One of the questions I often get from folks that are just getting started in cyber security, is "Who do you recommend following on Twitter and what news, blogs or any other sources do you follow?"
Let's make a comprehensive list here. If you do not use GitHub, just send me a message or create an issue here. Feel free to do a pull request and contribute to the lists.
(sorted alphabetically)
- Ars Technica - http://arstechnica.com
- Bruce Schneier's Blog: https://www.schneier.com
- CIO - http://www.cio.com/category/security
- Cisco Security Blog: http://blogs.cisco.com/security
- Continuum: https://continuum.cisco.com
- CSO Online - http://www.csoonline.com
- Cyber Defense Magazine - http://www.cyberdefensemagazine.com/
- cyberscoop - https://www.cyberscoop.com/
- Darknet - https://www.darknet.org.uk/
- Dark Reading - http://www.darkreading.com/
- Data Breaches - https://www.databreaches.net/
- Didier Stevens Blog - https://blog.didierstevens.com/
- Epic - https://epic.org/
- Errata Security - http://blog.erratasec.com/
- Exploit Databse - https://www.exploit-db.com/
- F-Secure Safe & Savvy Blog - http://safeandsavvy.f-secure.com
- FireEye Blog - https://www.fireeye.com/blog.html
- Fox IT Security Blog - http://blog.fox-it.com
- Google Online Security Blog - http://googleonlinesecurity.blogspot.ro
- Graham Cluley - https://www.grahamcluley.com
- Hack Read - https://www.hackread.com/
- Heimdal Security Blog - https://heimdalsecurity.com/blog/
- Help Net Security - http://www.net-security.org
- Information Security Buzz - http://www.informationsecuritybuzz.com/
- InfoSecurity Magazine - http://www.infosecurity-magazine.com
- Kaspersky Lab’s Securelist - https://securelist.com
- Kaspersky Lab’s ThreatPost - http://threatpost.com
- KnowBe4 Blog - https://blog.knowbe4.com/
- Krebs on Security: http://krebsonsecurity.com
- Malware Must Die: http://blog.malwaremustdie.org
- Malwarebytes Labs - https://blog.malwarebytes.org
- Mashable - http://mashable.com/category/cybersecurity
- McAfee security blog - http://blogs.mcafee.com
- Microsoft Malware Protection Center - http://blogs.technet.com/b/mmpc
- Motherboard Vice - http://motherboard.vice.com/en_us
- Naked Security - https://nakedsecurity.sophos.com
- OpenDNS (Cisco Umbrella) Blog - https://blog.opendns.com
- OWASP -Not a blog, but a must - - https://www.owasp.org
- Packet Storm Security - https://packetstormsecurity.com/
- Paul’s Security Weekly - http://securityweekly.com
- PCMag’s Security Watch - http://securitywatch.pcmag.com
- Peerlyst - https://www.peerlyst.com
- Phish Labs Blog - https://info.phishlabs.com/blog/
- SANS Blogs - https://www.sans.org/security-resources/blogs
- SC Magazine - http://www.scmagazine.com
- Security Affairs - http://securityaffairs.co/wordpress/
- Security Magazine - https://www.securitymagazine.com/
- Security Week - http://www.securityweek.com/
- Softpedia - http://www.softpedia.com/
- Spiceworks Security - https://community.spiceworks.com/security/general/
- SpiderLabs Security Blog - https://www.trustwave.com/Resources/SpiderLabs-Blog
- Symantec's Blog: https://www.symantec.com/connect/blogs
- TALOS: https://www.talosintelligence.com/
- Tao Security - https://taosecurity.blogspot.com
- Techcrunch - https://techcrunch.com/tag/security
- TechTarget Security - http://searchsecurity.techtarget.com/
- Techworld Security - http://www.techworld.com/security
- The Art of Hacking courses GitHub repository - https://github.com/The-Art-of-Hacking/art-of-hacking
- The Guardian Information Security Hub - https://www.theguardian.com/technology/data-computer-security
- The Hacker News - http://thehackernews.com
- The Register - http://www.theregister.co.uk
- ThreatPost: https://threatpost.com
- ThreatWire - http://www.threatwire.net/
- TrendMicro Blog - https://blog.trendmicro.com/trendlabs-security-intelligence/
- Tripwire Blog - https://www.tripwire.com/state-of-security/
- Troy Hunt - https://www.troyhunt.com
- US-CERT - https://www.us-cert.gov
- Webroot Blog - https://www.webroot.com/blog/
- Wired Threat Level - http://www.wired.com/category/threatlevel
- Zero Day - http://www.zdnet.com/blog/security
(sorted alphabetically)
- @0xabad1dea
- @0xcharlie
- @aaronportnoy
- @agl__
- @aionescu
- @AngelaOrebaugh
- @arj
- @ashk4n
- @bascule
- @benrothke
- @boblord
- @bradarkin
- @BrianHonan
- @briankrebs
- @calebbarlow
- @Carlos_Perez
- @cesarcer
- @csoghoian
- @cyberwar
- @dakami
- @dangoodin001
- @dannyyadron
- @DaveAtErrata
- @DaveMarcus
- @daveshackleford
- @DhiaLite
- @DidierStevens
- @dinodaizovi
- @djrbliss
- @dlitchfield
- @drericcole
- @e_kaspersky
- @ejhilbert
- @gattaca
- @gcluley
- @HackingDave
- @headhntr
- @humanhacker
- @i0n1c
- @InfosecEditor
- @infosecjerk
- @jack_daniel
- @JarnoLim
- @jeremiahg
- @jeromesegura
- @jesperjurcenoks
- @jjx
- @JoelEsler
- @JohnBristowe
- @jonoberheide
- @joshcorman
- @justinelze
- @k8em0
- @kernelpool
- @kevinmitnick
- @KristinPaget
- @kpyke
- @Luis_Corrons
- @malwareunicorn
- @MalwareJake
- @MalwareTechBlog
- @marcwrogers
- @mattblaze
- @matthew_d_green
- @McGrewSecurity
- @mdowd
- @mikko
- @mroesch
- @msuiche
- @nicolasbrulez
- @nicoleperlroth
- @nudehaberdasher
- @offsectraining
- @PatrickCMiller
- @PaulCoggin
- @peterwsinger
- @pod2g
- @rj_gallagher
- @roblemos
- @runasand
- @ryanaraine
- @s7ephen
- @santosomar
- @SeanAMason
- @schneierblog
- @SecBarbie
- @security_craig
- @SecurityExpert
- @securityshell
- @securityweekly
- @Shpantzer
- @stephenfewer
- @StewartRoom
- @SwiftOnSecurity
- @talossecurity
- @taosecurity
- @taviso
- @thegrugq
- @TiffanyRad
- @tqbf
- @troyhunt
- @SecurityBeard
- @WeldPond
- @WTFuzz
- @Zulfikar_Ramzan