Infosec Blogs: Our Cup Runneth Over
I was inspired by this tweet to compile a master-list of infosec-related blogs. Of course I knew this would turn up quite a few results but I’ve really been amazed by how much is out there! Infosec blogs of all shapes and sizes are out there in the wild and I want to find ‘em all. Will try to keep this up-to-date as I run across new sites. I’ve split it into blogs from “individuals” versus those run by larger commercial organizations. If i’m missing one you know of, or it’s your blog that is missing, please contact me!
For anyone interested, I’ve made available my exported .opml file (last exported June 15, 2022) with the sources listed below. You can import this into the RSS reader of your choice! Personally, I use Feedly and can highly recommend the service. (I will try to update this export semi-regularly).
- Boutique Security Blogs
- Commercial Blogs
- Writeup Blogs
- Aggro Sites
Search is not overly optimized, may be a little jittery...
Boutique Security Blogs
- ./s1gh.sh
- #_shellintel
- +Ch0pin
- /dev/null
- /dev/random
- /Jenn
- ?Mr.Hacker
- 003Random’s Blog
- 0DAY
- 0day.click
- 0x0021h
- 0xacb
- 0xash
- 0xPat blog
- 0patch
- 0x00sec
- 0x240x23elu
- 0x41.cf
- 0x41414141 in ?? ()
- 0x4rk0
- 0x90r00t
- 0xbadb00da
- 0xbb
- 0xdf hacks stuff
- 0xdln
- 0xEchidonut
- 0xf0x
- 0XFFFF
- 0xGodson & Medium
- 0xhuesca
- 0xInfection
- 0xinfection’s security ramblings
- 0xJin
- 0xkasper
- 0xNinja
- 0xRick’s Blog
- 0xrishabh
- 0xsha.io
- 0xsp
- 0xStarlight
- 0xthreatintel
- 0DAY IN {REA_TEAM}
- 0ut3r Space
- 1 t0 Zero
- 10DEGRES
- 128nops and counting
- 2019’s blog
- 3xpl01tc0d3r
- 4n7m4n
- 5alt’s Blog
- 5pider.net
- 8051enthusiast
- A Bug’z Life
- A Few Thoughts on Cryptographic Engineering
- a real poke in the eye… oh…
- A2nkF’s Blog
- AaLI86 Security
- Aaron’s Blog
- Aashish Jung Kunwar
- Aayush Pokhrel
- Abay
- Abdallah Elnoty
- Abde Ouabala
- Abdelfattah Ibrahim
- Abdelhamid Blog
- abdellah yaala
- Abdelrahman Khaled
- Abdillah Muhamad
- Abdulrahman Makki
- Abdullah Hussam
- Abdullah Mohamed
- Abdulrahman-Kamel
- Abhijeet Biswas
- Abhinav Thakur
- Abhind Abhi
- Abhiram’s Blog
- Abhisek R
- Abhishek
- Abhishek Pathak
- Aboullaite Med
- Abss
- Ace Candelario
- acmpxyz
- Active Directory Security
- Adam Svoboda
- adam-p
- Adapt and Attack
- ADD / XOR / ROL
- Addictive Hackers
- Adepts of 0xCC
- Adesh Kolte
- Adeyefa Oluwatoba
- Aditya Sharma
- Aditya Soni
- Aditya Verma
- Adolphoramirez
- Adnan Malik
- Adrien
- Advance Programs and Tricks in Java
- Adwaith KS
- aeternusmalus
- Aethlios
- affinesecurity
- AFINE
- Afolic
- AGARRi
- AGDC Security
- Agora Security
- AGS_Syndrome
- Ahmad A Abdulla
- Ahmed Constant
- Ahmad Halabi
- Ahmad Talahmeh
- Ahmed A. Sherif
- Ahmed Hassan
- Ahmed Magdy
- AidenPearce369 github.io
- Aidil Arief
- Airlangga Visnhu Murthi
- Aishwarya Kendle
- Ajay Gautam
- Ajinkya Pathare
- AK>
- Ak1T4
- Akash basnet
- Akash Hamal
- Akash Rox Starz
- Akhil
- Akijosberry
- Akshansh JaisWal
- Akshar Tank
- AkShAy KaTkAr
- Akshita Gupta
- Alaa Abdulridha
- Alan Brian
- aldeid
- Alex Birsan
- Alex Chapman
- Alex Franco
- Alex Ionescu’s Blog
- Alex Levinson
- Alex Plaskett
- Alex Studer
- Alexander Bakker’s Blog
- Alexander Popov
- Alexander Slesarev
- Alexander V. Leonov
- Alexandru Coltuneac
- Alfie
- Alfie Champion
- Ali Aqeel
- Ali Razzaq
- Ali TUTUNCU
- Alice Climent-Pommeret
- All About OSCP
- All Things Time Related…
- All Your Base Are Belong To Me
- Alli-Balogun Faruq
- allysonomalley.com
- ALMADJ.US
- Almond Offensive Security Blog
- Alice, Eve and Bob
- Alice Goldfuss
- Almost Secure
- Alpha Cyber Security
- Alpha Lab of Topsec
- Alsid
- Aly Anwar
- AM0NSEC or this
- Aman Gupta
- Aman Pareek
- Ameer Assadi
- Amer Hukic
- Amine Aboud
- Amir Mohamadi
- amirr0r
- Amit Kumar Biswas
- amnotacat
- Amol Baikar
- AMOSSYS
- Amyrahm
- An Analytical Approach
- an endless xploration..
- Anas Mahmood - Hacker Inside
- André Lima
- Andrea Fortuna
- Andres Alonso
- Andres Riancho
- Andrew Ayer
- Andrew Kerr
- Andrew Nohawk
- Andrewaeva
- Andrey Konovalov
- Andy Piazza
- Aneesha D
- AneesKhan
- Александр Опанасюк
- Ángel Cortez
- Anh Duc Nguyen
- Anil Tom
- Ankush Goel
- Ansari Osama
- anthok
- Anton Subbotin (skavans)
- Anubhav Singh
- Anurag__Verma
- Anuragbhoir11
- apageinsec
- Apapedulimu
- apenwarr
- apjone
- AppSec Monkey
- APT::WTF
- Arash’s Blog
- arben.sh
- Arcade Hacker
- arcfour.cc
- Arch Cloud Labs
- Are We Safer Yet?
- Arif-ITSEC111
- Arjun Shibu
- Arkadiy Tetelman
- Armaan Pathan
- Arne Swinnen’s Security Blog
- Arseniy Sharoglazov
- The Art of Machinery
- Artem Golubin
- Artem Kondratenko
- Arth Bajpai
- Artificial truth
- Artsploit
- arty-hlr
- Asad
- asdqw3
- Asem Eleraky
- Aseem Shrey
- Ash King
- Ashik
- Ashish Dhone
- Ashish Kunwar
- Ashley Pearson
- Ashok Acharya
- Ashok Chapagai
- Ashraf Harb
- Ashutosh mishra
- Astr0baby
- Aswin Thambi Panikulangara
- AtomicNico
- Atredis
- Attack Debris
- Attactics
- Attila Suszter
- attl4s.github.io
- Atum
- Aung Pyae Ko Ko
- Avanish Pathak
- avasdream
- Avinash Jain
- Awakened
- Awarau
- Ax1al & this
- Ay Oub
- Ayaz Mammadov
- Ayush Ojha
- Aziz Hakim
- Azure AD Stuff
- BabaBounty
- Babligan
- Bachrudin Ashari Pujakusuma
- Back Engineering
- bad5ect0r
- badbit.vc
- Bahruz Jabiyev
- Baibhav Anand
- Baibhav Anand Jha
- Baker Street Forensics
- Bala Praneeth (Begin_hunt)
- Baltazar Studios
- baluz
- Banana Mafia
- Barbells and Root Shells
- Baron
- bartunek.me
- Bastian Bloessl
- Basyouni
- batsec
- bazad.github.io
- BB-88
- Bbinfosec
- BBQSec
- BEELOG
- Beetles Blog
- Behnam Yazdanpanah
- Believe and Persist
- BelovedTech
- <Ben>
- ben aymen
- Ben Balter
- Ben Kehoe
- Ben Prime
- Ben Stone Online
- Ben’s ideas and projects
- Bend Theory
- Benjamin Heald Personal Security Blog
- Benjamin Walter
- Benji Tobias
- Bentham’s Gaze
- Berk Dusunur
- Bernardo de Araujo
- bertinjoseb
- better appsec
- {BETTER} HACKER
- Bhavarth Kandoria
- Bhavesh Thakur
- Bhavuk Jain
- BHUPENDRA RAJBHAR
- bi.tk
- Bilal Khan
- Bill Demirkapi’s Blog
- Bill’s Blog
- Billy Ellis
- Binamra Pandey
- Binary Debt
- Binary Research
- Binary’s Blog
- BinaryLabs
- Binge on Cyber
- Bipin Jitiya
- BishopFox
- The Bit Explorer
- Bitquark
- Bits of Security
- Bitsadmin
- Black Swan Security
- black_b
- blacklabsDev
- Blah Cats
- Blake’s R&D
- Blawg
- Blog du CRI
- BLOG OF F1SH
- Blog of Osanda
- The blog of a gypsy engineer
- BLOG_TITLE
- Blue Team Blog
- Bobbyr
- Boemo Mmopelwa
- Bof.
- Bogner.sh
- bohops
- boku
- boku7
- Boring AppSec
- Bot Ami
- Brandon Roldan
- Brandon Shi
- Brannon Dorsey
- Brazil’s Blog
- BreakDev
- Breanne Boland
- Breizh Zero-day Hunters
- Brendan
- Brendon
- Brett Buerhaus
- Brett Shavers | Ramblings
- brute ratel By Dark Vortex
- Brute XSS
- buckhacker
- Bug bounty
- Bug Bounty Findings By Meals
- BugDisclose
- The bugs you are looking for and this
- Burninator Sec
- BushidoToken
- bussink
- byq
- byt3bl33d3r
- Byte Breach
- byte.how
- Bywalks
- c-APT-ure
- c-skills
- C:\HRISTINA MORILLO
- C1h2e1
- c4rrilat0r
- Caesar Evan Santoso
- Caffeine’s Site
- Call4Cloud
- Camille Fournier
- Can I Haz Security
- Can.ac
- Canada VPNs
- cappriciosecurities
- Capt. Meelo
- CaptainFreak
- Carlo Maragno
- Carlos Daniel Giovanella
- Carnal 0wnage
- Cas van Cooten
- Casey Smith
- Cassie Cage
- cat /dev/brain
- cat /etc/shadow
- catnip
- Cedric Owens
- Celolme Prezime
- cerbersec
- ceres-c
- Ch3ckM4te
- Chaah
- Chaitanya Rajhans
- champtar.fr
- Chand Singh
- CHANGALAMAADAN
- Chao-tic
- Chatter From a Charlatan
- Cheeky4N6Monkey
- Chen Cohen
- ChooK
- Chris Hernandez
- Chris Long
- Chris Mullins
- Chris Partridge
- Chris Sanders
- Chris’s Security and Tech Blog
- Christoph Michel
- Christophe Tafani-Dereeper
- Christopher Jerkeby
- Christopher Tarquini’s Blog
- Chuong Dong
- Chybeta
- Cider
- cinzinga
- Ciofeca Forensics
- Circle Ninja
- Clark Voss
- clearbluejar
- Clever Title Goes Here
- Clinically Awesome
- Cloudbrothers
- cnblogs
- Co0nan
- cocomelonc
- Coda Hale
- Code White
- CodeColorist
- CODEINSECURITY
- codemuch.tech
- Coding_Karma
- Coen Goedegebure
- Colin Winhall
- colton1skees
- Communication Breakdown
- Computer Insecurities
- COMSEC
- Conor Richard
- Connor McGarr
- Considerations on Codecrafting
- Console Cowboys
- Corben Leo
- Cornelius Aschermann
- CornerPirate
- Corraldev
- Count Upon Security
- counterintellligence.pl
- Courk’s Blog
- covert.io
- cr0
- Crader Security
- Craig Hays
- Craig Younkins
- Cristian Cornea
- Cronop.io
- cryptax
- Cryptograph3r
- Cryptographer
- Cryptohack
- crysp
- CS Dev Blog
- csandker
- Cshark.dev
- ctrl.red
- cube0x0
- Culbert Report
- Curmudgeonly Ways
- Curtis Brazzell
- cutesmilee’s blog
- Cyb3rSecurity Tips
- CYB3RSN0RLAX
- Cyber BluePurple
- Cyber Geeks
- Cyber Sec Nelly
- The Cyber Union
- The Cyber Writer
- cyber.wtf
- CyberCrime & Doing Time
- CYBERDEFNERD
- CyberEthical.Me
- Cybergibbons
- CyberGuy
- Cyberick
- CyberKACH
- Cybernotdienst
- CyberSmash
- Cyberspark
- cyberstoph
- CyberZombi3
- Cybher Diaries
- CybristerBoy
- cybrr_wardior_official
- d0nut
- D20 Forensics
- Daax Rynd
- daddycocoaman
- daeken
- Damanpreet Singh
- Dan Fabro
- Dan Lyton
- Danang Tri Atmaja
- Dane Stuckey
- Daniel Chronlund Cloud Tech Blog
- Daniel Gebert
- Daniel Kelley
- Daniel Maksimovic
- Daniel Marte
- Daniel Thatcher
- Daniele Antonioli
- Dark Symphonie
- dark-haxor
- DarkMatterMatt
- Darren Martyn
- Darryn Brownfield
- Darvin’s Blog
- Dave Waterson on Security
- David Buchanan
- David Colombo
- David Nechuta
- David Okeyode
- David Schutz
- David Shaul
- David Westerfield
- Davide
- Dawns Lab
- Dawood Ikhlaq
- DAY0
- Dazzy Ddos
- DCG 201
- de engineering
- deadf00d
- DeathByTape
- Debasish Mandal’s Blog
- Debprasad Banerjee
- Decaff Hacking
- decidedlygray
- Decoder’s Blog
- Deep Patidar
- Deepak Holani
- Deepsec
- Dejan Zelic
- Details of Note
- DEV
- Devansh batham
- Devansh’s Blog
- Devanshwolf
- Dewanand Vishal
- DFIR and Threat Hunting
- DFIR Diva
- The DFIR Report
- DFIR TNT
- dfir.blog
- Dfreshalot
- dhakal_bibek
- Dheeraj Madhukar
- Dhole Moments
- DiabloHorn
- Diary of a reverse-engineer
- Didier Stevens
- DigiNinja
- Digital Forensic Science
- Digital Interruption
- Digital Skill
- Digvijay
- Dilip
- Dirk-jan Mollema
- discodamone
- discrete blogarithm
- Dissecting Malwa.re
- Distributed Compute
- Divyansh Sharma
- Dixit Aditya
- DMFR Security
- Dmitry.GR
- DO1ALX
- docfate111
- Doomsday Vault
- The DOS Blog
- Dosxuz
- DoublePulsar
- downwithup
- Doyensec
- doyler.net
- dozer.nz
- Dr. Hackash
- dr3f.k0
- DroneSec
- Duale Siad
- Duc Anh Bui
- Dungeon of the Domain Admins
- dw1
- Dylan Katz
- Dylan Roussel
- Dynamic World
- easySIEM
- ecos.wtf
- Eddie Mora
- Edoardo Rosa
- EdOverflow
- Efiens CTF Team
- Efkan
- Ege Ken
- Egor Homakov
- ehpus
- eikendev
- Elber Andre
- Eli Salem
- EliE
- elkemental Force
- ElMahdi and ElMahdi - マハディ
- ElMahdi Mrhassel
- Elon Gliksberg
- ElSec
- Emad Shanab
- Emanuel Beni Harijanto
- embed-me
- embeddedbits
- Embrace The Red
- Emil Lerner
- Emily Austin
- EmptyDC
- Enitin Blog
- ENOSUCHBLOG
- enumerated
- eostrix.net
- epi052
- The EPIC.blog
- Eric Conrad
- Eric Holmes
- Eric Ooi
- EricaZelic
- erk3’s spot
- Errata Security
- Ertugrul Ozdemir
- Eslam Akl
- ETenal
- Ethical Chaos
- ethicalhacking.sh
- Etienne “tek” Maynier
- ETTIC blog
- eu90h
- Eugene Ng
- Evan Connelly
- Evan Ricafort
- Eviatar Gerzi
- Evi1cg’s blog
- THEEVILBIT
- EvilPacket
- Evonide
- Ex Android Dev
- Exfiltrated.com
- Exploit
- Exploit Research Blog
- Exploit Reversing
- Explore Security
- Ezequiel Pereira
- Ezhes
- f33d by Prelude
- f4d3
- Fabio Freitas
- Fabio Pires
- Fady Othman
- Faith
- Faizan Ahmad Wani
- Faizan Elahi
- Falcnix
- FalconForce blog
- Falling Forward
- Family Guy | The Quest For Stuff
- fapro
- Fardeen Ahmed
- Farewell Song
- Farhad Karimi (n0lsec)
- Fenrir
- Ferib’s Blog
- Fernale
- FHantke
- Filipe Azevedo
- Firas Fatnassi
- FIREFART
- Firzens Blog
- flawed.net.nz
- footstep.ninja
- Forces Unseen
- forensicmike1
- Forensics | Exchange
- Forrest Orr
- Four Zero Three
- fr0stNuLL
- Francisco Correa Security.log
- Frans Hendrik Botes
- fred’s notes
- Friendly
- FrizK
- FrizN
- Frycos Security Diary & old Medium
- Full of Miracles
- Fumik0_’s box
- fuomag9
- Furrtek
- Futaacm Cyber
- Futurelopment
- Fuxsocy
- Fuzzing Science
- Gabor Matuz
- Gabriel Kerneis
- Gal Nagli
- Gal Weizman
- Gamozo Labs
- ganiganeshss79
- Gary’s hacking stuff
- Gaurang Bhatnagar
- Gaurav Mishra
- Gaurav Narwani
- gccybermonks
- Geek Freak
- Geek Girl
- Geeky Cat
- GeneralEG 0x01
- George Osterweil
- George Skouroupathis
- Georgia Crossland
- Gerhard Wagner
- Geva-Kun
- GhostInTheHive
- GHOSTLULZ HACKS
- Giovanni Rocca
- Girish B O
- Gironsec
- Go350
- GoggleHeadedHacker
- Gokberk Yaltirakli
- Gokhan Guzelkokar
- Göktuğ Kaya
- Gokul AP
- Gonzalo Carrasco
- Good Debate
- Good Workaround!
- Gopal Singh
- goswamiijaya
- got 0day?
- Gowtham_Naidu
- Grapl
- Gravitywall Blog
- Greg Molnar
- The Grey Corner
- GrimBins
- GrimmzSec
- Growing Web Security Blog
- GrumpinouT
- Gujjuboy10x00
- Guido Vranken
- Guillaume Quere
- Gupta Shubham
- Guy Lewin’s Blog
- gynvael.coldwind//vx.log
- h3xStream’s blog
- H4cking Labs
- H4x00R
- Haacked
- Haboob
- Hack The World
- Hackademic.in
- hackademix.net
- The Hacker Blog
- The Hacker Factor Blog
- hacker_eth
- HackerChai
- Hackerman’s Hacking Tutorials
- Hackerspot
- HackGuru.tech
- Hacking & Coffee
- Hacking and security
- Hacking Articles
- Hacking Exposed Computer Forensics
- Hacking Journey
- Hacking The Cloud
- Hacking the planet…
- Hackintosh 5
- Hacklad’s Blog
- HackLiu’Blog
- HackMD
- hackndo
- hackrzvijay
- hackso.me
- Hacktive Security Blog
- HackTricks
- Hackyboiz
- HACxyk
- Haft of the Spear
- Haider Mahmood
- Hakim Bencella
- Hanno’s blog
- HanseSecure
- Hardik Nanda
- Hariharan S
- Haris M
- Harish
- Harish SG
- harmj0y
- Haroon Hameed
- Harris
- Harrmahar
- Harry D
- Harry Gill
- Harsh
- Harsh Banshpal
- Harsh Bothra
- Harsh Jaiswal
- Harsh Parekh
- Harsh Tyagi
- Harshad Gaikwad
- hasherezade’s 1001 nights
- Hassan Khan | Security Researcher
- Hatena Blog
- hateshape
- hatless1der
- Hausec
- Haxatron’s Research
- HAXOLOT.com
- Haxxin
- Hayden James
- Hazanasec
- Hazem Brini
- HEARTBURN
- Heck the Packet
- Hedysx
- heige
- Hein Thant Zin
- Hela Lucas
- Helich0pper
- Hella Secure
- HEMANT SINGH MANRAL
- Hesham Watany
- hethical
- Hex Fish’s Blog
- Hexacorn
- hexatomium
- hg_real
- HighOn.Coffee
- Himanshu Khokhar
- himanshu pdy
- Himmat Singh
- hipotermia
- Hisoka Morou
- Hoang Bui
- HoangND
- HOLDMYBEER
- Home of Pierre
- homjxi03
- Honc
- Honoki
- Hop Infosec
- Horkos
- hosch3n
- Hossam Mesbah
- hot3eed
- HoyaHaxa
- Hritik Sharma
- HTTP418 InfoSec
- The Human Machine Interface
- Hungry Bytes
- HuskyHacks & Medium
- Hy3n4
- hyde
- hypervision tips and tricks
- Hypervisor Memory Introspection
- I Am Security
- Ian Barwise
- Ian Carroll
- Ian Duffy
- iamelli0t
- Iandave’s Blog
- Ibrahim Raidia
- Icyguider’s Blog
- Igor’s Blog
- IHTeam
- ijustwannaredteam
- ikuamike.io
- Ilan Kalendarov
- Ilya Kobzar
- imp0rtp3
- ImperialViolet
- Imran Huda
- Imran Nissar
- Imran Parray
- Imre Rad
- Inane Observations
- incogbyte.sec
- incolumitas
- independent security evaluators
- Inderjeet Singh - encodedguy
- InfoOnSecurity
- InfoSec Brothers
- Infosec Coproscribe
- InfoSec Innovations
- infosec.tirol
- InfosecMatter
- InfoSecSherpa
- InfoSect
- InfosecVidya
- ingredous &
- init infosec
- initblog.com
- INMUNE7
- INPUTZERO
- insec.life
- Insecure mode
- Insinuator
- Inti De Ceukelaire
- Into The Symmetry
- Introvert Mac
- Intruder
- Intrusion Truth
- inversecos
- iOS Snapshot Fuzzing
- IP3C4C’s Infosec Adventure
- Irresponsible Disclosure
- Isaac Peka
- Ishaq Mohammed
- Isira Adithya
- Istvan Toth
- IT Security Expert Blog
- itm4n
- ivan ninichuck
- iwantmore.pizza
- IzyKnows
- J0VSEC
- Jack
- Jack Baylor
- Jack Cable - Blog
- Jack Hacks
- Jackson Huff’s Blog
- Jackson kv
- Jackson_T and this
- Jacob Kaplan-Moss
- Jacob Riggs
- Jacopo Tediosi
- Jad Karaki
- Jafar Abo Nada
- Jai Sharma
- Jake Archibald
- Jake Creps
- jamchamb’s blog
- James Clee
- James Coote
- James Grunewald
- James Stevenson
- Jamie Scaife
- Jan Muhammad Zaidi
- Jan0ski’s Security Blog
- Jane Manchun Wong
- Jang
- Jarvis’s Blog
- Jasminder Pal Singh
- Jatin Aesthetic
- Jatin Dhankhar
- Jawad Mahdi
- Jay Bailey
- Jay Jani
- jayateertha guruprasad
- Jean-Christoph von Oertzen
- Jeff Codes Things
- Jefferson Gonzales
- JeffSoh on NetSec
- Jehad
- Jelle van der Waa
- Jelle Vergeer
- Jemma Issroff
- Jerry Shah
- JerryGamblin
- Jesse Clark
- Jesse Li
- Jim Fisher
- JimJourney
- Jinone
- Joe Security Blog
- Joel Cantu
- joeware
- Johannes Bader
- John Hubbard
- John Jackson
- John Lambert
- John Michael Mondilla
- John Opdenakker
- John Woodman’s Security Blog
- Johnny Yu
- Johns Simon
- Jomar Website
- Jon Baker
- Jon Cederqvist
- Jonathan Bouman
- Jonathan Claudius
- Jonathan Johnson
- JonLuca’s Blog
- joonas.fi
- Joran Honig
- Jordan Potti
- Jordan Wright
- Jorge CTF
- Jorge Lajara
- Jorian Woltjer
- Josh Fam
- Joshua Regio
- joshuamasek
- Josip Franjkovic + archive
- Jon’s Site
- JOWI
- JPCERT
- JPMinty
- JSPIN
- JTNYDV
- jub0bs
- Jump ESP, jump!
- JunoonBro
- Just Another Hacker Blog
- Just Another Hacking blog
- Justin Hysler
- Justin Bui
- Justin’s Blog
- justinsteven
- justsecnow
- jychp
- k3170
- k4m1ll0
- Kabilan S
- Kailash
- kali null
- Kalmarunionen
- Kamil Onur Ozkaleli as ko2sec
- Kamil Vavra
- Kanchan Singh Yadav
- Kanhaiya Kumar Singh
- Karan Chaudhary
- Karansh
- Karma(In)Security
- karthik kumar reddy
- Kassih mouhssine
- Kat Traxler - Taste the IAM
- Katana Security
- kaustubh kale
- Kaustubh Padwad
- kazet.cc
- kciredor’s information security blog
- Kedrisec
- Keegan Ryan
- Keerok
- Ken Shirriff’s blog
- Kent Jarold Abulag
- kernal
- KernelPicnic
- Kerolos sameh (xko2x)
- Kevin
- Kevin Massey
- KevSec
- kewde
- Keyboard Warrior
- Keyur Vala
- khaled gaber
- Khaled Hassan
- Khaled Mohamed
- khan mamun
- khonggianmang
- Kirtan Patel
- Kishan choudhary
- kishore hariram
- Kishore TK
- kiwidog’s blog
- kleiton0x7e
- Kleptocratic
- klrgrz
- Knightsbr1dge
- Knownsec 404 team
- Koen Rouwhorst
- kr-b and on Medium
- Krishna Sai Marella
- Kristal’s Notebook
- Krypt3ia
- krystalgamer’s Lair
- Kuldeep’s Blog
- Kumar
- Kunal Khubchandani
- Kunal pandey
- Kurt Russelle Marmol
- Kushal Dhakal
- Kusto King
- Kusuwada
- Kyle B3nac
- kyleavery
- kylebot’s Blog
- kymBlog
- KZA
- L3o
- Lab of a Penetration Tester
- Laconic Wolf
- Ladecruze
- Lady Secspeare
- Lakshay
- lalka
- lander’s posts
- LastStandSecurity
- Latacora
- Laurent Gaffie
- lcamtuf’s blog
- Lê Thành Phúc
- Learning by practicing
- Ledger Donjon
- Lee Holmes
- leethax0.rs
- The Legend of Random
- Leigh-Anne Galloway
- Lenny Zeltser
- Leon Jza
- Lets Automate It
- leucosite
- Level Up Info Sec
- LFYSEC
- Licencia para Hackear
- Life In Hex
- Light Blue Touchpaper
- liman.io
- Line_no 6
- linhlhq’s blog
- LinuxForensics
- Linxz’ Blog
- LiquidSec
- Little Man In My Head
- lkmidas
- LockBoxx
- LODSB
- Logical Bimboo
- Lokesh Kumar
- lolcads tech blog
- LoRexxar
- Lost In Security
- The Lost Notes
- Low-level adventures
- lowleveldesign.org
- Luan Herrera
- Luatix
- LuemmelSec
- Luigi Auriemma
- Lukasz Olejnik
- Luke Berner
- Luke Craig[]
- Luke Tucker
- Lutfu Mert Ceylan
- lwt hiker
- Lyubomir Tsirkov
- M. ȘTEFAN CRISTIAN
- M.G
- m0chan
- m417z
- m4gnum’s blog
- M4t35Z’s blog
- M7.Arman
- Machevalia
- Maciej Szymczyk
- Madaidan’s Insecurities
- Madhav Bhatt
- Mahmood Shahabi
- Mahmoud Barakat
- Mahmoud Gamal
- Mahmoud Mohamed
- Mahmoud Youssef
- MakoSec
- Malay’s blog
- malgregator
- malicious.link | boot mubix.kernel
- MalTrak
- Malware and Stuff
- Malware Maloney
- Malware Musings
- Malware Must Die!
- malware.pizza
- MalwareJoe
- Manas Harsh
- Manchester Grey Hats
- Mandeep Jadon
- mannharleen
- mannulinux
- Manuel Sousa
- Maor Dayan
- Marcelle Lee
- Marcin Niemiec
- Marco Lancini
- Marco Ramilli
- Marcos Ferreira
- Marcos IAF
- Marcus Edmondson
- Marek Geleta
- Mark Mo
- Marin Moulinier
- Mark Christian Deduyo
- Mark Rhoy
- markitzeroday.com
- Mars
- martabyte
- Martin Amps
- Martin Stoynov
- Martin Thirup Christensen
- Martin Vigo
- Martin’s Blog
- Maruf Hosan
- Marx Chryz Del Mundo
- Mashoud1122
- mAshraf
- Mateusz Olejarka
- Mathy Vanhoef
- Matt Langlois
- Matt Shockley
- Matt Traudt
- Matt’s Life Bytes
- Mattias Geniar
- Maurice Heumann
- Mauricio Velazco
- Mava
- Max
- Max Kersten
- Max Pasqua
- maxi
- Maxim Tyukov
- Maxwell Dulin
- Maya Kaczorowski
- Mayank Pandey
- Mayur Gupta
- Mazin Ahmed
- MB blog
- mcorral74
- Md Hridoy
- Md Saikat
- Md Saqib
- Meareg
- mechboy
- Mehdi Alouache
- Mehedi Hasan Remon
- Mehmet Ergene
- mehulpanchal007
- Menasec
- mert’s blog
- mez0
- MG
- mgeeky’s lair
- Micah Lee
- Michael Goodman
- Michael Haag
- Michael Hidalgo
- Michael Hyndman
- Michael Koczwara
- Michele Campa
- Michiel Evers - Infosec Blog
- Mickey’s Blogs
- Microsoft 365 Security
- Microsoft Browser Vulnerability Research
- Mika’s Blog
- Mikail’s Blog
- Mike Brancato
- MikeChan
- Mikey
- Mikko Kenttala
- Milan Magyar
- Milo2012’s Security Blog
- Mindslaves Blog
- Ming Y. Chow
- MisterK
- MitmLab
- The Mitten Mac
- mjg59
- mmmds’s blog
- mmohammed eldeeb
- Mo’men Basel
- Modam3r5
- modexp
- mohamad mahmoudi
- Mohamed Ayad
- Mohamed Daher
- Mohamed Elbadry
- Mohamed Lakhdar Metidji
- Mohamed R. Serwah
- Mohamed Sayed
- Mohamed Taha
- Mohamed Talaat
- Mohammad Ali Syarief
- Mohammad Kaif
- Mohammed Abdul Raheem
- Mohammed Eldawody
- Mohammed Eldeeb
- Mohamed Fakroud | Red Teaming’s Dojo
- Mohammed Israil
- Mohammed Saneem
- Mohit Dabas’s Blog
- Mohsin khan
- Mohsinalibukc
- Monish Basaniwal
- Monke’s Cybersecurity Blog or pmoc.netsoc
- MoSec
- Mostafa
- Mostafa Mamdoh
- MOV AX, BX
- movq %rax, %rax
- Mr Empy
- Mr Homer
- Mr Robert | Ahmed M Hassan
- MR SINISTER | Kabir Suda
- Mr. Beast
- mr.d0x and this
- Mrityunjoy
- MrMax4o4
- mrpentestguy
- MRXstudios
- MSKB(en) and JP
- Mudassir Sharief
- Mudit Gupta’s Blog
- muffSec
- Muhaddis
- Muhammad Aamir
- Muhammad Abdullah
- Muhammad Adel
- Muhammad Sholikhin
- Muhammad Syahrul Haniawan
- Muhammad Thomas Fadhila Yahya
- Muirey03’s Blog
- Mukul Lohar
- Murtada Kamil
- musana
- Musings of a cat torturer
- Mustafa Kemal Can ~ Muskecan
- Mustafa Khan
- Mutawakkil Abduldafe
- Muzec’s Cyber Security Blog
- Muztahidul Tanim
- My “Public Evernote”
- My DFIR Blog
- Mysk
- mzfr’s Blog
- N B Sri Harsha’s Blog
- n0.lol
- N00PY BLOG
- n0nuser
- N1ght-W0lf
- N1GHTMAR3
- n4r1b
- Nafiez
- NAHAMSEC
- nahoragg
- Najam Ul Saqib
- Nanda Kumar
- napongizero
- Naresh LamGade
- narly.me
- Nassim Chami
- Nasreddine Bencherchali
- Nathan
- Naufal Septiadi
- Naveen
- NAVEEN
- Naveen J
- Naveen kumawat
- Naveen Prakaasham K S V
- Naveenroy
- Navneet
- Nawaf Alkhaldi
- Nazmul Haque
- nc-lp.com
- ndevtk
- nee.lv
- neelam
- Neeraj Sonaniya
- Neh Patel
- Neil Madden
- Neilmark Ochea
- neodymiumphi
- Neolex
- neonprimetime security
- Netero1010 Security Lab
- NetSec Focus
- newp_th
- Ngocnb
- Nick Frichette
- Nick Gregory
- Nick’s infrequently updated blog
- NickstaDB
- NickZero’s Blog
- Niebardzo’s Blog
- Niemand
- Night Hawk
- Nightwatch Cybersecurity
- Nikhil (niks)
- Ninad Mathpati
- Ninad Mishra
- ninetyn1ne
- Niraj Modi
- Nirmal Dahal
- Nirmal Thapa
- Nishant Saurav
- Nitin yadav
- NixIntel
- nns.ee
- No Security
- no-sec.net
- Noah Lab
- NomanAli181 | BugBaba
- Noncombatant
- NOO8x.in
- Noob to !Noob
- nOOb_mAsTeR
- Noobie BoY
- NoRed0x
- not so pro
- not-matthias
- NotOnly.Owner
- NotRickyy
- NotSoSecure
- Novan Aziz Ramadhan
- noxx
- Null Hardware
- Null Sweep
- NullSecurity
- Nur A Alam Dipu
- NUS Greyhats
- Nut Crackers Security
- nuxx.net
- NVISO Labs
- nxadmin
- Nyangawa
- Nygetin Paikka - Pigeons!
