Information Security Blogs

A list of information security blogs from creators out there in infosec land, I cant vouch for and I’m not responsible for the content on each site. If you find a problem with any of the below, get in touch and I’ll check it out and remove it. Alternatively, if someone who’s blog I’m posted turns out to be a douche, let me know also.

BlogTwitter Handle
https://danielmiessler.com/@DanielMiessler
https://grahamcluley.com/@gcluely
https://www.pwndefend.com/blog/@UK_Daniel_Card
https://jackbaylor.medium.com/@2wiredSecurity
https://no-sec.net/@HomeSen
http://dfresh.ninja/@DFreshalot
https://feed.prelude.org/@privateducky
https://socinvestigation.com/@Bala_hacky
http://nellyhacks.com@nellbag
https://visualtorch.com/blog/@TrentB55
https://jbcsec.com/insights/@JBizzle703
https://codingo.com/@codingo_
https://www.klrgrz.com/@klrgrz
https://infosecsherpa.medium.com/@InfoSecSherpa
https://www.cover6solutions.com/cybersecurity-blog/@tywilson21
https://www.0xhuesca.com/@0xhuesca
http://jonmoore.duckdns.org/@jdmoore0883
https://securityjawn.com/@jp215
https://flutterduck.com/@Fezmid
https://snorlax-security.hilo21.com/@Cyb3rSn0rlax
https://noxcyber.co.uk/@noxcyber
https://blog.k3170makan.com/@k3170Makan
https://neodymiumphi.sh/@NeodymiumPhish
https://blueteamblog.com/@blueteamblog
https://www.ta-ethika.com/blog@aaron_s_moffett
https://offensivedefence.co.uk/@_RastaMouse
https://www.cyberguider.com/blog/@CyberGuider
https://securib.ee/beelog/@securibee
https://0x0byt3.com/@fuxsocy_py
https://gusralph.info/@SecGus
https://www.secsignal.org/en/news/@SecSignal
https://www.optiv.com/blog/author/matthew-eidelberg@Tyl0us
https://bohops.com/@bohops
https://nosecurity.blog/@nos3curity
https://s1gh.sh/@s1gh
https://vincentyiu.com/@vysecurity
https://jeffcodesthings.blogspot.com/?m=1@JeffDBrandon
https://cronop-io.github.io/@Asher_Davila
https://cybherdiaries.com/@kali_reanna_
https://medium.com/cloud-security@TeriRadichel
https://wrongbaud.github.io/@wrongbaud
https://www.archcloudlabs.com/projects/@DLL_Cool_J
https://krishnasaimarella9.medium.com/@krishnasai_456
https://yaksas.in/ycscblog/#.YGHrjK9KiiM@yaksas443
https://smaranchand.com.np/@smaranchand
https://defenselead.com/@anwarhussains
https://shishirsubedi.com.np/@Shishir37768334
https://oxis.github.io/@meerkatsec
https://dmfrsecurity.com/@dmfroberson
https://infosecvidya.com/@utkarsh_utsava
https://weistercreekinfosec.com/@WeisterCreek
https://trevorsaudi.medium.com/@trevorsaudi
https://holdmybeersecurity.com/@CptOfEvilMinion
https://wehackpeople.wordpress.com/@brentwdesign
https://digitalguardian.com/blog@DigitalGuardian
https://pdelteil.medium.com/@PhilippeDelteil
https://avasdream.engineer/@avasdream_
https://www.securicy.com/blog/@Securicyapp
https://blog.ikuamike.io/@ikuamike
https://www.hella-secure.com/@HellaSecure
https://www.georgiacrossland.com/blog@GCCrossland
https://www.tiberium.io/blog/@TiberiumSec
https://jan0ski.github.io/@jan0ski_
https://voidsec.com/@Void_Sec
https://cyberkach.com/@unclekach
https://datmoji.com/@eltenvi
https://teamhydra.blog/blog/@N4k3dTurtl3
https://fantm-attempts.blogspot.com/?m=1@FantmSlyr
https://theantisocialengineer.com/@antisocial_eng
https://www.secjuice.com@Secjuice
https://www.0d.ae/@0dTeam
https://www.yeahhub.com/@yeahhub
https://protectme.blog/@ProtectMeBlog
https://www.inputzero.io/@RandomDhiraj
https://apjone.uk/@apjone
https://modexp.wordpress.com/@modexpblog
http://c-apt-ure.blogspot.com/@c_APT_ure
https://www.laststandsecurity.co.uk/@LastStandSec
https://anchor.fm/crucialtech@newtechpress
https://ultimatesecurity.pro/@ultimatesecpro
