One of the questions I often get from folks that are just getting started in cyber security, is "Who do you recommend following on Twitter and what news, blogs or any other sources do you follow?"
I strongly suggest for you to become familiar (and/or "star") The Art of Hacking GitHub Repository!
The Art of Hacking is a series of video courses and live training sessions with the goal of providing a guide to help you get up and running with your cybersecurity career. I created The Art of Hacking GitHub Repository to provide supplemental material, tons of references, scripts, and code that help you build your own hacking environment, examples of real-life penetration testing reports, DFIR, vuln research, exploit development, reverse engineering, and more. It now has over 6,000 references!
(sorted alphabetically)
- Ars Technica - http://arstechnica.com
- Bruce Schneier's Blog: https://www.schneier.com
- CIO - http://www.cio.com/category/security
- Cisco Security Blog: http://blogs.cisco.com/security
- Continuum: https://continuum.cisco.com
- CSO Online - http://www.csoonline.com
- Cyber Defense Magazine - http://www.cyberdefensemagazine.com/
- cyberscoop - https://www.cyberscoop.com/
- Darknet - https://www.darknet.org.uk/
- Dark Reading - http://www.darkreading.com/
- Data Breaches - https://www.databreaches.net/
- Didier Stevens Blog - https://blog.didierstevens.com/
- Epic - https://epic.org/
- Errata Security - http://blog.erratasec.com/
- Exploit Databse - https://www.exploit-db.com/
- F-Secure Safe & Savvy Blog - http://safeandsavvy.f-secure.com
- FireEye Blog - https://www.fireeye.com/blog.html
- Fox IT Security Blog - http://blog.fox-it.com
- Google Online Security Blog - http://googleonlinesecurity.blogspot.ro
- Graham Cluley - https://www.grahamcluley.com
- Hack Read - https://www.hackread.com/
- Heimdal Security Blog - https://heimdalsecurity.com/blog/
- Help Net Security - http://www.net-security.org
- Information Security Buzz - http://www.informationsecuritybuzz.com/
- InfoSecurity Magazine - http://www.infosecurity-magazine.com
- Kaspersky Lab’s Securelist - https://securelist.com
- Kaspersky Lab’s ThreatPost - http://threatpost.com
- KnowBe4 Blog - https://blog.knowbe4.com/
- Krebs on Security: http://krebsonsecurity.com
- Malware Must Die: http://blog.malwaremustdie.org
- Malwarebytes Labs - https://blog.malwarebytes.org
- Mashable - http://mashable.com/category/cybersecurity
- McAfee security blog - http://blogs.mcafee.com
- Microsoft Malware Protection Center - http://blogs.technet.com/b/mmpc
- Motherboard Vice - http://motherboard.vice.com/en_us
- Naked Security - https://nakedsecurity.sophos.com
- OpenDNS (Cisco Umbrella) Blog - https://blog.opendns.com
- OWASP -Not a blog, but a must - - https://www.owasp.org
- Packet Storm Security - https://packetstormsecurity.com/
- Paul’s Security Weekly - http://securityweekly.com
- PCMag’s Security Watch - http://securitywatch.pcmag.com
- Peerlyst - https://www.peerlyst.com
- Phish Labs Blog - https://info.phishlabs.com/blog/
- SANS Blogs - https://www.sans.org/security-resources/blogs
- SC Magazine - http://www.scmagazine.com
- Security Affairs - http://securityaffairs.co/wordpress/
- Security Magazine - https://www.securitymagazine.com/
- Security Week - http://www.securityweek.com/
- Softpedia - http://www.softpedia.com/
- Spiceworks Security - https://community.spiceworks.com/security/general/
- SpiderLabs Security Blog - https://www.trustwave.com/Resources/SpiderLabs-Blog
- Symantec's Blog: https://www.symantec.com/connect/blogs
- TALOS: https://www.talosintelligence.com/
- Tao Security - https://taosecurity.blogspot.com
- Techcrunch - https://techcrunch.com/tag/security
- TechTarget Security - http://searchsecurity.techtarget.com/
- Techworld Security - http://www.techworld.com/security
- The Art of Hacking courses GitHub repository - https://github.com/The-Art-of-Hacking/art-of-hacking
- The Guardian Information Security Hub - https://www.theguardian.com/technology/data-computer-security
- The Hacker News - http://thehackernews.com
- The Register - http://www.theregister.co.uk
- ThreatPost: https://threatpost.com
- ThreatWire - http://www.threatwire.net/
- TrendMicro Blog - https://blog.trendmicro.com/trendlabs-security-intelligence/
- Tripwire Blog - https://www.tripwire.com/state-of-security/
- Troy Hunt - https://www.troyhunt.com
- US-CERT - https://www.us-cert.gov
- Webroot Blog - https://www.webroot.com/blog/
- Wired Threat Level - http://www.wired.com/category/threatlevel
- Zero Day - http://www.zdnet.com/blog/security
(sorted alphabetically)
- @0xabad1dea
- @0xcharlie
- @aaronportnoy
- @agl__
- @aionescu
- @AngelaOrebaugh
- @arj
- @ashk4n
- @bascule
- @benrothke
- @boblord
- @bradarkin
- @BrianHonan
- @briankrebs
- @calebbarlow
- @Carlos_Perez
- @cesarcer
- @csoghoian
- @cyberwar
- @dakami
- @dangoodin001
- @dannyyadron
- @DaveAtErrata
- @DaveMarcus
- @daveshackleford
- @DhiaLite
- @DidierStevens
- @dinodaizovi
- @djrbliss
- @dlitchfield
- @drericcole
- @e_kaspersky
- @ejhilbert
- @gattaca
- @gcluley
- @HackingDave
- @headhntr
- @humanhacker
- @i0n1c
- @InfosecEditor
- @infosecjerk
- @jack_daniel
- @JarnoLim
- @jeremiahg
- @jeromesegura
- @jesperjurcenoks
- @jjx
- @JoelEsler
- @JohnBristowe
- @jonoberheide
- @joshcorman
- @justinelze
- @k8em0
- @kernelpool
- @kevinmitnick
- @KristinPaget
- @kpyke
- @Luis_Corrons
- @malwareunicorn
- @MalwareJake
- @MalwareTechBlog
- @marcwrogers
- @mattblaze
- @matthew_d_green
- @McGrewSecurity
- @mdowd
- @mikko
- @mroesch
- @msuiche
- @nicolasbrulez
- @nicoleperlroth
- @nudehaberdasher
- @offsectraining
- @PatrickCMiller
- @PaulCoggin
- @peterwsinger
- @pod2g
- @rj_gallagher
- @roblemos
- @runasand
- @ryanaraine
- @s7ephen
- @santosomar
- @SeanAMason
- @schneierblog
- @SecBarbie
- @security_craig
- @SecurityExpert
- @securityshell
- @securityweekly
- @Shpantzer
- @stephenfewer
- @StewartRoom
- @SwiftOnSecurity
- @talossecurity
- @taosecurity
- @taviso
- @thegrugq
- @TiffanyRad
- @tqbf
- @troyhunt
- @SecurityBeard
- @WeldPond
- @WTFuzz
- @Zulfikar_Ramzan