coding
- Nody’s blog
- NomanAli181 | BugBaba
- Noncombatant
- NOO8x.in
- Noob to !Noob
- NOOB2PRO4N6
- nopcorn
- Nord Security
- Nordic Offsec
- NoRed0x
- NorthSea’s Blog
- Not Simon
- not so pro
- not-matthias
- notes on sec & tech
- NotOnly.Owner
- NotSoSecure
- nowotarski.info
- NSEcho blog
- nu1lptr
- Null Hardware
- Null Sector
- Null Sweep
- Null@Root
- NULL_SEC
- nullg0re
- nullpt.rs
- NullSecurity
- nullteilerfrei
- NUS Greyhats
- Nut Crackers Security
- nuxx.net
- nv1t
- NVISO Labs
- nxadmin
- nxb1t
- Nyangawa
- Nygetin Paikka - Pigeons!
- nyxgeek
- OA Labs
- OBABY@MARS
- Obmi’s blog
- Obum Chidi
- Occurative
- oddlama
- Oddvar Moe
- ODS Security Research
- Offensive AI Lab
- Offensive Context
- Offensive Defence
- Offensive OSINT
- Offsec Journey
- ohCoz’s corner
- oldboy21
- Oleg Kutkov
- Oliver Jensen
- Oliver’s Blog
- OllieJC
- Omar Minawi
- omarbv
- omega point
- Omer Levi Hevroni
- Omespino
- OMG! It’s me!!
- Omid Farhang
- On The Hunt
- On Web-Security and -Insecurity
- One Eyed Techs
- One Night in Norfolk
- one.0day.works
- onlyf8
- ONSEC
- op-co.de
- Open Source DFIR
- Open Source Security
- Open Threat Research Blog
- Orange
- Orion-Hridoy
- ornx’s blog
- Osama Elnaggar
- Osint For All
- OSINT ME
- OSINTCurio.us
- Oskar Edbro
- OSPwn Blogs
- OST2
- Oste’s Blog
- OSTERING
- Oswald
- Otter Sec and this
- The Ourea
- Out of Bounds
- ovelny
- Overreacted
- Ovi Liber
- ovo tech
- owlhacku
- Owlspace
- oxasploits
- oxis
- Ozurie
- p0pcycle
- P1 BOOM
- p1k4chu
- P4nda’s Bug Bounty Blog
- p64.labs
- paavohtl’s blog
- PACIBSP
- Padvish Threats Database | AmnPardaz
- Paged Out
- PandaOnAir
- Pankaj Upadhyay
- ParaCyberBellum
- Paradoxis
- Pardon my Noot
- Parth Malhotra
- partywave
- parzelsec
- Pasquale ‘SID’ Fiorillo
- Pasquale Stirparo
- PassTheHashBrowns
- pat_h/to/file
- Patches.zip
- Patricia Aas
- Patrick Nappa
- Patrik Fehrenbach
- Patrik Hudak
- Patterns in the Void
- Paul Asadoorian
- Paul Ducklin
- Paul Jerimy
- Paul Laîné
- Paul Miller
- Paul Ponraj
- Paul Sanders
- Paul Totterman
- paulch blog
- Paulos Yibelo
- Paulsec
- Pavel Tsakalidis
- Pavel Yosifovich
- PC’s Xcetra Support
- Pedro’s blog
- Peew.pw
- Pengrey
- Pentest Book
- Pentest.blog
- Penetration Testing Lab
- Pentest Laboratories
- A Pentesters Ramblings
- pepe berba
- Pepperclipp
- Percepticon
- Perilous Tech
- PermafrostSec
- persistence-info
- Personal notes on Cybersecurity and Cloud
- Pete Finnigan
- Peter Gabaldon
- Peter Hlavaty
- Peter Reuterås
- peter.website
- Pethuraj’s Blog
- pewpewthespells
- phasetw0
- Philip Snyder
- Phillip Kittelson
- Phillip Prado
- Phillipe Harewood
- Phoenix Security
- PHRACK
- pi0x73
- pi3 blog
- Pid Eins
- Pim Beune
- pirate dot london
- pirate moo
- The Pizza Box
- PKSecurity
- Plain Security
- Playhouse
- Plugged Potato
- pmnh
- Podalirius
- PogoWasRight.org
- Pomba Labs
- pompompurin
- POP POP RETN
- POP RDI; RET;
- POSIX
- Postmodern
- Practical Security Analytics
- Prakash
- Pranav Chachara
- Prateek Nischal
- pre.empt.dev
- Predrag’s Playground
- Prevent Default
- Prial Islam
- PRIDE Security Blog
- Primal Cerebral
- The Privacy Dad
- Priyank’s Website
- Prof Cyber Naught
- Programming With Style
- Progress Blog
- Project Black
- Project NZT-48
- protekkt
- pseudorandom
- pspaul
- Psycho’s Corner
- psytester
- ptisan.net
- ptr to security
- ptrpaws’s blog
- ptx2
- Public Exposure
- Purpl3F0x Secur1ty
- Purple Team
- Push the Red Button
- pwn.vg
- pwn.win
- PwnAllTheThings
- PwnDiary
- pwnFunction
- Pwning Tech
- pwning.systems
- PwnSec
- pwnshift
- Pwntario Team Blog
- pwntester
- pyn3rd
- Qrious Secure
- qtc’s blog
- QTNKSR
- Quadhelion Engineering
- Quang Vo
- Quantumly Confused
- QuerciaLabs
- Querjin Voet
- r0
- R00tedsec
- r00thun7
- r0keb
- r0tbra1n
- r1ru
- R29k
- R3zk0n
- Raashid Bhat
- Raesene’s Ramblings
- Rafay Baloch
- Rafeeq Rehman
- Raffael Marty
- Rafli Hax0r
- Rahul Maini
- Rahul R
- Rainbow & Unicorn
- Raj Chandel
- Rakesh Mane
- Ralph’s Security Blog
- RANDO
- Random Musings by a Guy Named Mike
- Random Oracle
- Random ramblings of a security nerd
- Random Stuff about CyberSecurity
- Random stuff by yappare
- Random Tech Stuff
- Rants of a Deranged Squirrel
- raphting.dev
- Rational Security
- The Raven File
