TalEliyahu / awesome-security-newslettersView external linksLinks
Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
β1,225Feb 5, 2026Updated last week
Alternatives and similar repositories for awesome-security-newsletters
Users that are interested in awesome-security-newsletters are comparing it to the libraries listed below
Sorting:
- A collection of awesome security hardening guides, tools and other resourcesβ6,113Jan 20, 2026Updated 3 weeks ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,354Nov 8, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.β1,855Oct 1, 2025Updated 4 months ago
- Watch the latest awesome security talks around the globeβ279Feb 23, 2025Updated 11 months ago
- β¨ A curated list of awesome threat detection and hunting resources π΅οΈββοΈβ4,496Jan 5, 2026Updated last month
- π¦π Awesome list of secrets in environment variables π₯οΈβ901Sep 21, 2022Updated 3 years ago
- π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.β5,133Jul 15, 2024Updated last year
- A curated list of Awesome Threat Intelligence resourcesβ9,786Jan 19, 2026Updated 3 weeks ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatinβ¦β483Jun 12, 2025Updated 8 months ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOpβ¦β4,864Dec 31, 2025Updated last month
- A curated list of tools for incident responseβ8,808Jul 18, 2024Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guiβ¦β263Jul 5, 2025Updated 7 months ago
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.β1,177Dec 27, 2023Updated 2 years ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communitβ¦β3,642Nov 23, 2025Updated 2 months ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for β¦β1,707Aug 2, 2024Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligenceβ703Apr 21, 2025Updated 9 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,897Oct 29, 2025Updated 3 months ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issueβ13Dec 28, 2021Updated 4 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation oβ¦β1,131Dec 19, 2025Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.β296May 5, 2024Updated last year
- Granular, Actionable Adversary Emulation for the Cloudβ2,259Updated this week
- A curated list of awesome Kubernetes security resourcesβ953Dec 15, 2023Updated 2 years ago
- IntelOwl: manage your Threat Intelligence at scaleβ4,451Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.β11,570Feb 9, 2026Updated last week
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β1,049Jun 27, 2025Updated 7 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more eβ¦β4,475Jan 12, 2026Updated last month
- A collection of sources of documentation, as well as field best practices, to build/run a SOCβ1,621Feb 10, 2026Updated last week
- Awesome information for WebSockets security researchβ300Jan 10, 2022Updated 4 years ago
- BlueHound - pinpoint the security issues that actually matterβ762Jul 12, 2023Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β10,191Jan 25, 2026Updated 3 weeks ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by develβ¦β713Nov 14, 2025Updated 3 months ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Responseβ642Jun 19, 2024Updated last year
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic lβ¦β2,733Oct 27, 2021Updated 4 years ago
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β142Nov 3, 2025Updated 3 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark webβ6,572Updated this week
- List of Awesome Red Teaming Resourcesβ7,757Dec 28, 2023Updated 2 years ago
- Sublime rules for email attack detection, prevention, and threat hunting.β345Updated this week
- A repository of breaches of AWS customersβ794Jan 24, 2026Updated 3 weeks ago
- All the deals for InfoSec related software/tools this Black Fridayβ4,339Nov 28, 2025Updated 2 months ago