Information Security Links as of January 2024 This document is a continual work in progress. Suggestions are appreciated. Contact john.saunders@georgetown.edu  
Tab Contents, link to tab Description
1 Cybersecurity Technical Research Groups Major Private Sector, University, &  Government Cyber Threat Research Groups, Quarterly Reports, Academic Journals
2 Threat Groups & Threat Intelligence Groups with Intent focused on Cyberwar, Financial gain, Espionage or Social Engineering
3 Vulnerabilities & Assessment Top 25, Links to Commmon Vulnerabilities & Exposures, 
4 Cybersecurity Controls Categories of Controls:NIST,RMF,CIS,MITRE; Matching Threats& Vulnerabilities to Controls; Links to Commercial Products
5 Tools & Major Protocols in Cyber Intelligence Basic & Advanced Cyber Intel Tools and associated methodology & protocols for use
6 Attack Analyses & Pen Testing Major Attack Analyses, Malware Groupings, Exploit Packages; Indicators of Compromise (IOCs), TTPs
6a MITRE ATT&CK Framework for Cyber Attack Analysis & Synthesis  
7 Cyber Threat Intelligence Products & Services Companies Specializing in CTI
8 Cybersecurity Writers, Forums & Publications Major Cybersecurity Publications & People; 158 LinkedIn Discussion Groups on Cyber 60 0
9 Major Cybersecurity Conferences Mainstream, Hacker, Research
10 Microsoft - Digging Deeper Microsoft Console Tools, Server Apps & Active Directory 
11 Organizations: Policy, Science, Education & Certification NIST, ACM, IEEE, ISO/IEC; SANS, ISC2, ISACA, CSIS
12 NIST Documents - 800 & 1800 Series National Institute of Science & Technology, U.S. Department of Commerce
13 Federal Government Cyber Intelligence Community Organizations; Publically known Databases
14 Categorized Cybersecurity Videos Videos from DEFCON, Blackhat, the VICE Series and other major productions
15 Cyber Legislation Federal & State Law in Cyber; Key Case Decisions
16 Acronyms in Cyber Security &Threat Intelligence  
17 Acronyms Specific to U.S. Federal Government  
     
© 2024 John H. Saunders
for best viewing this tab should be set at a size of 100%
Write-Host "Top 100 Cyber Blogs Search"
Write-Host "Your results will come out in three tabs in your browser"
#Start pwsh.exe -ExecutionPolicy Bypass
$Query = Read-Host "Please enter your query"
[String]$SearchFor = $Query
$Search = "http://www.google.com/search?q=$SearchFor site:https://www.alienvault.com/blogs/labs-research | site:https://blog.barracuda.com/ | site:https://labs.bitdefender.com | site:https://www.carbonblack.com/blog/ | site:https://www.cisecurity.org/resources/?type=white-papers | site:https://research.checkpoint.com/category/threat-research-2/ | site:https://us-cert.cisa.gov/ncas/analysis-reports | site:https://chronicle.security/ | site:https://blogs.cisco.com/author/talos | site:https://www.crowdstrike.com/blog/category/threat-intel-research/ | site:https://www.cybereason.com/blog | site:https://www.cylance.com/en_us/resources/resource-center.html | site:https://www.darktrace.com/en/blog/ | site:https://digitalguardian.com/ | site:https://dragos.com/blog/ | site:https://www.eset.com/blog/listing/ | site:https://community.f-secure.com/ | site:https://www.fireeye.com/blog/threat-research.html | site:https://blogs.forcepoint.com/security-labs | site:https://www.fortinet.com/fortiguard/threat-intelligence/threat-research.html | site:https://safenet.gemalto.com/data-protection/enterprise-data-security-research-trends/"
Start $Search
$Search = "http://www.google.com/search?q=$SearchFor site:https://googleprojectzero.blogspot.com | site:https://securityintelligence.com/category/x-force/ | site:https://www.imperva.com | site:https://ioactive.com/ | site:https://securelist.com/ | site:https://logrhythm.com/resources/whitepapers-and-ebooks/ | site:https://blog.malwarebytes.com/ | site:https://securingtomorrow.mcafee.com/category/mcafee-labs/ | site:https://www.microsoft.com/en-us/wdsi/threats | site:https://car.mitre.org/ | site:https://nsogroup.com | site:https://unit42.paloaltonetworks.com/ | site:https://portswigger.net/daily-swig | site:https://blog.qualys.com/ | site:https://blog.rapid7.com/ | site:https://www.root9b.com/newsroom#blog | site:https://www.rsa.com/en-us/blog | site:https://www.sans.org/reading-room/whitepapers/threatintelligence/ | site:https://www.secureworks.com/blog | site:https://securityintelligence.com/ | site:https://www.silobreaker.com/threat-reports/ | site:https://socprime.com/blog/ | site:https://blog.sonicwall.com/category/advanced-threats/ | site:https://www.sophos.com/en-us/threat-center/technical-papers.aspx | site:https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/ | site:https://www.splunk.com/en_us/cyber-security.html | site:https://www.symantec.com/blogs/threat-intelligence | site:https://blog.talosintelligence.com/ | site:https://www.tenable.com/blog/all | site:https://www.threatminer.org/ | site:https://threatpost.com/"
Start $Search
$Search = "http://www.google.com/search?q=$SearchFor site:https://blog.trendmicro.com/trendlabs-security-intelligence/ | site:https://www.tripwire.com/state-of-security/topics/featured/ | site:https://www.virustotal.com/#/home/upload | site:https://www.webroot.com/blog/ | site:https://www.kela.com/blog/ | site:https://security.googleblog.com/ | site:https://www.proofpoint.com/us/blog/ | site:https://redcanary.com/blog/"
Start $Search