- OA Labs
- Oad Earth
- OBABY@MARS
- Obum Chidi
- Oday Alhalab
- Oddvar Moe
- Offensive Defence
- Offensive OSINT
- Oleg Kutkov
- OllieJC
- Omaid Faizyar
- Omar Hamdy
- Omar Minawi
- Omer Levi Hevroni
- Omespino
- Omri Baso
- On The Hunt
- On Web-Security and -Insecurity
- One Eyed Techs
- Open Source DFIR
- Open Source Security
- Open Threat Research Blog
- Opinionated Security
- Orange
- Orion-Hridoy
- Orwa Atyat
- Osama Avvan
- Osama Elnaggar
- OSINT ME
- OSINTCurio.us
- Otter Sec and this
- Overreacted
- ovo tech
- Owen Garrett
- Owlspace
- oxasploits
- oxis
- Ozgur Alp
- P1 BOOM
- p3rr0
- P4nda’s Bug Bounty Blog
- paavohtl’s blog
- Padvish Threats Database | AmnPardaz
- PandaOnAir
- Pankaj Upadhyay
- Paras Arora
- Parth Desani
- Parth Malhotra
- parzelsec
- Pasquale ‘SID’ Fiorillo
- PassTheHashBrowns
- pat_h/to/file
- Patrik Fehrenbach
- Patrik Hudak
- Patterns in the Void
- Paul Jerimy
- paulch blog
- Paulo Choupina
- Paulos Yibelo
- Paulsec
- Pavel Shabarkin
- Pavel Yosifovich
- Pawan Chhabria
- Pawl Rzepa
- PC’s Xcetra Support
- Pedro’s blog
- Peew.pw
- Pentest.blog
- Penetration Testing Lab
- Pentest Laboratories
- Pentester Nepal
- A Pentesters Ramblings
- pepe berba
- Peter Hlavaty
- peter.website
- PeterJson
- Pethuraj’s Blog
- pewpewthespells
- Pflash Punk
- Ph.Hitachi
- phasetw0
- Phenomenal
- Philip Snyder
- Phillipe Harewood
- Phoenix Security
- PHRACK
- Phuriphat Boontanon
- pi0x73
- pi3 blog
- Pinoy White Hat
- Piyush Paliwal
- Piyush Raj and on Medium
- Piyush shukla
- PJBorah
- Plain Security
- Playhouse
- pmnh
- Podalirius
- polarply
- pompompurin
- pookie bear
- pr0fessor
- Prajit Sindhkar
- Prajwol Dhungana
- Prakash
- Prakash Panta
- Pranav Chachara
- Pranav Gajjar
- Pranay Bafna
- Prashant Kumar
- Prasoon Gupta
- Prateek Nischal
- Prateek Sarangi (Balia)
- Prateek Tiwari
- Pratheesh P Narayanan
- pratik yadav
- Pravinrp
- Pratyush Anjan Sarangi
- pre.empt.dev
- Prial Islam
- PRince CHaddha
- Priyank Raval
- Priyansh Bansal
- Progress Blog
- protekkt
- Proviesec
- Psycho’s Corner
- ptx2
- Pumudu Ruhunage
- Purpl3F0x Secur1ty
- Push the Red Button
- Putra Adhari
- pwn.vg
- pwn.win
- PwnDiary
- pwning.systems
- PwnSec
- pwnshift
- Pwntario Team Blog
- pyn3rd
- qtc’s blog
- QTNKSR
- Quang Vo
- Quel
- QWERTY Sec
- r0
- r00thun7
- r0tbra1n
- R29k
- R4id3n
- Raashid Bhat
- Radian ID
- Rafael Silva.
- Rafeeq Rehman
- Raffael Marty
- Rafi Ahamed (Leonidas D. Ace)
- Rafi Andhika Galuh
- Rafli Hax0r
- Raghavendra
- Rahul Kankrale
- Rahul Maini
- Rahul R
- Rahul Varale
- Raidh Here
- Rainbow & Unicorn
- Raj Chandel
- Raj Singh Chauhan
- Raja Sekar Durairaj
- Rakesh Mane
- Rajesh Ranjan
- Rakesh Thodupunoori
- Ralph’s Security Blog
- RANDO
- Random Musings by a Guy Named Mike
- Random Oracle
- Random Stuff about CyberSecurity
- Random stuff by yappare
- Rawsec
- Randy Arios
- Randy Westergren
- Ranjeet Kumar Singh
- Raphael Denipotti
- Rasta Mouse
- Ratnadip Gajbhiye
- Raushan Raj
- Ravilla Bharath
- Rayanfam Blog
- Rayhan0x01’s Blog
- Raymond Lind
- Raz0r.name
- Rbop Pyceb
- RCE Endeavors
- RCE Security
- RE & Sec Blog
- RE-Alize Blog
- The Real Stem Sadie
- Recipe for Root
- Recon Station
- The Recurity Lablog
- Red Team Adventures
- Red Team Blog
- Red Team Tips
- Red Timmy Security
- Red xor Blue
- RedBlue42
- RedBluePurple
- redhead0ntherun
- RedPacket Security
- RedTeam Pentesting GmbH
- Redteams.net
- Redteam.pl
- Red Timmy Security
- Reegun J
- Reginald Laurent
- REhex
- Remy Hax
- Renaud Martinet
- Renegade Security
- Renganathan
- Renwa
- Ret2Pwn
- RET2Systems
- Reverse Engineering
- Reverse Engineering Malware
- REVERSEMODE
- Reversing Engineering for the Soul
- Rewanth Tammana
- ReWolf’s blog
- rez0
- ρ - rh0dev
- Rhynorater
- Rhys Elsmore
- Ricard
- Ricardo Iramar dos Santos
- Riccardo Padovani
- Richard Clifford
- Richard’s Infosec blog
- Righteous IT
- Ring 0 Labs
- Ring 0x00
- Rio Asmara Suryadi
- RiotSecurityTeam
- Rip It Apart - Jason’s electronics blog-thingy
- Rishabh
- Rishu Ranjan
- Risk & Cybersecurity
- Ritesh Gohil
- Ritik Sahni
- Ritish Kumar Singh
- Rizaldi Wahaz
- Rizwan_siddiqui
- Rob Berends
- Robbe Bryssinck
- Robel Campbell
- Robert Chen
- Robert Heaton
- Robert M. Lee
- Robert Willis Hacking
- Robert Xiao
- Robin Verton
- Robin’s Random Rants
- Rodney Beede
- Rodolfo Assis (Brute)
- Rodrigo’s Stuff
- Rody Shahnazarian
- Rohan Chavan
- Rohan Pagey
- Rohit kumar
- Rohit Soni
- Rohit Verma
- Rojan Rijal and on Google Sites
- Rolando Anton
- Romain Thomas
- Roman Riis
- Romesh chander
- Ron Chan
- Ronak Patel
- Ronnie Atuhaire’s Blog
- RootDSE
- Rootkit
- RootSecDev
- ROPCHA.IN
- ropnop
- Rose Security
- Ross Marks
- Rostik Slipetskyy
- Rotem Bar
- Rounak Dhadiwal
- Rounds with the Night Watchman
- The Ruby Zoo
- Rubrique-a-brac
- Rudra Sarkar
- Rupika Luhach
- Rushikesh Gaikwad
- Rutvik
- ruvlol
- RV Sharma
- Ryan Cornateanu
- Ryan Eberhardt
- Ryan Gerstenkorn
- Ryan McGeehan
- Ryan O’Horo
- Ryan Pickren
- Ryan Walker
- RyotaK’s Blog
- S.Venkatesh @pranavvenkats
- s0cket7
- S0lden’s Laboratory
- S1l3ntK1ll3r
- s1r1us
- S3c
- s3cur3th1ssh1t
- Saad Ahmed
- Sadiq West
- Saeed Balquizi
- Sagar V
- Sage Knows IT
- Sahil Mehra
- Sahil Tikoo
- Sam Curry
- Sam Lerner’s Coding Blog
- Sam’s Hacking Wonderland
- sam4k
- Sameer Rao
- Samet SAHIN
- Samiux’s Blog
- Sampanna Chimoriya
- Samuel
- Samuel Klein
- Sander Wind
- Sandh0t
- Sandip Oli
- Saneklarek
- Sank Dahal
- Sankalp Sharma
- Sankalpa Acharya
- sannemaasakkers
- Sanskar Jethi
- Santosh Baral
- Santosh Kumar Sha
- Saransh Srivastav
- Sarathkumar Rajendran
- Sarmad Hassan (Juba Baghdad)
- Sarthak Saini
- Sarvesh Salgaonkar
- Sasi Levi
- Satoshi’s note
- Saugat Pokharel
- Saurabh siddharam sanmane
- Saurik | Jay Freeman
- Sayed Abdelhafiz
- Sayr.us
- SAZA.RE
- ScalarSec
- Scary Beast Security
- Schneier on Security
- Scott Hanselman
- Scottie Austin
- Script Dotsh
- Script Kiddie’s notes
- SCRT Information Security
- sdomi’s webpage
- Sea Security
- Seal9055
- Sean Heelan
- Sebdraven
- SecGeek_one0one
- secjuice
- SecNigma
- secrary
- Secret Club
- Sector035
- SecuNinja
- Secure coding and more
- Secure Coding Handbook
- SecureCloudBlog
- Securehat
- secureITmania
- Secure Honey
- Securifera
- Security-in-bits
- SecurityGOAT
- Security & Privacy Evaluations
- Security Affairs
- Security and Bug Hunting
- Security Artwork
- Security Break
- Security Down
- Security Engineering Manager
- Security for Real People
- Security Jawn
- Security Kiwi
- Security Knowledge Base
- Security Obscurity
- Security Queens
- Security Shenanigans
- The Security Sleuth
- Security Soup
- security.love
- SecurityFlow
- SecurityGOAT
- SecurityXploded
- Seguranca Informatica
- Sen Security
- SeniorDBA
- Sergey Kashatov
- SerHack
- Seriously Risky Business
- servicenger
- Shahmeer Amir
- Shahrukh Iqbal Mirza
- Shahzada AL Shahriar Khan
- Shaifullah Shaon
- Shail Patel
- shakti mohanty
- Shankar R
- Shanty Blog
- Sharan Panegav
- Shashank’s Security Blog
- Shaurya Sharma
- Shawar Khan
- shay grant
- Sheeraz Ali
- Shell is only the Beginning
- shell&co
- Shellbr3ak
- Shells.Systems
- shellsharks
- Shenanigans Labs
- shesha sai_c
- Shibin B Shaji
- Shishir’s Blog
- Shivam Kamboj Dattana
- shivam Pandey
- Shivam Rai
- Shivangx01b
- Shivbihari Pandey
- Shomil Jain
- Shrirang Diwakar
- shub rathore
- Shubham Bhamare
- Shubham Chaskar
- Shubham Gupta
- Shubham Shah
- Shubhayu Majumdar
- Sicksec
- Signal Chaos
- Signs of Triviality
- Silent Signal
- Silent Bronco
- Silicon Exposed
- sillyonions
- Simon Josefsson’s blog
- Simon Willison’s Blog
- simondotsh’s infosec stuff
- Simple Risk Measurement
- Simply Secure
- Singh M.
