Please advise what to read. Part 1

Please advise what to read. Part 1

It's always nice to share useful information with the community. We asked our employees to advise the resources that they themselves visit in order to keep abreast of events in the world of information security. The collection turned out to be large, I had to break it into two parts. Part one.

Twitter

  • NCC Group Infosec — a technical blog of a large information security company that regularly releases its research, tools / plugins for Burp.
  • Gynvael Coldwind — security researcher, founder of the Dragon Sector top ctf team.
  • Null Byte — tweets about hacking and hardware.
  • hacksmith - SDR developer and researcher in the field of RF and IoT security, tweets / retweets, including about hardware hacking.
  • DirectoryRanger - about the security of Active Directory and Windows.
  • Binni Shah - writes mainly about hardware, retweets posts on a variety of information security topics.

Telegram

  • [MIS]ter & [MIS]sis Team - Information security through the eyes of RedTeam. A lot of quality material on attacks on Active Directory.
  • quotation mark — a typical channel about web bugs for web bug lovers. Most often, the emphasis is on analyzes of how to exploit typical vulnerabilities and tips on the effective use of software, less known but useful features.
  • Cyberp*ec - a channel about technology and information security.
  • Information leaks - Digest of data leaks.
  • Admin with Letter - a channel about system administration. Not exactly IB, but useful.
  • linkmeup is a linkmeup podcast channel where enthusiasts have been discussing networks, technologies and information security since 2011. We also recommend taking a look at broker.
  • Life-Hack [Life-Hacking]/Hacking - posts about hacking and protection in an understandable language (for beginners, that's it).
  • r0 Crew (Channel) - a digest of useful materials mainly on RE, exploit dev and malware analysis.

Github repository

Blogs

  • Project Zero - usually don't need an introduction, but if you haven't heard about them: this is a team of cool specialists who are looking for vulnerabilities of the "remote jailbreak for top iOS without user interaction" level, and not for money, but for the sake of everyone's safety.
  • PortSwigger Blog - a blog of developers of the Burp Suite combine, which has become the de facto standard for web security. Dedicated, of course, to web application security.
  • Firmware Security
  • Active Directory Security
  • Black Hills Information Security — wrote a lot of utilities/scripts that are quite useful for auditing, in addition to the blog, they actively share knowledge in their podcasts.
  • Sjoerd Langkemper. web application security
  • Pentester Land - every week a digest with videos and articles on pentest is published here.

Youtube

Bloggers

  • GynvaelEN — video write-ups, including from the notorious Gynvael Coldwind from the Google security team and the founder of the Dragon Sector top ctf team, where he talks a lot of interesting things about reverse engineering, programming, solving CTF tasks and code audit.
  • live overflow - a channel with very high-quality content - in simple terms about cool exploitation methods. There are also reviews of interesting reports on BugBounty.
  • STOK — a channel with an emphasis on BugBounty, valuable tips and interviews with top bug hunters on the HackerOne site.
  • IppSec - passing cars on Hack the box.
  • CQURE Academy is a company specializing in auditing Windows infrastructure. Lots of helpful videos about various aspects of Windows systems.

Conference

Academic conferences

Industrial conferences

Systematization of Knowledge (SoK)

This type of academic work can be very useful at the very beginning of diving into a new topic for you or when organizing information. Finding such works is not difficult, here are a few examples:

Original source

We hope you have found something new for yourself. In the next part, we will tell you what to read if you are interested, for example, in the task of satisfiability of formulas in theories and machine learning in the field of security, and we will also tell you whose reports on iOS jailbreak will be useful.

We will be glad if you share your findings or author's blog in the comments.

Source: habr.com

Add a comment