- Rawsec
- Randy Westergren
- Rasta Mouse
- Rayanfam Blog
- Rayhan0x01’s Blog
- Raz0r.name
- razrsec
- RBTree.insert()
- RCE Endeavors
- RCE Security
- rcvalle
- RE & Sec Blog
- RE-Alize Blog
- The Real Stem Sadie
- Recipe for Root
- Recon Station
- The Recurity Lablog
- Recyclebin.zip
- Red & Lonesome
- Red Crow Lab
- Red Hot Cyber
- Red Team Adventures
- Red Team Blog
- Red Team Tips
- Red Timmy Security
- Red xor Blue
- Redbeard Security
- RedBlue42
- RedBluePurple
- RedMimicry
- RedPacket Security
- redshark1802 blog
- RedTeam Pentesting
- Redteam.pl
- RedTeamRecipe
- Redteams.net
- Red Timmy Security
- REhex
- Remy Hax
- Renaud Martinet
- René Mayrhofer
- Renegade Security
- rerednawyerg
- ReSerge
- Ret2Pwn
- RET2Systems
- retr0blog
- Reusable Security
- revblock.dev
- Reverse Engineering
- Reverse Engineering Malware
- REVERSEMODE
- Reversing Engineering for the Soul
- Reversing Works
- Rewanth Tammana
- ReWolf’s blog
- https://rexorvc0.com
- rez0
- rffuste
- ρ - rh0dev
- Rhynorater
- Rhys Elsmore
- RiaMaria
- Ribbit-ing Cybersecurity
- Ricard
- Ricardo Almeida
- Ricardo J. Ruiz Fernández
- Riccardo Padovani
- Rich Warren
- Richard Osgood
- Richard’s Infosec blog
- Richard Palethorpe
- Rick Mark
- rida.dev
- Righteous IT
- Ring 0 Labs
- Ring 0x00
- Rio Asmara Suryadi
- RiotSecurityTeam
- Rip It Apart - Jason’s electronics blog-thingy
- Risk & Cybersecurity
- Risk, Failure, Survival
- Risk Based Prioritization
- ristbs’s blog
- Ritik Sahni
- River MacLeod
- Rob Pomeroy
- Robbe Bryssinck
- Robby Pedrica
- Robel Campbell
- Robert Alexander
- Robert Chen
- Robert Heaton
- Robert M. Lee
- Robert Swiecki
- Robert Willis Hacking
- Robert Xiao
- Robin Justin
- Robin Verton
- Robin’s Random Rants
- RoboCoffee
- Robur cooperative
- Rodney Beede
- Rodrigo’s Stuff
- rog3rsm1th
- Roger Zander
- Roger’s Blog
- rogue signal
- Rolando Anton
- Romain Thomas
- Roman Mueller
- Roman Riis
- Ron Chan
- Ronnie Atuhaire’s Blog
- Root Cause
- rootcat
- RootDSE
- Rootkit
- ROPCHA.IN
- ropgadget
- ropnop
- RoseSecurity Research
- Ross Marks
- Rostik Slipetskyy
- ROT256
- Rotem Bar
- RoundofThree
- Rounds with the Night Watchman
- The Ruby Zoo
- Rudra Sarkar
- rushi
- Ryan Castellucci
- Ryan Eberhardt
- Ryan Gerstenkorn
- Ryan Liptak
- Ryan Murphy
- Ryan Pickren
- Ryan Wendel
- RyotaK’s Blog
- S3
- S.Venkatesh @pranavvenkats
- s0cket7
- s0cm0nkey
- S0lden’s Laboratory
- S1l3ntK1ll3r
- S1m
- s1r1us
- s3cur3th1ssh1t
- Saajan Bhujel
- safecontrols
- Sage Knows IT
- Sam Burns’ Tech Blog
- Sam Curry
- Sam Lerner’s Coding Blog
- Sam’s Bish-Bytes
- Sam’s Hacking Wonderland
- SAM0x90 Blog
- sam4k
- Samet SAHIN
- Samiux’s Blog
- Samuel Klein
- Sanjaymenon
- Sankalp Sharma
- sannemaasakkers
- Sapir’s failed research blog
- Sarthak Saini
- Sascha’s Blog
- Sasi Levi
- Satoshi’s note
- Saurik | Jay Freeman
- Sayr.us
- SAZA.RE
- ScalarSec
- Scan My SMS
- Scarlet Fire Labs
- Scary Beast Security
- Schneier on Security
- Schwitzd
- scoding.de
- Scott Brady
- Scott Hanselman
- Scott Helme
- Scott Leggett
- Scottie Austin
- Scrawled Security Blog
- ScreaMy Blog
- screem
- Script Alert One
- Script Dotsh
- Script Kiddie’s notes
- SCRT Information Security
- scumjr
- _scurity
- sdomi’s webpage
- Sea Bass From Space
- Sea Security
- Seal9055
- Sean Deaton
- Sean Edevane
- Sean Heelan
- Sean Pesce
- Sean Wright
- seanmonstar
- sec fortress
- SecBurg
- SecNigma
- secrary
- Secret Club
- Sector035
- SecuNinja
- Secure coding and more
- Secure Coding Handbook
- Secure Honey
- Secure, In Style
- SecureCloudBlog
- Securehat
- SecureLee
- Securifera
- Securing Everything
- securing.dev
- Security & Privacy Evaluations
- Security Addict
- Security Affairs
- Security and Bug Hunting
- Security Artwork
- Security Autopsy
- Security Break
- Security By Nature
- Security Down
- Security Duct Tape
- Security Dungeon
- Security Engineering Manager
- Security Engineering Notebook
- Security for Real People
- Security is Broken
- Security Jawn
- Security Kiwi
- Security Knowledge Base
- Security Liberation Front
- Security Manufaktur Blog
- Security Obscurity
- Security Pills
- Security Queens
- Security Scouter
- The Security Sleuth
- Security Soup
- security.love
- SecurityFlow
- SecurityLiterate