- Sinkingpoint
- Sinsinology
- SirLeeroyJenkins
- Siva Krishna Samireddi
- Sivanesh Ashok
- Sjoerd Langkemper
- SkelSec
- Sketchymoose
- Ski Mask
- SkullSecurity
- Sky Blueteam
- sky’s blog
- SlashCrypto
- Sm4rty
- smacker dodi
- Smaran Chand
- SmeegeSec
- Smile Hacker
- Smith3dx
- Smoking on a Bike
- Sndp Giri
- Sneaky Monkey
- SNORLAX Cybersecurity
- snowcrash
- Snowscan
- SocioSploit
- socket
- sockpuppets
- SolomonSklash.io
- Somdev Sangwan & on Medium
- Sorcery Blog
- Soroush Dalili
- Soufiane Habti
- Sourav Newatia
- Sourav Sahana
- Source Incite
- spaceraccoon.dev
- splinter_code
- spookysec
- spotrlabs
- sprocketfox
- sqall’s blog
- Staaldraad
- StackCrash
- STALKR’S BLOG
- StamOne_
- StarkeBlog
- STEALIEN
- Stealing the Network
- StealthBay
- Stealthcopter
- Stealthy
- Stefan Grimminck
- Steflan
- StepSecurity
- Steve Micallef
- Steve on Security
- Steve Springett
- StillzTech
- stmxcsr
- Store Halfword Byte-Reverse Indexed
- Stratum Security
- stribika
- stux
- stypr
- SUAM
- Sublime Security
- Suchi Pahi
- Sudhanshu Rajbhar
- Sudip Shah
- Sudo
- sudoutopia
- Sukhmeet Singh
- Sumit Jain
- SuneetSingh
- Sunil Yedla
- Sunny Gupta
- Supras.io
- Suraj Disoja
- susan wagle
- Sushant Kamble
- Sushant Soni
- sushiwushi
- Sushmitha Katikitala
- sutcliffe.it
- svch0st
- Sven Peter
- svennergr
- sw33tLie
- swagitda
- Swapmaurya
- Syahri Ramadan
- Syd Ricafort
- Sylvain Kerkour
- Symbol
- Syntax Error
- Syahrul Akbar R
- Syed Abuthahir
- Sysrant
- SySS Tech Blog
- System Failure
- System Overlord
- System Weakness
- Szilárd Pfeiffer
- T VAMSHI
- Ta Ethika
- Taha Bıyıklı
- TakeMyHand-Security Blog
- Takester
- Tal Maor
- Talatmehmood
- Taniya Agarwal
- Tanner
- Tao Bojlen
- TaoSecurity
- Tarek Bouali
- Tarek Galleze
- Tarek Mohamed
- Tareq Alkhatib
- Tarikul Islam
- TASZK
- Tavis Ormandy and lock
- tbhaxor
- Team Hydra
- Team Rot
- Team-53 InfoSec Blog
- Tech @ Cliqz
- Tech Solvency
- TechAnarchy
- TechKranti
- Techno Enthusiast’s Blog
- Techorganic
- Teddy Katz
- Terence Eden’s Blog
- terminal23.net
- The Test Therapist
- th3.d1p4k
- Th3G3nt3lman
- Th3Y0ungM0nk
- Thai Vu
- Thalium
- The Binary Hick
- The Cave
- The Desolation of Blog
- The Hacker Blog
- The Security Experts
- The Security Noob.
- The T2 Development Blog
- The Zero Hack
- the-deniss
- the_unluck_guy
- TheAverageGenZ
- THEEVILBIT
- thefluffy007
- thehackerish and on Medium
- TheInfoSecPhoenix
- Thejus Krishnan
- TheSecurityEngineer’s Blog
- Thexssrat
- Thick Mints
- Think Love Share
- ThinkDFIR
- Thinking Thoughts
- This Week In 4N6
- Thomas Stringer
- thomfre.dev
- Thoughts for this World
- Threat Blog
- Threat Hunter Girl
- threedr3am
- Thuvarakan Nakarajah
- TIL as a Support Engineer
- Tillison Galloway
- Tilting at windmills
- Tim Blazytko
- Tim MalcomVetter
- Tim Neilen
- Tim Schulz
- Tinyhack.com
- tint0
- TISIPHONE.NET
- tl;dr sec
- TM.The Mayor
- TMO
- TMP.OUT
- TMZ Lair - Underground Coding
- TnMch
- Tobias Klein
- Tobydavenn
- todaro
- tolo7010’s note
- Tom Anthony
- Tom Liston
- Tom’s corner of the internet
- Tomi
- Tommysuriel
- TomNomNom
- Tomorrowisnew
- Torben Capiau
- Total Recall
- tox7cv3nom
- The Toy Box
- tpetersonkth
- Trail of Bits
- Trevor saudi
- Tribal Chicken
- tricker0’s Nest
- Trickster Dev
- Tristan Farkas
- Troy Hunt
- TrueSec
- TrustedSec
- Tuhin Bose
- Tung Pun
- Tushar Sharma
- Tutorgeeks
- Tutorial Boy
- tyage
- Tyler Butler
- Tyranid’s Lair
- uf0 | Matteo Malvica
- Ugroon
- Ultimate Security Professional Blog
- ultranoob
- UPDATE
- Und3rf10w
- UndedInside
- undev.ninja
- undevs
- unix ninja
- Uranium238s
- Usama Varikkottil
- Utkarsh Agrawal & Medium
- Utku Şen & Medium
- V3D
- V3dedBlog
- V7nc3nz
- Vaibhav Joshi
- Vaibhav Kumar Srivastava
- Valbrux
- Valeriy Shevchenko
- Valtteri Lehtinen
- vanimpe
- Vanshal Gaur
- vartul goyal
- Vasuyadav
- The Vault
- VB Scrub
- Vedant Tekale
- vegvisir
- Velociraptor IR
- Verneet
- vesiluoma.com
- vext.info
- vFlexo
- Vibhurushi Chotaliya
- Vicente Aceituno Canal
- vict0ni
- VIDOC Security lab
- Vijaysimha Reddy Bathini
- Vikaran
- Vikas Singh
- Vikash Maurya
- vikram naidu
- Vincent Van Mieghem
- Vincent Yiu
- VinCSS Blog
- Vinoth Kumar
- Vinsloev
- VipItHunter
- viral bhatt
- Virdoexhunter
- Viren Pawar
- Virtue Security
- Virus0x01
- Vishal Bharad
- Vishal Ranjan
- Vishal Saini
- vishnuraj
- VISHNURAJR
- Vishwaraj Bhattrai
- Vitor “r0t” Oliveira
- VIVI
- Vlad Iliescu
- Vladimir Metnew
- Voidsec
- VollRagm
- The Volatile Triad
- Vulkey_Chen
- Vulmon Blog
- Vulnano
- vulnerable.af
- w00troot
- Wade Hickey
- Wafa Abbas
- Waffle Ironer
- wald0
- Walid Hossain
- wanago.io
- war + code
- War Room
- Watchful_IP
- We Hack People
- Web Security Blog | Thomas Orlita
- Web Security Geeks
- WebBreacher
- WebGap
- (Web-)Insecurity Blog
- WebSec
- Weister Creek Information Security
- Wen Bin KONG
- WerWolv
- Wes Lambert
- What2Log
- Where DFIR Meets IT
- WHEREISK0SHL
- Whiskey Tango Foxtrot
- WhiteHat Hacker Haji
- WhiteHoodHacker
- WhyNotSecurity
- Wilbur Security
- the wild web
- Wildfire Labs
- Will Butler
- Will’s Root
- Willem’s Blog
- Willi Ballenthin
- William Knowles
- Windows Deep Internals
- Windows Incident Response
- Witcoat Security Blog
- with knowledge comes power
- Wojciech Reguta
- wondersmith_rae
- Worth Doing Badly
- WP deeply
- Wrongbaud
- WTFBINS
- wumb0.in(g)
- WYA.PL
- x86matthew
- xaonan44
- Xarkes
- Xchopath
- XDEV05 BLOG
- xenacod
- xhzeem
- XJunior
- xkln.net
- xmsec
- xohan30
- XORHEX
- xorl %eax, %eax
- xors
- XPN
- XSS Jigsaw
- xvnpw
- Yaj Desu
- Yan1x0s
- yar-eb
- Yaseng
- Yash Kandekar
- Yash Swarup
- Yash__HackZ
- Yasser Gersy
- Yasser Mohammed
- Yassine Aboukir
