Back to Discover
212 followers
Extensive collection of security related blogs and news-sites. Regularly updated.
212 followers article/semaine
National Vulnerability Database
Suivre
This feed contains the most recent CVE cyber vulnerabilities published within the National Vulnerability Database.
Suivre 1k followers 0 article/semaine
This feed contains the most recent CVE cyber vulnerabilities published within the National Vulnerability Database.
1k followers 0 article/semaine
Zscaler Research
Suivre
The Zscaler Research Team is focused on bleeding edge web security research in the cloud computing era. This blog provides an opportunity for us to share our thoughts and ideas and interact with the community at-large. We welcome your feedback and en
Suivre 755 followers 0 article/semaine
The Zscaler Research Team is focused on bleeding edge web security research in the cloud computing era. This blog provides an opportunity for us to share our thoughts and ideas and interact with the community at-large. We welcome your feedback and en
755 followers 0 article/semaine
A Few Thoughts on Cryptographic Engineering
Suivre
Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.
Suivre 952 followers 0 article/semaine
Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.
952 followers 0 article/semaine
CERT Recently Published Vulnerability Notes
Suivre
CERT publishes vulnerability advisories called "Vulnerability Notes." Vulnerability Notes include summaries, technical details, remediation information, and lists of affected vendors. Many vulnerability notes are the result of private coordination a
Suivre 2k followers 0 article/semaine
CERT publishes vulnerability advisories called "Vulnerability Notes." Vulnerability Notes include summaries, technical details, remediation information, and lists of affected vendors. Many vulnerability notes are the result of private coordination a
2k followers 0 article/semaine
AVG Blogs
Suivre
Get the latest news, information and trends about all your security needs from AVG Blogs. From detailed virus alerts, the latest tips and hints on how to protect yourself and views from our CEO you can make sure you stay one step ahead of the cyber c
Suivre 128 followers 0 article/semaine
Get the latest news, information and trends about all your security needs from AVG Blogs. From detailed virus alerts, the latest tips and hints on how to protect yourself and views from our CEO you can make sure you stay one step ahead of the cyber c
128 followers 0 article/semaine
Cyber Trust Blog » Cybersecurity
Suivre
In-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance
Suivre 662 followers 0 article/semaine
In-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance
662 followers 0 article/semaine
S21sec Security Blog
Suivre
Information security Blog: malware, phishing, pharming, network security, computer security, troyans, IT Security
Suivre 167 followers 0 article/semaine
Information security Blog: malware, phishing, pharming, network security, computer security, troyans, IT Security
167 followers 0 article/semaine
XyliBox
Suivre
Tracking & Demystification of Cybercrime
Suivre 784 followers 0 article/semaine
Tracking & Demystification of Cybercrime
784 followers 0 article/semaine
Security Research & Defense
Suivre
Information from Microsoft about vulnerabilities, mitigations and workarounds, active attacks, security research, tools and guidance
Suivre 148 followers 0 article/semaine
Information from Microsoft about vulnerabilities, mitigations and workarounds, active attacks, security research, tools and guidance
148 followers 0 article/semaine
All-About-Security.de: Neueste IT-Security-Meldungen
Suivre
Neueste Meldungen von All-About-Security.de, dem unabhängigen IT-Security Informations- und Wissensportal, von Profis für Profis.
Suivre 165 followers 0 article/semaine
Neueste Meldungen von All-About-Security.de, dem unabhängigen IT-Security Informations- und Wissensportal, von Profis für Profis.
165 followers 0 article/semaine
MalwareTech
Suivre
Malware Analysis, Security News and Reverse Engineering.
Suivre 218 followers 0 article/semaine
Malware Analysis, Security News and Reverse Engineering.
218 followers 0 article/semaine
We use words to save the world | Kaspersky Lab Official Blog
Suivre
The Official Blog from Kaspersky Lab covers information to help protect you against viruses, spyware, hackers, spam & other forms of malware.
Suivre 1k followers 6 articles/semaine
The Official Blog from Kaspersky Lab covers information to help protect you against viruses, spyware, hackers, spam & other forms of malware.
1k followers 6 articles/semaine
Let's Encrypt
Suivre
Let’s Encrypt is a free, automated, and open certificate authority brought to you by the Internet Security Research Group (ISRG).
Suivre 194 followers 1 article/semaine
Let’s Encrypt is a free, automated, and open certificate authority brought to you by the Internet Security Research Group (ISRG).
194 followers 1 article/semaine
Marc's Security Ramblings
Suivre
Security News and Commentary from @marcwrogers - comments in this blog don't reflect the view of my employer.
Suivre 236 followers 0 article/semaine
Security News and Commentary from @marcwrogers - comments in this blog don't reflect the view of my employer.
