- Ars Technica
- Becoming a Hacker
- Bruce Schneier's Blog
- CIO
- Cisco Security Blog
- CSO Online
- Cyber Defense Magazine
- cyberscoop
- Darknet
- Dark Reading
- Data Breaches
- Decipher
- Didier Stevens Blog
- Epic
- Errata Security
- Exploit Databse
- F-Secure Safe & Savvy Blog
- FireEye Blog
- Fox IT Security Blog
- Google Online Security Blog
- Graham Cluley
- Hack Read
- Heimdal Security Blog
- Help Net Security
- Information Security Buzz
- InfoSecurity Magazine
- Kaspersky Lab’s Securelist
- Kaspersky Lab’s ThreatPost
- KnowBe4 Blog
- Krebs on Security
- Malware Must Die
- Malwarebytes Labs
- Mashable
- McAfee security blog
- Microsoft Malware Protection Center
- Motherboard Vice
- Naked Security
- OpenDNS (Cisco Umbrella) Blog
- OWASP -Not a blog, but a must -
- Packet Storm Security
- Paul’s Security Weekly
- PCMag’s Security Watch
- Peerlyst
- AppSec Village
- BlackHills InfoSec
- DEF CON
- HackerSploit
- Jason Haddix
- John Hammond
- LiveOverFlow
- NullByte
- Red Team Village
- Security Weekly
- STÖK
- The Art of Hacking
- The Cyber Mentor
- DarkNet Diaries
- Security Weekly
- Risky Business
- Firewalls Don’t Stop Dragons
- The Unsupervised Learning Podcast
- Down the Security Rabbithole
- Smashing Security
- The Cyberwire
- The CyberJungle
- Beer with Talos
- Talos Takes
- Open Source Security Podcast
- Crypto-Gram Security Podcast
- The Privacy, Security and OSINT Show