- Yassir
- Yeasir Arafat
- Yepoleb’s blog
- Yeraisci
- yeuchimse
- YGN Ethical Hacker Group Blog
- Yogendra Jaiswal (Vulnholic)
- Yogesh Tantak
- YoKo Kho
- yoshi m lutfi
- Youghourta Ghannei
- your program sucks
- Youssef Lahouifi
- Youssef Sammouda
- Youstin
- Yumi
- Yusif Ceferov
- Yusuf
- Z-r0crypt
- Z3R0th
- Zahid Ali
- Zahir Tariq
- Zain Sabahat
- zapb.de
- Zawadi Done
- Zellic Blog
- Zemnmez
- Zena Forensics
- Zerb0a
- Zero Day - by Kim Zetter
- zero_s4n
- ZeroSec
- zerosum0x0
- Zer0tru5t
- Zeta Two
- zhchbin
- Zhenwar Hawlery
- zhuanlan
- Ziggy’s of the World
- ZishanAdThandar
- #!/zitstif.no-ip.org/
- zoid
- Zon8 Research
- Zonduhackerone
- zseano
- Zsolt Imre
- Zub3r
- zznop labs
- zzzteph
Commercial Blogs
- 0ffset
- 0xide
- 360 Total Security
- 7Elements
- A-LIGN
- Abnormal Security
- AboutDFIR
- Abuse|ch
- Accenture Cyber defense blog
- Acronis
- Active Countermeasures
- ActiveCyber
- Acunetix
- Ada Logics
- ADV Intel
- Airbus Security Lab
- Akamai
- AL
- Aleph Research
- Alesandro Ortiz
- Altered Security
- Ambionics Security
- Analyst1
- The Antisocial Engineer
- Anvil Secure
- Aon
- apiiro
- APLens
- appgate
- AppOmni
- Appsecco
- Aqua
- arachni
- Arctic Wolf
- Arkose Labs
- Armis
- Armo
- arnica
- Arsenal Recon
- AssetNote
- Assurance Maladie Security Team
- astra
- AT&T Cybersecurity
- Atredis
- Autopsy Digital Forensics
- Avanan
- Avanish Pathak
- avatao
- Awake Security
- AweSec
- Backchannel Blog
- Bad Sector Labs
- Balasys
- Bastion Zero
- BCSecurity
- bearer
- BeVigil
- BFSLABS
- BHConsulting
- Binarly
- BinaryNinja
- BitCrack
- BitSentinel
- Black Hills Information Security
- Black Lantern Security (BLSOPS)
- BlackArrow
- BlackBerry ThreatVector Blog
- BlackStorm Security
- BlockMagnates
- BlockSecTeam
- Bloodhound Enterprise
- Blueliv
- Blumira
- Brain Frame
- Brandefense
- BREAKPOINT
- bridgecrew
- Britive
- BUFFERZONE
- Bugcrowd
- Cado
- Cambridge Quantum
- caniphish
- CATONetworks
- Cellebrite
- censorship.ai
- Census
- Center for Internet Security
- Cerbero Blog
- Cerbos
- certego
- Certik
- Certitude
- Chainguard, Inc.
- Chaser Systems
- Check Point
- Check Point Research
- Chef Secure
- Cisco Umbrella
- The Citizen Lab
- claranet
- Claroty
- Cleafy
- ClearOPS
- ClearSky Cyber Security
- Cloudflare
- CloudSEK
- Coalfire
- Cobalt Strike
- Cobalt.io
- Code Grazer
- Codingo
- CoGuard
- Compass Security Blog
- Computest
- Confiant
- Context Accenture
- Contrast Security
- Conveyor
- CoreSecurity
- Cossack Labs
- Counter Craft
- CQURE Academy
- Criminal IP
- Crossroads Information Security & www
- CrowdSec
- CSDN
- CSIS Techblog
- CSIT tech blog
- CSNP
- CujoAI
- CrowdStrike
- Cyber Castle
- Cyber Guy
- Cyber Sophia
- Cyber Threat Alliance
- Cyber Triage
- Cyberark
- Cyberark Conjur
- CyberBit
- Cybereason
- CyberHunter
- Cyberint
- CYBERMATERIAL
- Cybervore
- CyberXplore
- Cyble
- CyCraft
- Cyllective
- Cymetrics Tech Blog
- Cymptom
- Cymtrick
- Cymulate
- Cypherowl
- CYS4
- CYSOURCE
- CyStack
- Cyware
- cz.nic
- DarkOwl Blog
- DarunGrim
- DCSO CyTec Blog
- Decoded Avast.io
- deepfence
- DeepInstinct
- Defense.com
- Depth Security
- Derant
- Deteact
- Detectify
- DevCore
- DFIR MADNESS
- DFRLab
- Digital Detective
- Dolos Group
- Domain Guard
- Dr.WEB Anti-virus
- Dragos
- Drata
- DreamLab Technologies
- DSEC Bypass
- Duasynt
- Duo
- EasyDMARC
- Eaton Works
- EchoTrail
- Eclypsium
- eForensics Magazine
- ElcomSoft
- elttam
- EMSISOFT
- Entersoft Security
- ermetic
- escape
- eShard
- Ethereum Foundation
- Exodus Intelligence
- Expel.io
- F-Secure Labs
- F5 Labs
- Facebook Engineering
- Faraday
- Fidus Information Security
- FingerprintJS
- FireEye
- FireHydrant
- fishtech group
- Flatt Security
- fleet
- Forcepoint
- Forescout
- Foretrace
- Foreseeti
- Fortalice
- Fortbridge
- FortiGuard Labs
- Fortinet
- FortyNorth Security
- FourCore
- frontegg
- FRSECURE
- FullHunt
- Fuzzbuzz
- Fuzzing Labs
- Garantir Blog
- GData
- Gigamon
- Gigasheet
- GitGuardian
- The Github Blog | Security + Security Lab
- GitProtect
- Google Security Blog
- Google Threat Analysis Group (TAG)
- Google VRP Writeups
- GoSecure
- Gremwell
- gretel
- Grey Hat Developer
- Grimm
- GRNET CERT
- grsecurity
- Guardicore
- Guardio
- Guardsquare
- Guidepoint Security
- Hackcura
- Hacken
- HackerCool
- hackerone
- Hackers-Arise
- HACKLIDO
- HackTheBox
- Hakin9
- Halborn
- Hamzadzworm
- Hardened Vault
- Hatching
- HAWK.io
- Herjavec Group
- Hex-Rays
- Hive Systems
- hn security
- HORIZON3.ai
- howdays
- Hoxhunt
- The Honeynet Project
- HP Wolf Security
- Humanize Security
- Huntress
- IANS
- IFCR | Institut For Cyber Risk
- Immersive Labs
- Immunefi
- Immunity Inc. Blog
- Immunity Services
- Imperva
- Improsec
- Include Security
- INCOG.HOST
- IncognitaTech
- InQuest
- Insomnia
- IntelTechniques
- The Internet Obsrvatory
- Intezer
- Intigriti and on Medium
- intruder
- Invictus Incident Response
- IOActive
- iosiro
- IoT Inspector
- IPM Corporation
- ironPeak
- Isovalent
- JBCsec
- JEB in Action
- JMP ESP
- Jumpsec
- Juniper
- Kali
- Kaspersky Daily
- KERBIT
- Kloudle
- KomodoSec
- KoreLogic Security
- Kroll
- Kryptos Logic
- Kudelski Security Research
- Lab52
- Lacework
- Lares
- LetsDefend Blue Team Blog
- Leviathan Security Group
- LEXFO
- LIFARS
- Lightspin
- LMNTRIX
- Longterm Security
- LunaSec
- Lupovis
- Luta Security
- Lyrebirds
- macrosec
- Maltego
- Malwarebytes Labs
- Malwology
- MANRS
- Margin Research
- Master SEC
- Mattermost
- matrix
- Maveris Labs
- McAfee
- MDSec
- mediaservice.net
- Medigate
- MetaCTF blog
- Microsoft Security
- Mimecast
- Minded Security
- Minerva
- Mitiga
- MITRE ATT&CK
- MixMode
- Mobius Strip Reverse Engineering