- SecurityRise
- SecurityXploded
- seeinglogic
- Segmentation Fault
- Seguranca Informatica
- sekureco42
- Seljan Gabor
- Semantically Secure
- Sen Security
- SeniorDBA
- senyuuri’s blog
- Sergio Prado
- SerHack
- serialcomplainer
- SerializingMe
- servicenger
- Seth Michael Larson
- SethSec
- The Shadow File
- stack.int.move
- StackZero
- StadowStackRE
- stulle123
- sh4dy’s blog
- Shahmeer Amir
- Shalzuth’s Blog
- Shanty Blog
- sharpletters
- Shashank’s Security Blog
- Shawar Khan
- Sheeraz Ali
- Sheila A. Berta
- Shell is only the Beginning
- shell&co
- shellcromancer
- Shellph1sh’s Blog
- Shells.Systems
- shellsharks
- Shenanigans Labs
- Shibin B Shaji
- shinchina.in
- Shinkensec
- Shiroe’s Quest
- Shishir’s Blog
- Shivangx01b
- Shogun Lab
- Shomil Jain
- Shubham Chaskar
- Shubham Gupta
- Shubham Shah
- Sid Joshi
- Side Of Burritos
- Sidneys1
- SIGFLAG
- Signal Chaos
- Signs of Triviality
- Siguza’s Blog
- Silent Signal
- Silent’s Blog
- Silicon Exposed
- Silicon Shecky
- sillyonions
- sillyware
- Sim Nim Tau
- simeononsecurity
- Simon Josefsson’s blog
- Simon Roses Femerling
- Simon Willison’s Blog
- simondotsh’s infosec stuff
- Simone on Security
- Simovits
- Simple Risk Measurement
- Simulated Attack
- Sinkingpoint
- siunam’s Website
- Sivanesh Ashok
- Sjoerd Langkemper
- Skeleton Scribe
- Skelmis
- Sketchymoose
- Skii.dev
- SkullSecurity
- Sky Blueteam
- sky’s blog
- Skyper’s blog
- Slash Parity
- SlashCrypto
- Slava Moskvin
- sloonz’s blog
- Slonser Notes
- Slowerzs
- Smaran Chand
- SMBlog - Steve Bellovin
- SmeegeSec
- Smoking on a Bike
- Sneaky Monkey
- SNORLAX Cybersecurity
- snowcrash
- Snowscan
- SocioSploit
- socket
- Sofia Santos | OSINT & GEOINT Analysis
- The SOC Spot
- The Software Security Project
- Sohail Ershadi
- sokafr
- solid-snail
- SolomonSklash.io
- Some Natalie’s corner of the internet
- somedieyoungZZ
- Songs on the Security of Networks
- Sorcery Blog
- Soroush Dalili
- sorted unsorted thoughts
- Source Incite
- Space Rogue
- spaceraccoon.dev
- The Spanner
- Sparkle Kitten Security
- SpawnZii
- splinter_code
- spookysec
- Sporadic Security
- spotrlabs
- sprocketfox
- spv.sh
- SpyClub
- SpyLogic
- sqall’s blog
- Squiblydoo
- srd.cx
- ssno
- Staaldraad
- StackCrash
- Stackdiary
- STALKR’S BLOG
- StamOne_
- Stark4n6
- StarkeBlog
- StarksInfoSec Blog
- Starting Up Security
- stdnoerr’s blog
- STEALIEN
- Stealing the Network
- StealthBay
- Stealthcopter
- Stefan Gloor
- Stefan Marsiske
- Steflan
- Steinar H. Gunderson
- Stephen Rees-Carter
- Stephen Swanson
- StepSecurity
- Steve on Security
- Stigward’s Security Journal
- StillzTech
- stmxcsr
- Store Halfword Byte-Reverse Indexed
- Stranded on Pylos
- Stratum Security
- Strawberry Sec
- StreyPaws
- stribika
- Strike Ready
- Strömblad
- stux
- stypr
- SUAM
- Sublime Security
- Suchi Pahi
- Sud0Ru
- Sudheendra Raghav Neela
- Sudo
- sudoheader
- sudoutopia
- Summoning Team
- Sunny Gupta
- Sunshine After Rain
- Supras.io
- Suraj Disoja
- Suspicious Actor
- sutcliffe.it
- Sveba
- Sven Peter
- svennergr
- swagitda
- swamptin
- Sylvain Kerkour
- Symbol
- Syrion
- sysdum
- Sysrant
- SySS Tech Blog
- System Failure
- System Overlord
- System Weakness
- szilak.com
- Szilárd Pfeiffer
- t.fish
- Ta Ethika
- Tactical Adversary
- Tactical Web Application Security
- Tae’lur Alexis
- Taggart Tech
- TakeMyHand-Security Blog
- Tal’s Tech Treks
- Tame Your Cloud
- Tamir Zahavi-Brunner’s Blog
- Tao Bojlen
- TaoSecurity
- Tarah Wheeler
- Tarek Bouali
- TASZK
- Tavis Ormandy and lock
- tbhaxor
- Team Atlanta
- Team Hydra
- Team Rot
- Team-53 InfoSec Blog
- Tech @ Cliqz
- Tech Froggo’s Rants
- Tech Kettle
- Tech Solvency
- TechAnarchy
- techbrunch.fr
- TechKranti
- technically a blog
- Techno Enthusiast’s Blog
- Technoir - Blog of Satharus
- Techorganic
- Techryptic’s Blog
- TecSecurity
- Teddy Katz
- TeleSec
- Tempered Works
- Terence Eden’s Blog
- tekwizz123’s Programming Blog
- terminal23.net
- Terrapin Labs
- Tess Sluijter-Stek
- terawhiz
- text/plain
- th0mas.nl
- Th4ntis
- The Hacker’s Choice
- The Test Therapist
- tg12.github.io
- Thalium
- The Binary Hick
- The Cave
- The Code Lab
- The Cyber Why
- The Desolation of Blog
- The Hacker Blog
- The Security Experts
- The Security Noob.
