Who and what to follow in the world of cyber security
Clone or download
Latest commit d8f69d3 Oct 4, 2018
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
CONTRIBUTING.md Create CONTRIBUTING.md Jan 26, 2018
README.md adding podcasts Oct 4, 2018

README.md

Who and What (News, Blogs, Sites, IRC Channels) to Follow Related to Cyber Security

One of the questions I often get from folks that are just getting started in cyber security, is "Who do you recommend following on Twitter and what news, blogs or any other sources do you follow?"

The Art of Hacking GitHub Repository

I strongly suggest for you to become familiar (and/or "star") The Art of Hacking GitHub Repository!

The Art of Hacking is a series of video courses and live training sessions with the goal of providing a guide to help you get up and running with your cybersecurity career. I created The Art of Hacking GitHub Repository to provide supplemental material, tons of references, scripts, and code that help you build your own hacking environment, examples of real-life penetration testing reports, DFIR, vuln research, exploit development, reverse engineering, and more. It now has over 6,000 references!

Cyber Security Blogs to Follow

(sorted alphabetically)

Who to follow in Twitter in the world of cyber security

(sorted alphabetically)

  • @0xabad1dea
  • @0xcharlie
  • @aaronportnoy
  • @agl__
  • @aionescu
  • @AngelaOrebaugh
  • @arj
  • @ashk4n
  • @bascule
  • @benrothke
  • @boblord
  • @bradarkin
  • @BrianHonan
  • @briankrebs
  • @calebbarlow
  • @Carlos_Perez
  • @cesarcer
  • @csoghoian
  • @cyberwar
  • @dakami
  • @dangoodin001
  • @dannyyadron
  • @DaveAtErrata
  • @DaveMarcus
  • @daveshackleford
  • @DhiaLite
  • @DidierStevens
  • @dinodaizovi
  • @djrbliss
  • @dlitchfield
  • @drericcole
  • @e_kaspersky
  • @ejhilbert
  • @gattaca
  • @gcluley
  • @HackingDave
  • @headhntr
  • @humanhacker
  • @i0n1c
  • @InfosecEditor
  • @infosecjerk
  • @jack_daniel
  • @JarnoLim
  • @jeremiahg
  • @jeromesegura
  • @jesperjurcenoks
  • @jjx
  • @JoelEsler
  • @JohnBristowe
  • @jonoberheide
  • @joshcorman
  • @justinelze
  • @k8em0
  • @kernelpool
  • @kevinmitnick
  • @KristinPaget
  • @kpyke
  • @Luis_Corrons
  • @malwareunicorn
  • @MalwareJake
  • @MalwareTechBlog
  • @marcwrogers
  • @mattblaze
  • @matthew_d_green
  • @McGrewSecurity
  • @mdowd
  • @mikko
  • @mroesch
  • @msuiche
  • @nicolasbrulez
  • @nicoleperlroth
  • @nudehaberdasher
  • @offsectraining
  • @PatrickCMiller
  • @PaulCoggin
  • @peterwsinger
  • @pod2g
  • @rj_gallagher
  • @roblemos
  • @runasand
  • @ryanaraine
  • @s7ephen
  • @santosomar
  • @SeanAMason
  • @schneierblog
  • @SecBarbie
  • @security_craig
  • @SecurityExpert
  • @securityshell
  • @securityweekly
  • @Shpantzer
  • @stephenfewer
  • @StewartRoom
  • @SwiftOnSecurity
  • @talossecurity
  • @taosecurity
  • @taviso
  • @thegrugq
  • @TiffanyRad
  • @tqbf
  • @troyhunt
  • @SecurityBeard
  • @WeldPond
  • @WTFuzz
  • @Zulfikar_Ramzan

Podcasts)