Archive
Cybersecurity
Table of Contents
- What is Attack Surface Management? | IBM
- How to Disable Autostart? – GoTo Community
- SpamCop.net – Beware of cheap imitations
- Snopes.com | The definitive fact-checking site and reference source for urban legends, folklore, myths, rumors, and misinformation.
- Have I Been Pwned: Check if your email has been compromised in a data breach
- OWASP Top Ten | OWASP Foundation
- Shodan Search Engine
- How To Use IPRoute2 Tools to Manage Network Configuration on a Linux VPS | DigitalOcean
- Nmap Network Scanning
- Security | Wi-Fi Alliance
- WEP | WPA | WPA2 | WPA3 | Wireless Security Protocols ⋆ IpCisco
- security-guidance-v4.pdf
- McAfee Threat Center – Latest Cyberthreats | McAfee
- How to Spot Phishing Emails: Your Go-to Email Security Checklist
- GitHub – The-Art-of-Hacking/h4cker: This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Threat Intelligence
- Global Terrorism Database
- OSINT Framework
- National Council of ISACs
- National Institute of Standards and Technology
- NVD – Home
- CVE – MITRE
- FireEye Cyber Threat Map
- IETF | Internet Engineering Task Force
- MITRE ATT&CK®
- FotoForensics – Analysis
- Security Advisories and Bulletins | Microsoft Docs
Pen Testing
- Technical guide to information security testing and assessment
- The Penetration Testing Execution Standard
- ptes-methodology-pic-1-infopulse.jpg (1516×2034)
- Pentester’s Training and Practice: Recon – active information gathering and vulnerability search | Infopulse
Sec Frameworks
System Hardening
- NIST SP 800-123, Guide to General Server Security
- NCP – National Checklist Program Checklist Repository
- National Checklist Program | CSRC
- Linux hardening: A 15-step checklist for a secure Linux server | Pluralsight
- How to Use rsync to Backup Your Data on Linux