- The T2 Development Blog
- The Zero Hack
- the-deniss
- TheAverageGenZ
- THEDXT
- THEEVILBIT
- thefluffy007
- TheInfoSecPhoenix
- TheSecurityEngineer’s Blog
- TheXcellerator
- Thick Mints
- Think Love Share
- ThinkDFIR
- Thinking Thoughts
- This Site is Safe
- This Week In 4N6
- Thomas Cope
- Thomas Karpiniec
- Thomas Naunheim
- Thomas Stringer
- Thomas White
- thomfre.dev
- Thoughts for this World
- Threat Anatomy Blog
- Threat Blog
- Threat Hunter Girl
- Threat Intelligence & Psychology
- ThreatBlogger
- threatcat
- threathunterz
- Threatrack Blog
- Threatzer
- threedr3am
- threfall_hax
- Tigress
- Tijme Gommers
- TIL as a Support Engineer
- Tillison Galloway
- Tilting at windmills
- Tim Blazytko
- Tim Leonard
- Tim Neilen
- Tim Schulz
- TimDbg
- Tindra’s Grove
- tinycrypt
- Tinyhack.com
- tint0
- TISIPHONE.NET
- tl;dr sec
- TMP.OUT
- TMZ Lair - Underground Coding
- Toaster Security
- Tobia Righi
- Tobias Klein
- Tobias Pulls
- TobTu
- tolo7010’s note
- Tom Anthony
- Tom Forbes
- Tom Liston
- Tommi Hovi
- TommyBoyHacking
- Tomorrowisnew
- Tony Arcieri
- Tony Gorez
- Tony Harris
- Tony Lambert
- Torben Capiau
- Total Recall
- totes-legit-notmalware.site
- tox7cv3nom
- Toxin Labs
- The Toy Box
- tpetersonkth
- Trail of Bits
- Travels in Digital Security
- Travis Biehn
- Treasure Cave
- TrebledJ’s Pages
- Tribal Chicken
- TribesmanJohn.au
- tricker0’s Nest
- Trickster Dev
- Troy Hunt
- TrueSec
- TrustedSec
- TrustFoundry
- Truvantis
- tsumarios’ blog
- Turb0Yoda’s Bloggy Blog
- Tutorgeeks
- Tutorial Boy
- tvcutsem
- The Twenty Percent
- tyage
- Tyler Butler
- Tyranid’s Lair
- Tzusec
- ubitux
- uf0 | Matteo Malvica
- Uku’s Playground
- Ultimate Security Professional Blog
- UPDATE
- UncleSp1d3r Blog
- Uncommon Sense Security
- The Uncoöperative Organization
- Und3rf10w
- UndedInside
- Undercode Testing
- undev.ninja
- undevs
- unfinished.bike
- unix ninja
- unixsheikh
- Unmitigated Risk
- Usama Varikkottil
- usmacd
- v-v.space
- V3dedBlog
- Vaibhav Joshi
- Vaktibabat
- Valbrux
- Valhalla Research
- Valtteri Lehtinen
- Vandan Pathak
- vanimpe
- Vari.sh
- Various Ramblings of a Middle Aged Man
- The Vault
- VB Scrub
- Vegard
- vegvisir
- Veilid Foundation
- Velociraptor IR
- Verneet
- Veronica Valeros
- vesiluoma.com
- vext.info
- Vibri.us
- vict0ni
- VIDOC Security lab
- VIE
- Viktor Petersson
- Vin01’s Blog
- Vincent Van Mieghem
- Vincent Yiu
- VinCSS Blog
- Vinoth Kumar
- Virtue Security
- Vishwaraj Bhattrai
- Vito Botta
- Vitor Falcao
- VIVI
- vkas-afk.github.io
- Vlad Iliescu
- Vladislav Iarmak
- vlt.sh
- Voidsec
- Voidsec RSS stream
- Voidstar Security Research Blog
- Voidzone
- VollRagm
- volodya
- Voorivex’s Team
- vsim.xyz
- Vulkey_Chen
- Vulmon Blog
- Vulnano
- Vulnerability research and more
- vulnerable.af
- vulns.xyz
- VUSec
- VVX7
- vx.zone
- vxdb.sh
- w00troot
- Waawaa Blog
- WafflesExploits
- wald0
- wanago.io
- war + code
- War Room
- Washi
- Watchful_IP
- We Hack In Disguise
- We Hack People
- We Want Shells
- Web Security Blog | Thomas Orlita
- Web Security Geeks
- Web3Sec
- WebBreacher
- WebGap
- (Web-)Insecurity Blog
- WebSec
- WebstersProdigy
- Weister Creek Information Security
- Welcome to Trenches of IT
- The Weltraumschaf
- Wen Bin KONG
- WerWolv
- wetw0rk
- wewatchyourwebsite
- What2Log
- Where DFIR Meets IT
- WHEREISK0SHL
- WHID - We Hack In Disguise
- Whiskey Tango Foxtrot
- Whispers in the Wires
- White Hat Mac
- WhiteHat Hacker Haji
- WhiteHatLab
- WhiteHoodHacker
- WhyNotSecurity
- Wietze Beukema
- Wilbur Security
- the wild web
- Will Butler
- Will Summerhill
- Will’s Root
- Willem’s Blog
- Willi Ballenthin
- William Brown
- William Knowles
- Willis Vandevanter
- Windows Deep Internals
- Windows Incident Response
- Windy Bug
- WinterKnight
- Wiremask
- wirepair.org
- Witcoat Security Blog
- with knowledge comes power
- Wojciech Reguta
- Wolfgang Goerlich
- wolfgirl.dev
- Worth Doing Badly
- Worty
- The Wover
- WP deeply
- Wrongbaud
- wrzlbrmpft’s cyberlights
- WSX’S SPACE
- WTFBINS
- wumb0.in(g)
- WYA.PL
- Wyatt Tauber
- X1r0z Blog
- x4sh3s
- x86matthew
- Xanda’s Blog
- xapax
- Xarkes
- xbz0n
- XDEV05 BLOG
- Xe Iaso
- xen0vas
- xenacod
- xfavatax
- xFelix
- xhzeem
- xia0o0o0o
- XJunior
- xkln.net
- XlogicX
- xmsec
- xnyhps’ blog
- xohan30
- XOR
- XORHEX
- xorl %eax, %eax
- xors
- xorvoid
- XPN
- Xre0uS
- XSS Jigsaw
- xThaz
- xvnpw
- y0ug’s Internet Misadventure
- Y4er
- yar-eb
- Yaseng
- Yassine Aboukir
- Yassir
- yawataa
- Yazid’s notes
- Yepoleb’s blog
- Yeraisci
- yeuchimse
- YGN Ethical Hacker Group Blog
- YL-Labs
- ynwarcs
- YoKo Kho
- your program sucks
- Youssef Sammouda
- Youstin
- Z-Labs
- Z-r0crypt
- z2’s blog
- Zak’s blog
- zanidd.xyz
- zapb.de
- Zavier Lee
- Zawadi Done
- zc00l blog
- ZecSec
- Zellic Blog
- Zena Forensics
