A weekly newsletter collecting links, tutorials, and news about computer security. Brought to you by Buttondown, the easiest way to start and grow your newsletter.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive reference guide covering Nessus vulnerability scanner configuration, management, API usage, and best practices.
A comprehensive SQL injection cheat sheet covering various database management systems and techniques.
A curated collection of companies that have publicly disclosed adversary tactics, techniques, and procedures following security breaches.
A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.