- Mogwai Labs
- Morphisec
- moz://a Hacks
- Mozilla
- MRG Effitas
- MSTIC and this
- MultiLogin
- N45HT
- National Cyber Security Centre
- nccgroup
- NETBYTESEC
- The Netflix Tech Blog
- Netlab
- NETRESEC
- NetSec Focus
- Netsparker
- NETSPI
- Nettitude Labs
- Network Intelligence
- Nextron Systems
- Nightfall
- NinjaLab
- NowSecure
- Nozomi Networks
- NSFOCUS
- Numen Cyber Labs
- Nzyme
- Objective-See
- OccamSec
- Octagon Networks
- OFFENSI
- Offensive Security
- Onapsis
- Open Raven
- Opera
- OPSECX
- Optiv
- Orange Cyberdefense
- orca security
- OSINT Jobs
- The OSINTion Tidbit
- Oso
- OSR
- Outflank
- Oversecured
- Overt Operator
- Palisade
- Palo Alto
- Pangu Lab
- panther
- Paradigm
- Payatu
- PeckShield
- PentaGrid
- pentest information security assurance | Shearwater Group
- PenTest Magazine
- PenTestPartners
- penthertz
- Perception Point
- Perfecto
- perimeterx
- Perspective Risk
- phishdeck
- PhishLabs
- Phylum
- PixiePoint Security
- PIXM
- PlexTrac
- Pomerium
- Porchetta Industries
- PortSwigger
- Positive Security
- Praetorian
- Prevailion
- Probely
- Prodaft
- ProferoSec
- Project Zero
- Proofpoint
- Prossimo
- PT SWARM
- Pulse Security
- PwnDefend
- Qrator Labs
- Qualys
- Quarkslab
- r2c
- raelize
- Raesene’s Ramblings
- Randori
- RandoriSec
- Rapid7 & AttackerKB
- raxis
- readibots
- Realmode Labs
- Recon Infosec
- Red Canary
- RedCode
- RedForce
- RedHunt Labs
- RedSiege
- Relyze
- rev.ng
- ReversingLabs
- Rezilion
- Rhino Security Labs
- Ricterz and this
- RiskIQ
- River Security
- RSA
- Rumble.run
- S2
- S2W
- SAFE
- Safeguard Cyber
- SafetyDetectives
- Sandfly Security
- SANS
- SANS Internet Storm Center
- Sansec
- Sayfer
- SCIP
- scope
- Scorpiones
- scribe
- ScriptJunkie
- Scythe
- sdmsoftware
- Secfault Security
- seclarityIO
- Secret Double Octopus
- Sector7
- SecTrio
- Secura
- SecureAuth
- SecureCoding
- SecureLayer7
- Secureworks
- Securify
- Securify (inc)
- securit.ie
- securitum
- Security for Everyone
- Security Onion
- Security Sting
- Security Wall
- Securitypage.fyi
- SecurityScorecard
- SecurityTrails
- SecurityTrooper
- Securonix Tech Blog
- Securosis
- SEED Labs
- Seekurity
- Sekoia.io
- Sekurenet
- Semgrep
- Semperis
- SensorFu
- SentinelOne
- Sevagas
- SEVN-X
- ShadowServer
- SharkStriker
- Shielder
- ShiftLeft
- Shisho Cloud
- Sick.Codes
- Sidechannel
- Signal
- Signal Labs
- Skylight Cyber
- Slayer Labs
- Snapsec
- SOCPRIME
- Somerset Recon
- Sonarsource
- Sonatype
- SORS
- SpecterOps
- Spectral
- Spiderfoot
- SpiderLabs
- Splunk
- ssd-disclosure
- sshell
- Stairwell
- Star Labs
- stolabs
- StrangeBee
- Stratosphere Lab
- Summit Route
- Sweepatic
- Swing’Blog
- SwordBytes
- Symantec Enterprise Blogs
- Synack
- SYNACKTIV
- SYNDIS
- Synopsys
- Syntax Bearror
- Sysdig
- SYSDREAM
- Talos
- Target tech blog
- TCM Security
- Team Cymru
- TechFenix
- Teleport
- Tenable
- Tenable Techblog
- Tencent Security
- Tensecure Systems
- TestifySec
- Tetrane
- Theori
- Thinkst
- ThreatConnect
- ThreatNix
- ThreatRay
- ThreatSTOP
- totum
- Trellix
- Trenchant
- TRENDMicro
- Trimarc
- Tripwire
- TrueSec
- Truffle Security
- Trunc
- Trusted Security Services
- Trustlook
- Trustwave
- Twosense
- UpGuard
- Uptycs
- Unicorn Security
- Varonis
- Vault Infosec
- VDA Labs
- Versprite
- VetSec
- Viettel Security
- Vinsloev Academy
- VirusTotal
- VMRay
- VoidStar
- Volatility Labs
- Volexity
- vpnMentor
- vSecureLabs
- Vulners Blog
- Walmart Global Tech - Infosec
- webscout.io
- webz.io
- welivesecurity by eset
- WeSecureApp
- White Oak Security
- WhiteSource
- Wildfire Labs
- Winsider
- WisdomFreak
- Wiz
- Wordfence
- X41 D-Sec
- XM CYBER
- Yarix
- Yes We Hack
- Ynoof Alassiri
- Yongheng Chen (Ne0)
- yubico
- The Zap Blog
- ZDResearch
- ZecOps
- Zeek
- Zero Day Initiative
- Zimperium’s Mobile Security Blog
- Zolder
- ZX Security
Writeup Blogs
- Bug Bounty Hunting
- Bug Bounty Writeups
- Bug Hunters Reports | Google
- Chr0x6eOs
- CTF Write-ups
- devcraft.io
- hxp
- Just Another Simple Write-Up
- Khaotic
- Mohamed Chamli
- Open Bug Bounty Blog
- Pentester Land
- Pwnistry
- Security Breached Blog
Aggro Sites
- !infosec daily
- 4sysops
- ADMIN Network & Security
- Bank Info Security
- blackmoreops
- BleepingComputer
- Blue Team News
- Bug Bounty POC
- The CISO Den
- Code X
- Ctrl.blog
- Curated Intelligence
- Cyber Security Group | GOVTECH Singapore
- Cyber Security News
- cybernews
- CyberScoop
- Cybersecurity Insiders
- CyberSecurity Log
- Cybersecurity Science
- CyberTalk
- CyberTalks
- CyberThreat Intelligence
- CYBERVERSE
- CySec-Hub
- Dark Roast Security
- The Dark Source
- DARKReading
- Data Breach Today
- DeepSec
- Defense Lead
- Forensic Focus
- GBHackers on Security
- Gov Info Security
- Graham Cluley
- The Hacker News
- Hackernoon
- HackersOnlineClub
- Hacking/Security
- HackRead
- HELPNETSECURITY
- Human Layer Security
- infoRisk Today
- Infosec Write-Ups
- infosecstreams
- Insights2Techinfo
- Irongeek
- iustin24
- Jitsumi Blog
- KrebsonSecurity
- LinuxSecurity
- Malware.news
- MSMVPs
- Naked Security
- NetSec.news
- nudesystems
- The Olivers Post
- README_Infosec
- RealInfosec.net
- Reconshell
- REhacks
- secjuice
- Secpigeon
- Security Affairs
- Security Boulevard
- Security Café
- Security Intelligence
- Security Threat News
- Security Weekly
- securityonline.info
- Seebug
- skopenow
- SOC Investigation
- Space | Your Cybersecurity Space
- Strategy of Security
- SUD0ROOT
- sudo security
- Techiepedia
- Telsy
- THEXPLOIT
- threatpost
- The Cyber Security Times
- The Unofficial HackerOne Disclosure Timeline
- Vocal.media | Cybersecurity
- Vulnerability Magazine
- webs3c
- Wortell
- zapstiko