https://www.kaitycodes.com/blog@kaitycodes
https://nstarke.github.io/@nstarke
https://initinfosec.com/@initinfosec
https://securitysting.com/blog@SecuritySting
https://endark.gitbook.io/kb/@d4rckh + @csenox1
https://dfir.science/@DFIRScience
http://blog.mansi.us/@mansimusa
https://srcincite.io/@steventseeley
https://shells.systems/@mohammadaskar2
https://malwaremaloney.blogspot.com/@bmmaloney97
https://resilience.sh/@wimzkl
https://en.hackndo.com/@HackAndDo
https://www.noxcivis.com/@Noxcivis
https://atomicnicos.me/whoami@AtomicNicos
https://s01den.github.io/@s01den
https://vext.info/@0xvext
https://hshrzd.wordpress.com/@hasherezade
https://medium.com/@jordanne_76409@PlugTcp
https://lockboxx.blogspot.com/@1njection
https://thefluffy007.com/@thefluffy007
https://sankalp.me/about/@mrsankalps
https://int0xcc.svbtle.com/@raashidbhatt
https://www.thehacker.recipes/@_nwodtuhs
https://safethishome.com/category/the-cyberblade/@_SafeThis_
https://raffy.ch/blog/@raffaelmarty
https://www.nonuser.es/@n0nuser_
https://heimdalsecurity.com/en/@HeimdalSecurity
https://defcon201.medium.com/@defcon201nj
https://www.phishdeck.com/blog/@ianmuscat
https://securesteve.com/@SecureSteveG
https://xohan30.codes/@x0h4n30
https://neilen.com.au/@tneilen
https://www.exandroid.dev/@ExAndroidDev
https://www.revshells.com/@0dayCTF
https://badbit.vc/@_badbit_
https://infosechelp.net/@siggib007
https://spotrlabs.wordpress.com/@0xProphet
https://darrynbrownfield.co.uk/@DazBrownfield
https://mazinahmed.net/@mazen160
https://criminal.group/@grayhatter
https://epi052.gitlab.io/notes-to-self/@epi052
https://www.connectwise.com/blog/cybersecurity@ConnectWise
https://www.sageknowsit.com/@SagesCompRepair
http://www.covert.io/@jason_trost
https://blog.liquidsec.net/@paulmmueller
https://team-53.com/@nop5L3D
https://bakerstreetforensics.com/@dwmetz
https://dfirdiva.com/@DfirDiva
https://www.levelupinfosec.com/@InfosecMiles
https://ethicalhacking.sh/@nightshiftc
https://muzec0318.github.io/@muzec_saminu
https://threathuntergirl.com/@threathuntergrl
https://affinesecurity.gitlab.io/@AffineSecurity
https://theinfosecphoenix.wordpress.com/@InfoSecPhoenix
https://ralphdesmangles.github.io/@s1zzzz
https://fourzerothree.substack.com/@4zerothree
https://jtspratley.com/blog/tag_cybersecurity@GoLiveLively
https://www.securityforrealpeople.com/@dnlongen
https://0xthreatintel.medium.com/@0xthreatintel
https://marcellelee.medium.com/@marcellelee
https://www.sisainfosec.com/@sisainfosec
https://obumchidi.wordpress.com/@Bohz_Chidi
https://omarm.ca/blog/iot-firmware-analysis@omarmSec
https://josephsteinberg.com/@JosephSteinberg
https://sudoutopia.github.io/@sudoutopia
https://x3ero0.github.io/@X3eRo0
https://x0r19x91.in/@x0r19x91
https://stux.gitlab.io/@confusedcoder18
https://m4t3sz.gitlab.io/bsc/@szilak44
https://cyber-99.co.uk/@Pr3R00T
https://blog.agood.cloud/@agoodcloud_blog
https://abstract-security.lugons.org/@no_man29
https://www.kaspersky.com/blog/@couldstrafe
https://riodan.medium.com/@ryodan0x
https://research.digitalinterruption.com/@JayHarris_Sec
https://blog.manchestergreyhats.co.uk/@JayHarris_Sec
https://katanasec.com/@magnologan
https://n1ght-w0lf.github.io/@NightW0o0lf
https://vitormelo.blog.br/@vitorml_
https://cirius.medium.com/@0cirius0
https://medium.com/r3d-buck3t@NairuzAbulhul
https://kalinull.medium.com/@kali_null
https://www.clairetills.com/@ClaireTills
https://www.stationx.net/blog@GotoNathan
https://securelist.com/@cybercryptex
https://business-reporter.co.uk/author/khubert/@KeilHubert

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.