- Zero Day - by Kim Zetter
- Zero Day Hacker
- Zero Salarium
- zero_s4n
- Zeroed.tech
- ZeroSec
- zerosum0x0
- Zer0tru5t
- Zeta Two
- zetc0de
- zhchbin
- zhero_web_security
- Zhiniang Peng
- zhuanlan
- zi0Black’s Blog
- Ziggy’s of the World
- #!/zitstif.no-ip.org/
- Zon8 Research
- zone-h
- zonky
- zoph.me
- ZwClose
- zznop labs
Commercial Blogs
- 0ffset
- 0xide
- 360 Total Security
- 3NAILS
- 404 Media
- 7Elements
- A-LIGN
- Abnormal Security
- AboutDFIR
- Abuse|ch
- Abusix
- AC3
- acceis
- Accenture Cyber defense blog
- Acronis
- Acros
- Active Countermeasures
- ActiveCyber
- Acunetix
- Ada Logics
- AdGuard
- adolus
- ADV Intel
- Adversis
- AgileHunt
- Aikido
- Aim Security
- Airbus
- Airbus Security Lab
- AIS
- Akamai
- Akeyless
- Aleph Research
- Alesandro Ortiz
- Alessandro Bresciani
- Alessandro Mantovani
- alperovitch institute
- Alter Solutions
- Altered Security
- Ambionics Security
- Amnesty International Security Lab
- Ampere
- Analyst1
- Anquanke
- The Antisocial Engineer
- Anvil Secure
- Any.Run
- Aon
- apiiro
- APLens
- AppCheck
- appgate
- Appknox
- Apple Security Research
- AppOmni
- AppSec Engineer
- Appsecco
- Aqua
- Aquia
- arachni
- Arctic Wolf
- ARGOS Cloud Security Blog
- Arkose Labs
- amradillo
- Armis
- Armo
- arnica
- Arsenal Recon
- ArtResilia
- ASEC
- AssetNote
- Assurance Maladie Security Team
- Assured Blogs
- astra
- Astrix
- AT&T Cybersecurity
- Athene
- Atos
- Atredis
- Atredis Partners
- Authentic8
- Authomize
- Automox
- Autopsy Digital Forensics
- Avanan
- Avast Engineering
- avatao
- Averlon
- Avertium
- Avira
- Awake Security
- AweSec
- BackBox
- Bad Sector Labs
- Balasys
- Baldur
- Balwurk
- Barghest
- Barracuda
- Bastion Zero
- BCSecurity
- bearer
- Belkasoft
- Beryllium
- Betrusted
- BeVigil
- BFSLABS
- BHConsulting
- Binarly
- Binary Defense
- Binary Gecko
- Binary Security
- BinaryNinja
- BitCrack
- BiteGarden
- BitSentinel
- Bitsight
- Black Hat
- Black Hills Information Security
- Black Lantern Security (BLSOPS)
- BlackArrow
- BlackBerry ThreatVector Blog
- blackchili
- BlackheathPoint
- BlackStorm Security
- Blackwing Intelligence
- Blindspot
- BlockMagnates
- Bloodhound Enterprise
- Blue Goat Cyber
- Blueliv
- Blumira
- Bodforss
- Boschko Security Blog
- Bounce Security
- bountyplz.xyz
- Brackish Security
- Brain Frame
- Brandefense
- BREAKPOINT
- Breakpoint Security
- bridgecrew
- Britive
- BUFFERZONE
- Bugbase
- Bugcrowd
- BugProve
- Bugscale
- Bulletproof TLS Newsletter
- The Bun Security Blog
- C9Lab Blog
- Cado
- Caffeine Security
- caniphish
- Capture The Talent
- Carve Systems
- Catalyst
- Catchify
- CATONetworks
- Cellebrite
- Cenobe
- censorship.ai
- Census
- Censys
- Center for Cybersecurity Policy and Law
- Center for Internet Security
- Centre For Cyber Security Belgium
- Cerbero Blog
- Cerbos
- CERIAS Blog | Purdue University
- CERT.EU
- CERT.PL
- certego
- Certik
- Certitude
- Chainguard, Inc.
- Chainwide.io
- char49
- Chaser Systems
- Check Point
- Check Point Research
- Checkmarx
- Chef Secure
- chrome.security
- Chronicle | Google Cloud
- cirosec
- Cisco Umbrella
- CISPA
- The Citizen Lab
- claranet
- Claroty + T82
- Cleafy
- ClearSky Cyber Security
- Cloudflare
- CloudQuery
- CloudSEK
- Coalfire
- cobalt iron
- Cobalt Strike
- Cobalt.io
- Code Grazer
- Code Intelligence
- Codean
- Codingo
- Cognisys Labs
- CoGuard
- Compass Security Blog
- Computest
- Confiant
- Context Accenture
- Contrast Security
- controlplane
- Converge Technology Solutions
- Conveyor
- Conviso
- CoreSecurity
- Cossack Labs
- Counter Craft
- CQURE Academy
- Cremit
- Criminal IP
- Crossroads Information Security & www
- CrowdSec
- CrowdStrike
- Cryptic Red
- The Cryptography Caffè
- CSDN
- CSIDB
- CSNP
- CTI League
- CujoAI
- Curesec Security Research Blog
- Cutaway Security
- Cyber Castle
- The Cyber Resilience Institute
- Cyber Sophia
- Cyber Threat Alliance
- Cyber Triage
- Cyberark
- Cyberark Conjur
- CyberArmor
- CyberBit
- CyberCX
- CyberDanube
- Cybereason
- CyberHunter
- Cyberint
- Cyberis
- Cyberlix
- CYBERMATERIAL
- Cybernari
- cybersixgill
- Cybervelia
- Cybervore
- CyberWarFare
- CyberXplore
- Cyble
- Cyco
- Cycode
- Cycuity
- Cyentia Institute
- Cyera
- Cyfirma
- Cyjax
- Cylect
- Cyllective
- Cymetrics Tech Blog
- Cymptom
- Cymtrick
- Cymulate
- Cynopticon
- Cyolo
- Cypherowl
- CYS4
- Cyscale
- CYSOURCE
- CyStack
- Cyvisory Group
- Cyware
- cz.nic
- D3
- Da22le
- Dale Peterson
- Dark Atlas
- Dark Mentor
- dark vortex
- DarkForge Labs
- DarkOwl Blog
- DarkRelay
- Darktrace
- DarunGrim
- DataDog Security Labs
- datawiza
- DebugPointer
- Decoded Avast.io
- deepfence
- DeepInstinct
- Defense.com
- Defense.One
- Defensive Security
- DeleteMe
- delivr.to
- Dellfer
- Depth Security
- Der Security
- Derant
- descope
- Deteact
- Detectify