236 followers 0 article/semaine
Peerio Blog
Suivre
Messages and files, simple and secure. Follow the latest in usable encryption from Peerio.
Suivre 140 followers 0 article/semaine
Messages and files, simple and secure. Follow the latest in usable encryption from Peerio.
140 followers 0 article/semaine
Qubes OS Project
Suivre
Qubes OS is an open source operating system designed to provide strong security for desktop computing using Security by Compartmentalization approach.
Suivre 274 followers 0 article/semaine
Qubes OS is an open source operating system designed to provide strong security for desktop computing using Security by Compartmentalization approach.
274 followers 0 article/semaine
Payload Security Blog
Suivre
IT security blog focusing on malware forensics, dynamic and static analysis, as well as automated malware analysis techniques.
Suivre 157 followers 0 article/semaine
IT security blog focusing on malware forensics, dynamic and static analysis, as well as automated malware analysis techniques.
157 followers 0 article/semaine
Security Zap
Suivre
Cyber Security Done Right - Find out more about cyber security, internet safety, cyber crime, deep web, cyber attack and network security.
Suivre 229 followers 0 article/semaine
Cyber Security Done Right - Find out more about cyber security, internet safety, cyber crime, deep web, cyber attack and network security.
229 followers 0 article/semaine
Troy Hunt's Blog
Suivre
Observations, musings and conjecture about the world of software and technology
Suivre 629 followers 1 article/semaine
Observations, musings and conjecture about the world of software and technology
629 followers 1 article/semaine
Talos Intel
Suivre
Talos is the industry-leading threat intelligence organization. We detect and correlate threats in real time using the largest threat detection network in the world to protect against known and emerging cyber security threats to better protect your o
Suivre 471 followers 4 articles/semaine
Talos is the industry-leading threat intelligence organization. We detect and correlate threats in real time using the largest threat detection network in the world to protect against known and emerging cyber security threats to better protect your o
471 followers 4 articles/semaine
red|blue
Suivre
Offensive tactics, defensive countermeasures, threat analysis, and assorted ramblings... Go easy, we're learning as we go! Follow us on twitter @epicism1 @gregkcarson
Suivre 257 followers 0 article/semaine
Offensive tactics, defensive countermeasures, threat analysis, and assorted ramblings... Go easy, we're learning as we go! Follow us on twitter @epicism1 @gregkcarson
257 followers 0 article/semaine
Android Security Updates
Suivre
Group for distribution of official security update announcements for Android and Nexus products.
Suivre 130 followers 0 article/semaine
Group for distribution of official security update announcements for Android and Nexus products.
130 followers 0 article/semaine
360 Total Security Blog » Languages » English
Suivre
Download 360 Total Security for Windows. Protect and optimize your computer with award-winning antivirus. Speed up, clean up and secure your PC. All for free.
Suivre 322 followers 0 article/semaine
Download 360 Total Security for Windows. Protect and optimize your computer with award-winning antivirus. Speed up, clean up and secure your PC. All for free.
322 followers 0 article/semaine
Duo Security Bulletin
Suivre
Duo Security provides two-factor authentication and endpoint security as a service, built to protect against account takeover and data theft.
Suivre 537 followers 0 article/semaine
Duo Security provides two-factor authentication and endpoint security as a service, built to protect against account takeover and data theft.
537 followers 0 article/semaine
Secure Development at Microsoft
Suivre
to inform developers of new security tools, services and open source projects and instill secure development practices while creating a collaborative engineering mindset across developers worldwide
Suivre 128 followers 0 article/semaine
to inform developers of new security tools, services and open source projects and instill secure development practices while creating a collaborative engineering mindset across developers worldwide
128 followers 0 article/semaine
SPECIAL EDITION
Suivre
Special Edition is the blog for security testing business SE Labs. It explains how we test security products, reports on the internet threats we find and provides security tips for businesses, other organisations and home users.
Suivre 131 followers 0 article/semaine
Special Edition is the blog for security testing business SE Labs. It explains how we test security products, reports on the internet threats we find and provides security tips for businesses, other organisations and home users.
131 followers 0 article/semaine
Microsoft Secure Blog
Suivre
In-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance
Suivre 220 followers 4 articles/semaine
In-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance
220 followers 4 articles/semaine

Construisez votre propre fil d'actualité

Prêt à tenter le coup ?
Commencer un essai de 14 jours, aucune carte de crédit n'est requise.

Créer un compte