Information
Security Links as of January 2024 |
This document is a continual
work in progress. Suggestions are appreciated. Contact john.saunders@georgetown.edu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Tab |
Contents, link to tab |
Description |
|
1 |
Cybersecurity Technical
Research Groups |
Major Private Sector, University, &
Government Cyber Threat Research Groups, Quarterly Reports, Academic
Journals |
|
2 |
Threat Groups & Threat
Intelligence |
Groups with Intent focused on Cyberwar, Financial gain, Espionage or
Social Engineering |
|
3 |
Vulnerabilities &
Assessment |
Top 25, Links to Commmon Vulnerabilities & Exposures, |
|
4 |
Cybersecurity Controls |
Categories of Controls:NIST,RMF,CIS,MITRE; Matching Threats&
Vulnerabilities to Controls; Links to Commercial Products |
|
5 |
Tools & Major Protocols in
Cyber Intelligence |
Basic & Advanced Cyber Intel Tools and associated methodology &
protocols for use |
|
6 |
Attack Analyses & Pen
Testing |
Major Attack
Analyses, Malware Groupings, Exploit Packages; Indicators of Compromise
(IOCs), TTPs |
|
6a |
MITRE ATT&CK |
Framework for Cyber Attack Analysis
& Synthesis |
|
|
7 |
Cyber Threat Intelligence
Products & Services |
Companies Specializing in CTI |
|
8 |
Cybersecurity Writers, Forums
& Publications |
Major Cybersecurity Publications & People; 158 LinkedIn Discussion
Groups on Cyber |
|
60 |
0 |
|
9 |
Major
Cybersecurity Conferences |
Mainstream, Hacker, Research |
|
10 |
Microsoft - Digging Deeper |
Microsoft Console Tools, Server Apps & Active Directory |
|
|
11 |
Organizations: Policy,
Science, Education & Certification |
NIST, ACM,
IEEE, ISO/IEC; SANS, ISC2, ISACA, CSIS |
|
12 |
NIST Documents - 800 &
1800 Series |
National Institute of Science & Technology, U.S. Department of
Commerce |
|
|
13 |
Federal Government Cyber
Intelligence Community |
Organizations; Publically known Databases |
|
|
14 |
Categorized
Cybersecurity Videos |
Videos from DEFCON, Blackhat, the VICE Series and other major
productions |
|
15 |
Cyber Legislation |
Federal & State Law in Cyber; Key Case Decisions |
|
16 |
Acronyms in Cyber Security
&Threat Intelligence |
|
|
17 |
Acronyms Specific to U.S.
Federal Government |
|
|
|
|
|
|
|
|
©
2024 John H. Saunders |
|
|
|
|
|
|
|
for best viewing this tab should be set at a size of 100% |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Write-Host "Top 100 Cyber Blogs Search" |
|
|
|
Write-Host "Your results will come out in three tabs in your
browser" |
|
|
|
#Start pwsh.exe -ExecutionPolicy Bypass |
|
|
|
$Query = Read-Host "Please enter your query" |
|
|
|
[String]$SearchFor = $Query |
|
|
|
$Search =
"http://www.google.com/search?q=$SearchFor
site:https://www.alienvault.com/blogs/labs-research |
site:https://blog.barracuda.com/ | site:https://labs.bitdefender.com |
site:https://www.carbonblack.com/blog/ | site:https://www.cisecurity.org/resources/?type=white-papers
| site:https://research.checkpoint.com/category/threat-research-2/ |
site:https://us-cert.cisa.gov/ncas/analysis-reports |
site:https://chronicle.security/ | site:https://blogs.cisco.com/author/talos
| site:https://www.crowdstrike.com/blog/category/threat-intel-research/ |
site:https://www.cybereason.com/blog |
site:https://www.cylance.com/en_us/resources/resource-center.html |
site:https://www.darktrace.com/en/blog/ | site:https://digitalguardian.com/ |
site:https://dragos.com/blog/ | site:https://www.eset.com/blog/listing/ |
site:https://community.f-secure.com/ |
site:https://www.fireeye.com/blog/threat-research.html |
site:https://blogs.forcepoint.com/security-labs |
site:https://www.fortinet.com/fortiguard/threat-intelligence/threat-research.html
|
site:https://safenet.gemalto.com/data-protection/enterprise-data-security-research-trends/" |
|
|
Start $Search |
|
|
|
$Search =
"http://www.google.com/search?q=$SearchFor
site:https://googleprojectzero.blogspot.com |
site:https://securityintelligence.com/category/x-force/ |
site:https://www.imperva.com | site:https://ioactive.com/ |
site:https://securelist.com/ | site:https://logrhythm.com/resources/whitepapers-and-ebooks/
| site:https://blog.malwarebytes.com/ |
site:https://securingtomorrow.mcafee.com/category/mcafee-labs/ |
site:https://www.microsoft.com/en-us/wdsi/threats |
site:https://car.mitre.org/ | site:https://nsogroup.com |
site:https://unit42.paloaltonetworks.com/ |
site:https://portswigger.net/daily-swig | site:https://blog.qualys.com/ |
site:https://blog.rapid7.com/ | site:https://www.root9b.com/newsroom#blog |
site:https://www.rsa.com/en-us/blog | site:https://www.sans.org/reading-room/whitepapers/threatintelligence/
| site:https://www.secureworks.com/blog |
site:https://securityintelligence.com/ |
site:https://www.silobreaker.com/threat-reports/ |
site:https://socprime.com/blog/ | site:https://blog.sonicwall.com/category/advanced-threats/
| site:https://www.sophos.com/en-us/threat-center/technical-papers.aspx |
site:https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/ |
site:https://www.splunk.com/en_us/cyber-security.html | site:https://www.symantec.com/blogs/threat-intelligence
| site:https://blog.talosintelligence.com/ |
site:https://www.tenable.com/blog/all | site:https://www.threatminer.org/ |
site:https://threatpost.com/" |
|
|
Start $Search |
|
|
|
$Search =
"http://www.google.com/search?q=$SearchFor
site:https://blog.trendmicro.com/trendlabs-security-intelligence/ |
site:https://www.tripwire.com/state-of-security/topics/featured/ |
site:https://www.virustotal.com/#/home/upload | site:https://www.webroot.com/blog/
| site:https://www.kela.com/blog/ | site:https://security.googleblog.com/ |
site:https://www.proofpoint.com/us/blog/ |
site:https://redcanary.com/blog/" |
|
|
|
Start $Search |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|