- DevCore
- Devsecurely
- DFFENDERS BLOG
- DFIR MADNESS
- DFRWS
- Dhound
- Dig Security
- Digital Detective
- Digital Forensics Consultancy
- Direct Defense
- Discernible
- Diverto
- Dolos Group
- Domain Guard
- Dr.WEB Anti-virus
- Dragos
- Drata
- Dreadnode
- DreamLab Technologies
- DSEC Bypass
- Duasynt
- Duo
- Duo | Decipher
- DuskRise
- DuskRise | Cluster25
- Dvuln
- EasyDMARC
- Eaton Works
- EchoTrail
- EclecticIQ
- Eclypsium
- Edgeless Systems
- eForensics Magazine
- ekahau
- Elastic Security Labs
- ElcomSoft
- EliteSec
- elttam
- EMSISOFT
- Endor Labs
- ENEA
- Enso
- Epsilon
- Eptalights
- Equilibrium Security
- Erasec
- ermetic
- escape
- esentire
- eShard
- Ethereum Foundation
- Ethiack Blog
- E.V.A. Information Security
- Evervault
- Exein
- Exodus Intelligence
- Expel.io
- Exploit Security
- Exploring Information Security
- Eye Security
- F-Secure Labs
- F5 Labs
- Facebook Engineering
- Faction
- FalconFeeds
- Fenrisk
- Fidus Information Security
- Field Effect
- Fingerprint
- FingerprintJS
- Finite State
- FireEye
- FireHydrant
- fishtech group
- Flare Systems
- Flashback Team
- Flatt Security
- fleet
- Flipper
- fluid attacks
- Forcepoint
- Forescout
- Foretrace
- Foreseeti
- Form3
- Fortalice
- Fortbridge
- Foritified Health Security
- FortiGuard Labs
- Fortinet
- FortyNorth Security
- FourCore
- Foxglove Security
- Fraktal
- frontegg
- FRSECURE
- FullHunt
- Fuo’s blog
- Fura Labs
- Fuzzbuzz
- Fuzzing IO
- Fuzzing Labs
- FWDSEC
- Galah Cyber
- Garantir Blog
- GData
- Gem
- GenAI Security Project
- Genians
- Gigamon
- Gigasheet
- GitGuardian
- The Github Blog | Security + Security Lab
- GitProtect
- GlitchSecure
- Google Security Blog
- Google Threat Analysis Group (TAG)
- Google VRP Writeups
- GoSecure
- Gremwell
- gretel
- Grey Dynamics
- Grey Hat Developer
- Grimm
- GRNET CERT
- grsecurity
- GTSC
- Guardicore
- Guardio
- Guardsquare
- Guidepoint Security
- Hacken
- HackerCool
- hackerone
- Hackers-Arise
- HACKLIDO
- Hackmageddon
- HackSys Inc
- HackTheBox
- Hadess
- Hakai
- Hakai Research
- Hakin9
- Halborn
- Hardened Vault
- hardwear.io
- HARFANGLAB
- Hatching
- HAWK.io
- Hawktrace
- hax & hacspec
- HDW Sec
- Herjavec Group
- Hex-Rays
- HexArcana
- Hidden Layer
- HiSolutions Research
- Hispasec
- Hive Systems
- hn security
- Hold Security
- HORIZON3.ai
- howdays
- Hoxhunt
- The Honeynet Project
- HP Wolf Security
- HTTP Toolkit
- Human Security
- Hunt & Hackett
- Hunters
- Huntress
- IANS
- IBM System Security
- icebreaker
- IDPro
- IDS Alliance
- IFCR | Institut For Cyber Risk
- Immersive Labs
- immunIT
- Immunity Inc. Blog
- Immunity Services
- ImmuniWeb
- Impalabs
- Imperva
- Improsec
- in.security
- Include Security
- INCOG.HOST
- incogni
- InfinityCurve
- infoblox
- InQuest
- Insomnia
- Insurance Though Leadership
- Intego
- Integrity360
- Intel 471
- Intel Cocktail
- IntelTechniques
- Interlab
- The Internet Obsrvatory
- Interrupt Labs
- InterSecLab
- Intezer
- inTheWild
- Intrigus Security Lab
- Intrinsec
- intruder
- invicti
- Invictus IR
- IOActive
- IOActive Labs
- I/Omergent
- iosiro
- IoT Inspector
- ipapi.is
- IPM Corporation
- iQuasar Cyber
- IronCore Labs
- ironPeak
- isms.online
- Isosceles
- Isovalent
- iVerify
- Jamf
- JBCsec
- JEB in Action
- Jetstack
- JFrog
- jm33_ng
- jswzl
- JMP ESP
- JMSWRNR
- Jumpsec
- Juniper
- JupiterOne
- K7 Security Labs
- Kali
- Kandji
- Karma-X
- Kaspersky Daily
- Keen Security Lab Blog
- Keeper
- KELA
- KERBIT
- Keysight
- Kinney Group
- Klogix
- Kloudle
- Knostic
- Koi
- koombea
- KoreLogic Security
- kosli
- Kovrr
- kpwn
- Kraven Security
- Kroll
- kryptera.se
- Kryptos Logic
- KSOC
- Ku Leuven | COSIC
- Kudelski Security Research
- Lab52
- Lab539
- Lacework
- Lares
- Lasso
- Latacora
- Latio Pulse
- Lawfare
- LayerX
- LCI Security
- Leak Signal
- Legit Security
- LetsDefend Blue Team Blog
- LevelBlue
- Leviathan Security Group
- LEXFO
- LIFARS
- Lightspin
- Lima Charlie
- LMG Security
- LMNTRIX
- LogicalTrust
- Logpoint
- Longterm Security
- LunaSec
- Lupovis
- LureSec
- Luta Security
- lutra security
- LVE Repository
- Lyrebirds
- macrosec
- Magic Lasso
- Magnet Forensics
- Magonia Research
- maikroservice
- Malcat
- Malcrove
- Maltego
- Malware Tips
- Malwarebytes Labs
- Malwology
- Mand Consulting Group
- Mandiant
- MANRS
- Mantodea
- Mantra
- Margin Research
- Martian Defense Cybersecurity
- Material
- Mattermost
- matrix
- McAfee
- MDSec
- mediaservice.net
- Medigate
- Mend.io
- Menlo Security
- Mercari Engineering
- Meta Red Team X
- Metabase
- MetaCTF blog
- MetalBear
- Metlo
- Microsoft Security
- Miggo
- Mimecast
- Minded Security
- Minerva
- Mint Secure
- Mithril Security
- Mitiga
- MixMode
- mnemonic
- Mobius Strip Reverse Engineering
- ModernCISO
- modzero
- Mogwai Labs
- MojoAuth
- Mondoo
- moonlock
- Morphisec
- Mossé Security
- moz://a Hacks
- Mozilla
- MRG Effitas
- Mullvad
- MultiLogin
- MySudo
- N45HT
- National Cyber Security Centre
- The NATSPECS Blog | IST Institute for Security + Technology
- nccgroup
- Neodyme
- NETBYTESEC
- NetEnrich
- The Netflix Tech Blog
- Netlab
- Netragard
- NETRESEC
- NETSCOUT & ASERT
- NetSec Focus
- Netsparker
- NETSPI
- Nettitude Labs
- NeuralTrust
- Network Intelligence
- NextLabs
- Nextron Systems
- Nightfall
- NinjaLab
- NinTechNet
- Nitrokey
- NLab Security
- NLnet Labs
- noc.org
- Noma
- noname
- Noq
- Northwave
- Not a Monad Tutorial
- NowSecure
- Nozomi Networks
- NSFOCUS
- Numberline Security
- Numen Cyber Labs
- Numorian
- NXT1
- Nzyme
- Oasis Security
- Objective-See
- Obviate.io
- OccamSec
- Octagon Networks
- OFFENSI
- Offensity
- Offensive Security
- OKIOK
- Oligo
- Onapsis
- ONEKEY
- Open Raven
- open-appsec by Check Point
- Opera
- Ophion Security
- OPSECX
- Optiv
- Orange Cyberdefense
- orca security
- Öruggt Net
- OSINT Jobs
- The OSINTion Tidbit
- Oso
- OSR
- OSTIF
- Ostorlab
- OtterSec
- otto
- Outcome Security
- Outflank
- Outpost24
- Oversecured
- Overt Operator
- Oxeye
- Oxford Academic | Cybersecurity
- P0 Security
- P1 Security
- Palisade
- Palo Alto
- Panda
- Pangu Lab
- panoptica
- panther
- Paradigm
- Paragon Initiative
- Paralus
- Paranoids Blog
- Paraxial.io
- Patchstack
- Patrowl
- Payatu
- PeckShield
- PentaGrid
- Pentera
- pentest information security assurance | Shearwater Group
- PenTest Magazine
- PenTestPartners
- penthertz
- Perception Point
- Perfecto
- perimeterx
- Permasecure
- Permiso
- Permit.io
- Persistent Security
- Perspective Risk
- PhishCloud
- phishdeck
- PhishLabs
- Phobos
- Phoenix R&D
- Phylum
- Picus
- Piiano
- Pillar Security
- PingSafe
- PixiePoint Security
- PIXM
- Plerion
- Plainbit
- Platform Security
- Plessas
- PlexTrac
- Plugin Vulnerabilities
- Polaryse
- Polito Inc
- Pomerium
- Porchetta Industries
- PortSwigger
- Positive Security
- Positron Security
- Praetorian
- The Prediction Blog
- Prelude
- Pretera
- Prevailion
- PrimeHarbor Technologies
- PRIOn
- privacybee
- Privado
- PRIZM Labs
- Probely
- Prodaft
- ProDefense
- Profero
- Project Zero
- ProjectDiscovery
- Promon
- Proofnet
- Proofpoint
- Prophet
- Prossimo
- Protect AI
- Protective Security
- Protexity
- PT SWARM
- Pulse Security
- Punk Security
- Push
- PVS-Studio
- pwc
- PwnDefend
- Qrator Labs
- Quadrant
- Qualys
- Qualys Threat Protection
- Quarkslab
- r-tec
- r2c
- Radare team
- Radix Security
- raelize
- Randori
- RandoriSec
- Rapid7 & AttackerKB
- RapidFort
- rashahacks
- Raven Digital Security
- raxis
- RE:HACK
- readibots
- ReasonLabs
- Reco
- Recon Infosec
- Red Balloon Security
- Red Canary
- Red Maple Technologies
- Red Rays
- Red Threat
- redacted
- RedCode
- RedForce
- RedHunt Labs
- RedOps
- RedSiege
- ReliaQuest
- Relyze
- Resecurity
- Resoto
- Restore Privacy
- retooling
- rev.ng
- ReversingLabs
- ReversingLabs | Secure.Software
- ReynardSec
- Rezilion
- Rezonate
- Rhino Security Labs
- Ricterz and this
- risk3sixty
- RiskInsight
- RiskIQ
- River Loop Security
- River Security
- Rosenpass
- RSA
- runZero
- S2
- SAFE
- Safeguard Cyber
- Saferwall
- SafetyDetectives
- Salem
- Salesforce Security Blog
- Salt Security blog
- Sandfly Security
- sandworm
- SANS
- SANS Internet Storm Center
- Sansec
- Santander Security Research
- Sayfer
- SCADAhacker.com
- Scam Sniffer
- SCIP
- scope
- Scorpiones
- scribe
- ScriptJunkie
- Scythe
- sdmsoftware
- Searchlight Cyber
- Secfault Security
- seclarityIO
- The seclify blog
- SEC Consult
- SecAlerts
- SECFORCE
- Secmatics
- Secplicity
- SecPod
- Secret Double Octopus
- Sector7
- SecTrio
- Secudea
- Secura
- Secure Annex
- Secure Programmable Routes
- Secure SaaS
- SecureAuth
- SecureCoding
- SecureIdeas
- SecureLayer7
- Secureworks
- Securify
- Securify (inc)
- SECUINFRA
- Securing.pl
- securit.ie
- securitum
- Security Blue Team
- Security Connections
- Security Dimension
- Security for Everyone
- Security Joes
- Security Onion
- Security Research Labs
- Security Sting
- Security-in-bits
- SecurityIntelligence
- Securitypage.fyi
- SecurityRisk Advisors
- SecurityScorecard
- SecurityTrails
- SecurityTrooper
- Securosis
- Secutils.dev
- SEED Labs
- Seekurity
- Sekoia.io
- Sekurenet
- SELinux Userland
- Semgrep
- Semperis
- SentinelOne
- Sentor
- Sentra
- SEQ
- Sevagas
- SEVN-X
- ShadowServer
- SharkStriker
- Shazzer
- shelltrail
- Shielder
- ShiftLeft
- Shindan
- Shisho Cloud
- Shockwave
- Shodan Blog
- Shostack & Associates
- Shreshta
- Sick.Codes
- Sicuranext
- Sidechannel
- SIDN Labs
- Sightline Security
- Signal
- Signal Labs
- SignalBlur
- SignalsCorps
- Silent Push
- Skylight Cyber
- SkypLabs
- Slayer Labs
- SnapAttack
- Snapsec
- Snoopgod
- Snyk
- SOCPRIME
- SOCRadar
- Solar
- SolidityScan
- Somerset Recon
- Sonarsource
- Sonatype
- SOOS
- SORS
- South Lake Cyber Risk
- SpatialSec
- SpecterOps
- Spectral
- Spiderfoot
- SpiderLabs
- spiderSilk
- Splunk
- Spur
- ssd-disclosure
- SSE
- sshell
- Stairwell
- Stamus Networks
- Stanford Internet Observatory
- Star Labs
- StationX
- Steele Fortress
- Stellar Cyber
- Sternum
- Stratascale
- Stratosphere Lab
- Strike
- Summit Route
- Svix
- Sweepatic
- Sweet
- Swing’Blog
- Swissky’s adventures into InfoSec World
- SwordBytes
- Sygnia
- Symantec Enterprise Blogs
- Synack
- SYNACKTIV
- SYNDIS
- Synopsys
- SynSaber
- Syntax Bearror
- Sysdig
- SYSDREAM
- Talos
- Tanto
- Target tech blog
- Tarlogic
- TCM Security
- Team Cymru
- Telekom Security
- Teleport
- Tenable
- Tencent Security
- TestifySec
- Tetrane
- Tetrel
- Tevora
- TFP0 Labs
- Theori
- THEXERO
- Thinkst
- Threat Fabric
- ThreatConnect
- ThreatDown
- ThreatMon
- ThreatNix
- ThreatRay
- ThreatSTOP
- Tidal Cyber
- Tidelift
- tier zero zecurity
- TikTok for developers
- TLPBLACK
- Token
- totum
- Tracebit
- Treblle
- Trellix
- Tremolo Security
- Trenchant
- TRENDMicro
- Trickest
- TridentStack
- Trimarc
- Tripwire
- True Positives
- TrueSec
- Truffle Security
- Trunc
- Trustlook
- Trustwave
- TU/e
- TurtleSec
- Twosense
- Ultimate IT Security
- UpGuard
- Uptycs
- Upwind
- UnderDefense
- Unicorn Security
- UNPACME
- Untrusted Network
- usd HeroLab
- Vaadata
- Valence
- Valentin Lobstein
- Validin
- vansec
- Varonis
- VDA Labs
- Vectra
- Ventral Digital
- Veracode
- Veria Labs
- Verichains
- Versprite
- Vertex
- VetSec
- vicarius
- Videah
- Viettel Security
- Virtual Cybersecurity Consultant
- VirusTotal
- Volkis
- Vonahi
- VMRay
- VNG Security Response Center
- VoidStar
- Volatility Labs
- Volexity
- vpnMentor
- vSecureLabs
- vu.ls
- VulnCheck
- Vulnerable U
- Vulners Blog
- Wall of Sheep
- Warrant
- Washington Center for Cybersecurity Research & Development
- watchTowr Labs
- Websec
- webz.io
- welivesecurity by eset
- WeSecureApp
- White Intel
- White Knight Labs
- White Oak Security
- WhiteSource
- Wildfire Labs
- WIMsecurity
- Winsider
- WisdomFreak
- WithSecure
- Wiz
- Wordfence
- X41 D-Sec
- XBOW
- XLab
- XM CYBER
- Xposed or Not
- Yarix
- Yes We Hack
- Yongheng Chen (Ne0)
- yubico
- The Zap Blog
- ZDResearch
- ZecOps
- Zeek
- Zenity Labs
- Zero Day Initiative
- ZeroPath
- Zetier
- Zeus wpi
- ZeusCloud
- Zigrin Security
- Zimperium’s Mobile Security Blog
- Zod Magus
- Zolder
- zscaler
- ZX Security
Writeup Blogs
- 0dayfans
- Bug Bounty Writeups
- Bug Hunters Reports | Google
- Chr0x6eOs
- devcraft.io
- hxp
- Khaotic
- Mohamed Chamli
- Open Bug Bounty Blog
- Organi{s|z}ers
- Pentester Land
- Pwnistry
- Security Breached Blog
- theinfosecblog.com
- Writeup-DB
Aggro Sites
- 4sysops
- ADMIN Network & Security
- all InfoSec news
- Analyst1
- Bank Info Security
- blackmoreops
- BlackSecNews
- BleepingComputer
- Blue Team News
- Breaking Defense
- Bug Bounty POC
- Bugreader Social
- C4ISRNET
- Chemical Facility Security News
- CISO2CISO
- cti-grapevine
- Ctrl.blog
- Curated Intelligence
- Cyber Info
- Cyber Security Hub
- Cyber Security News
- CyberCareers
- Cyberfeed.io
- cybernews
- CyberScoop
- Cybersecurity Dive
- Cybersecurity Insiders
- CyberSecurity Log
- CyberTalk
- Cyber Threat Intelligence Training Center
- CyberThreat Intelligence
- CyberXplore
- CySecurity News
- CySec-Hub
- The Dark Source
- DARKReading
- Data Breach Today
- DeepSec
- Defense Lead
- Deform
- eSecurity Planet
- Forensic Focus
- GBHackers on Security
- ghacks.net
- Gov Info Security
- Graham Cluley
- The Gray Area
- Hack Dojo
- The Hacker News
- Hackernoon
- HackersOnlineClub
- HackRead
- haq.news
- HELPNETSECURITY
- Human Layer Security
- Industrial Cyber
- infoRisk Today
- Infosec Write-Ups
- infosecstreams
- Infosecurity Magazine
- Insights2Techinfo
- Irongeek
- IT Security Guru
- ITOCHU Cyber & Intelligence Inc.
- iustin24
- Jitsumi Blog
- KrebsonSecurity
- LetsHack
- LinuxSecurity
- Malware.news
- meterpreter.org
- Morning #Infosec News
- MSMVPs
- Naked Security
- NetSec.news
- nixhacker
- NotifyCyber
- nudesystems
- The Olivers Post
- OODALOOP
- OpenCIRT
- Pentest Tools
- README_Infosec
- RealInfosec.net
- Reconshell
- REhacks
- Secflux
- Secpigeon
- Security Affairs
- Security Boulevard
- Security Café
- Security Intelligence
- Security Investigation
- the security ledger
- Security Threat News
- Security Weekly
- securityonline.info
- Seebug
- Seqrite
- skopenow
- SOC Investigation
- Strategy of Security
- sudo security
- SuspectFile
- Telsy
- THEXPLOIT
- threatpost
- The Cyber Security Times
- The Unofficial HackerOne Disclosure Timeline
- Vocal.media | Cybersecurity
- Vulnerability Magazine
- webs3c
- wololo.net
- zapstiko