Created
May 31, 2020 17:27
-
-
Save ezzeldinadel/676f99d0106cfa16ed4b119213b68c38 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Internet health: | |
ISC: http://www.isc.org | |
NetCraft: http://news.netcraft.com/ | |
US-CERT: http://www.US-Cert.gov | |
General technology and security trends: | |
Schneier on Security Blog: http://www.schneier.com/ | |
Krebs on Security: http://krebsonsecurity.com/ | |
Security Dark Reading: http://www.darkreading.com/ | |
Slashdot: http://slashdot.org | |
Engadget: http://www.engadget.net | |
Securosis: https://securosis.com/blogThreat intelligence: | |
Microsoft Security Intelligence Report: http://www.microsoft.com/security/sir/default.aspx | |
Team Cymru (also has subscription service): www.team-cymru.org | |
FBI Cybercrime information: http://www.fbi.gov/about-us/investigate/cyber/cyberMalware and threats: | |
Threat Expert: http://threatexpert.com | |
Microsoft Malware Protection Center: http://www.microsoft.com/security/portal/default.aspx | |
SANS Internet Storm Center: http://Isc.sans.edu | |
Symantec Threat Explorer: http://www.symantec.com/norton/security_response/threatexplorer/index.jsp | |
Symantec Internet Threat Report: http://www.symantec.com/business/theme.jsp?themeid=threatreport | |
McAfee Threat Center: http://www.mcafee.com/us/threat_center/ | |
Metasploit Blog: https://community.rapid7.com/community/metasploit?view=blog | |
Security Focus: http://www.securityfocus.com/ | |
Dshield: http://www.dshield.org/ | |
Offensive Security’s Exploit Database: http://www.exploit-db.com/ | |
Worldwide Observatory of Malicious Behaviors and Attack Threats (WOMBAT): http://wombat-project.eu/ | |
Symantec’s Worldwide Intelligence Network Environment (WINE): http://www.symantec.com/about/profile/universityresearch/sharing.jsp | |
Mandiant M-Trends: https://www.mandiant.com/resources/mandiant-reports/Bad domains, IP addresses, and other indicators: | |
Malware Domain Blocklist: http://www.malwaredomains.com/ | |
Malware Domain List: http://www.malwaredomainlist.com/ | |
Unspam Technologies Project Honeypot: http://www.projecthoneypot.org/index.php | |
EXPOSURE (Exposing Malicious Domains): http://exposure.iseclab.org/ | |
Shadowserver Foundation: http://www.shadowserver.org/wiki/ | |
Automatic threat analyzers: | |
Anubis (Analyzing Unknown Binaries): http://anubis.iseclab.org/ | |
Virustotal: http://www.virustotal.com/ | |
Metascan online: http://www.metascan-online.com/Threats with signatures: | |
IBM ISS X-Force: http://xforce.iss.net | |
BotHunter Internet Distribution Page: http://www.bothunter.net/ | |
Latest Snort publicly available Snort rules (most recent rules require subscription): http://www.snort.org/snort-rules/ | |
Emerging Threats signature list: http://www.emergingthreats.net/ | |
Latest Tenable Nessus plugins (requires subscription): http://www.nessus.org/plugins/ | |
Patches and vulnerabilities: | |
MITRE’s CVE: http://cve.mitre.org | |
NIST’s National Vulnerability Database: http://nvd.nist.gov/ | |
US-CERT Technical Cyber Security Alerts: http://www.us-cert.gov/cas/techalerts | |
Microsoft Security TechCenter: http://technet.microsoft.com/en-us/security/default.aspx | |
Whatever other vendor software is commonly used within the constituency. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment