DFIR Bloggers

blogger-logo-icon-png-22

Network

Network
Blogs

Featured | Arsenal Recon

Featured | Autopsy

Featured | Official Atola Blog

Featured | Belkasoft

Featured | Brett Shavers

Featured | Forensic Notes

Featured | Magnet Forensics

2021 | Foxton Forensics Blog |  foxtonforensics.com/blog/   
2021 | Guardonix |  guardonix.com/blog.html  
2021 | Paraben Forensics |  paraben.com/forensic-impact/
2021 | 4n6ir by John Lukach |  blog.4n6ir.com/
2021 | A Few Thoughts on Cryptographic Engineering |  blog.cryptographyengineering.com/
2021 | A Trail of Bits |  blog.trailofbits.com/
2021 | AboutDFIR |  aboutdfir.com/
2021 | ADF |  adfsolutions.com
2021 | Alien Vault |  alienvault.com/open-threat-exchange/blog
2021 | Alien Vault Blog |  alienvault.com/blogs
2021 | Android Developers |  android-developers.googleblog.com/
2021 | Anton Chuvakin |  medium.com/anton-on-security
2021 | Anubis Networks |  blog.anubisnetworks.com/blog
2021 | Applied Security Research |  blog.menasec.net/
2021 | ArsTechnica |  arstechnica.com/
2021 | Attack Mitre |  attack.mitre.org/wiki/All_Techniques
2021 | Ball in your Court |  ballinyourcourt.wordpress.com/
2021 | Bank InfoSecurity |  bankinfosecurity.com/
2021 | Barry Wels Blog |  blackbag.nl/
2021 | Bart Blaze Security Blog |  bartblaze.blogspot.com/
2021 | Binary Defense Systems |  binarydefense.com/blogposts/
2021 | BitSight |  blog.bitsighttech.com/
2021 | Blaze's Security Blog |  bartblaze.blogspot.com/
2021 | Bleeping Computer Virus |  bleepingcomputer.com/
2021 | Blog of Osanda |  osandamalith.com/
2021 | Bug Crowd Blog |  blog.bugcrowd.com/
2021 | CarbonBlack Blog |  carbonblack.com/cb-blog
2021 | CedricPERNET-Forensics Malware and Cybercrime |  bl0g.cedricpernet.net/
2021 | Center for Internet Security |  blog.cisecurity.org/
2021 | Checkmate - e-zine on Digital Forensics and Incident Response |   niiconsulting.com/checkmate/
2021 | Christiaan Beek |  blogs.mcafee.com/author/christiaan-beek
2021 | Circumventing Encoded Command Detection PowerShell |   trustedsec.com/blog/circumventing-encodedcommand-detection-powershell
2021 | Cisco Threat Research Blog(Talos) |  blog.talosintel.com/
2021 | Cloud Flare blog |  blog.cloudflare.com/
2021 | Cobalt Strike |  blog.cobaltstrike.com/
2021 | Countermeasures-TrendMicro |  countermeasures.trendmicro.eu/
2021 | CrowdStrike Blog |  crowdstrike.com/blog
2021 | c-skills |  c-skills.blogspot.ch/
2021 | CTO Vision |  ctovision.com/
2021 | Cyber and Ramen |  cyberandramen.net/
2021 | Cyber Curiosity |  cybercuriosity.home.blog/
2021 | Cyber Threat Alliance |  cyberthreatalliance.org/blog/
2021 | CyberCrime & Doing Time |  garwarner.blogspot.com/
2021 | Cybereason |  cybereason.com/blog
2021 | Cymulate |  blog.cymulate.com/
2021 | Daniel Miessler |  danielmiessler.com/blog
2021 | Daring Fireball |  daringfireball.net/
2021 | Darknet-The Darkside |  darknet.org.uk/
2021 | DarkReading-All Stories |  darkreading.com/
2021 | Dave Waterson on Security |  dwaterson.com/
2021 | DFIR_300 |  https://dfir300.blogspot.com/
2021 | DF Magazine |  digitalforensicsmagazine.com/blogs/
2021 | DFI News |  dfinews.com/
2021 | DFIR Blog |  dfir.blog/
2021 | Didier Stevens |  blog.didierstevens.com/
2021 | Digital Forensic Survival Podcast |  digitalforensicsurvivalpodcast.com/
2021 | Digital Forensics Magazine Blog |  digitalforensicsmagazine.com/blogs
2021 | Digital Forensics Science |  dfir.science
2021 | disrupt Ops |  disruptops.com/news/blog/
2021 | DoubleBlack.com |  doubleblak.com/blogs.php
2021 | e-Disclosure Information Project |  chrisdale.wordpress.com/
2021 | eForensics Magazine blog |  eforensicsmag.com/category/news/
2021 | EHACKING |  ehacking.net/
2021 | Elcomsoft |  blog.elcomsoft.com/
2021 | Engineering Evil |  engineeringevil.com/
2021 | Ensilo |  blog.ensilo.com/
2021 | Errata Security |  blog.erratasec.com/
2021 | ESET ThreatBlog |  welivesecurity.com/
2021 | Ethical Hacking Blog |  ehacking.net/
2021 | FireEye Blog |  fireeye.com/blog
2021 | FlowingData Blog |  flowingdata.com/
2021 | Forensic 4cast |  forensic4cast.com/
2021 | forensic blogs |  forensicblogs.com/
2021 | Forensic Focus |  forensicfocus.com/
2021 | forensic mike |  forensicmike1.com/
2021 | Fortinet |  fortinet.com/blog
2021 | F-Secure Antivirus Research Weblog |  f-secure.com/weblog
2021 | Gdata |  gdatasoftware.com/blog
2021 | ghacks |  ghacks.net/
2021 | Gillware Digital Forensics Blog |  gillware.com/forensics/blog
2021 | Google Security Blog |  security.googleblog.com/
2021 | Hackernoon |  hackernoon.com/
2021 | Heimdal Security |  heimdalsecurity.com/blog/security-alerts
2021 | HelpNet Security |  helpnetsecurity.com/
2021 | Hexacorn |  hexacorn.com/blog/
2021 | HOTforSecurity |  hotforsecurity.com/
2021 | HowTo Geek Blog |  howtogeek.com/
2021 | http://cyberthreatalliance.org |  cyberthreatalliance.org/
2021 | https://danielmiessler.com/blog |  danielmiessler.com/blog
2021 | Hunting For Web Shells |  tenable.com/blog
2021 | imperva |  imperva.com/blog/
2021 | Incapsula Blog |  incapsula.com/the-incapsula-blog
2021 | InfoSec Resources |  resources.infosecinstitute.com/
2021 | InfoSecurity |  infosecurity-magazine.com/news/
2021 | Initialization vectors |  abrignoni.blogspot.com/
2021 | IOActive Lab sResearch |  blog.ioactive.com/  
2021 | Irongeek Security Site |  irongeek.com/
2021 | ITauditSecurity |  itauditsecurity.wordpress.com/
2021 | J4vv4D |  j4vv4d.com/  
2021 | Jerry Gamblin |  jerrygamblin.com/
2021 | Kaspersky |  securelist.com/
2021 | Katie's Five Cents |  medium.com/katies-five-cents
2021 | Kenna Security |  blog.kennasecurity.com/
2021 | Krebs on Security |  krebsonsecurity.com/
2021 | Lares Blog |  lares.com/resources/blog/
2021 | Lenny Zeltser on Information Security |  zeltser.com/blog/
2021 | Life In Hex |  lifeinhex.com/
2021 | LMG Security |  lmgsecurity.com/blog
2021 | "Load ""Cloud, Code and Coffee" | ralphwillgoss.github.io/
2021 | Looking Glass |  lookingglasscyber.com/blog/
2021 | MalShare Project |  malshare.com/
2021 | Malware Maloney |  malwaremaloney.blogspot.com/
2021 | Malwarebytes Labs Blog |  blog.malwarebytes.com/
2021 | Malwarebytes Unpacked |  blog.malwarebytes.org/
2021 | Max Kersten |  maxkersten.nl/blog/
2021 | McAfee Labs Blog |  mcafee.com/blogs/enterprise/
2021 | Mixmode Blog |  mixmode.ai/blog/
2021 | Mobile & Technology Exploration |  trewmte.blogspot.com/
2021 | Morphisec |  blog.morphisec.com/
2021 | MWR Labs |  labs.mwrinfosecurity.com/blog
2021 | My DFIR Blog |  dfir.ru/
2021 | Naked Security-Sophos |  nakedsecurity.sophos.com/
2021 | NCC Group Blog |  research.nccgroup.com/
2021 | Neo Prime Security |  neonprimetime.blogspot.com/      
2021 | Nerd Vittles |  nerdvittles.com/
2021 | NETRESEC Network Security Blog |  netresec.com/?page=Blog
2021 | Network Intelligence Blog |  niiconsulting.com/checkmate
2021 | Noopy Blog |  n00py.io/
2021 | NVISO Labs |  blog.nviso.be/    
2021 | Open Analysis |  oalabs.openanalysis.net/author/sergei/
2021 | OPSWAT Blog |  opswat.com/blog
2021 | Optiv Blog |  optiv.com/resources/blog
2021 | Osanda Malith Blog |  osandamalith.wordpress.com/
2021 | PacketPushers |  packetpushers.net/
2021 | Pario TechnoBlob |  pario.no/
2021 | Paul's Security Weekly |  securityweekly.com/blog
2021 | Pentester Lab |  blog.pentesterlab.com/
2021 | PhishMe |  phishme.com/blog
2021 | Prodigital4n6 |  prodigital4n6.blogspot.com/
2021 | Project Zero |  googleprojectzero.blogspot.com/
2021 | Prolexic Labs |  prolexic.com/news-events.html
2021 | Rapid7 |  blog.rapid7.com/
2021 | Ride The lightning |  ridethelightning.senseient.com/
2021 | Room362 Blog |  room362.com/blog
2021 | SalvationData |  blog.salvationdata.com/
2021 | Sandfly Security |  sandflysecurity.com/blog/
2021 | SANS Computer Forensic Investigations and Incident Response |  computer-forensics.sans.org/blog  
2021 | SANS Internet Storm Center |  isc.sans.edu/
2021 | Sarah Edwards |  mac4n6.com/
2021 | Schneier on Security |  schneier.com/blog
2021 | SCIP AG Labs |  scip.ch/en/?labs
2021 | Secure List |  securelist.com/  
2021 | Securelist-Blog |  securelist.com/en
2021 | Security Affairs |  securityaffairs.co/wordpress
2021 | Security Intelligence Blog |  securityintelligence.com/
2021 | Security Onion Blog |  blog.securityonion.net/
2021 | Security Scorecard |  blog.securityscorecard.com/
2021 | Security Soup |  security-soup.net/
2021 | Security Whole Blog |  blog.securitywhole.com/
2021 | SecurityIntelligence |  securityintelligence.com/
2021 | SecurityXploded Articles |  nagareshwar.securityxploded.com/
2021 | Securosis Complete |  securosis.com/
2021 | SensePost Blog |  sensepost.com/blog
2021 | Shadow Server Foundation Blog |  blog.shadowserver.org/news-insights/
2021 | SkullSecurity |  blog.skullsecurity.org/
2021 | SleuthKit |  autopsy.com/category/blog/
2021 | "So Long, and Thanks for All the Fish "| andreafortuna.org/
2021 | Social Engineer |  social-engineer.org/blog
2021 | Sophos Labs Blog |  blogs.sophos.com/
2021 | SpiderLabs Anterior |  trustwave.com/en-us/resources/blogs/spiderlabs-blog/
2021 | Stark 4n6 |  stark4n6.com/
2021 | State of Security Blog |  stateofsecurity.com/
2021 | Sumuri Blog |  sumuri.com/blog
2021 | Technical notes-my online memory |  ilostmynotes.blogspot.com/
2021 | Techtalk |  techtalk.gfi.com/
2021 | Tenable Network Security Blog |  tenable.com/blog
2021 | The Binary Hick |  thebinaryhick.blog/
2021 | the morning paper |  blog.acolyer.org/
2021 | The State of Security |  tripwire.com/state-of-security/
2021 | ThinkDFIR |  thinkdfir.com/
2021 | THIS IS HOW SYMMETRIC ENCRYPTION REALLY WORKS |  scip.ch/en/?labs
2021 | This Week in 4n6 |  thisweekin4n6.com
2021 | Threat Connect |  threatconnect.com/blog/
2021 | Threatpost |  threatpost.com/
2021 | ToolsWatch |  toolswatch.org/
2021 | Total Commander |  ghisler.com/
2021 | Tradecraft |  honeybadger.io/blog
2021 | Trail of Bits Blog |  blog.trailofbits.com/
2021 | TripWire-State of Security | tripwire.com/state-of-security
2021 | Troy Hunt Blog |  troyhunt.com/
2021 | TrustedSec |  trustedsec.com/category/articles/
2021 | Uncooperative Organization |  blog.uncooperative.org/
2021 | US CERT |  us-cert.gov/ncas/alerts
2021 | vanimpe |  vanimpe.eu/blog/
2021 | Webroot Threat Blog |  webroot.com/blog
2021 | WHAT'S A MENNONITE DOING IN MANHATTAN?! |  manhattanmennonite.blogspot.com/
2021 | Windows Incident Response Blog |  windowsir.blogspot.com/  
2021 | Wired Security |  wired.com/category/security/
2021 | XPN |  blog.xpnsec.com
2021 | Elvidence Computer Forensics Blog |  elvidence.com.au/blog
2021 | Reverse Engineering Mac OSX |  reverse.put.as/
2021 | Volexity |  volexity.com/blog
2021 | Xorl |  xorl.wordpress.com/
2021 | Yogesh Khatri's forensic blog - Swift Forensics |  swiftforensics.com/
2021 | Cheeky4n6Monkey-Learning About Digital Forensics |  cheeky4n6monkey.blogspot.com/
2021 | Malware Must Die! Blog |  blog.malwaremustdie.org/
2021 | Detecting In-Memory  MimiKatz |  securityriskadvisors.com/blog/post/detecting-in-memory-mimikatz    
2021 | HolisticInfoSec |  holisticinfosec.io/
2021 | Abuse-TheSwissSecurityBlog |  abuse.ch
2021 | BlackBag: Mac |  blackbagtech.com/blog/
2021 | Boncaldo's Forensics Blog |  boncaldoforensics.wordpress.com/
2021 | Catalyst secure |  catalystsecure.com/blog/
2021 | Chatter From a Charlatan |  opensecgeek.blogspot.com/
2021 | Chris Sanders |  chrissanders.org/
2021 | D20 Forensics |  blog.d204n6.com/
2021 | Dr. Eric Cole Blog |  secure-anchor.com/blog/
2021 | Dynamoo Blog |  blog.dynamoo.com/
2021 | e-Discovery Team |  e-discoveryteam.com/
2021 | EliE |  elie.net/blog/
2021 | Emergent Chaos |  emergentchaos.com/
2021 | EndGame |  endgame.com/blog
2021 | Forense nella Nebbia |  forensenellanebbia.blogspot.com/
2021 | hasherezade' 1001 nights |  hshrzd.wordpress.com/
2021 | HoneyNet Project Blog |  honeynet.org/
2021 | https://veronica-schmitt.com/ |  veronica-schmitt.com/
2021 | ImperialViolet |  imperialviolet.org/
2021 | Insanely Mac Blog |  insanelymac.com/  
2021 | Jonathan Zdziarski Blog |  zdziarski.com/blog/
2021 | Light Blue Touchpaper |  lightbluetouchpaper.org/
2021 | MalwareTech |  malwaretech.com/
2021 | Metaspike |  metaspike.com/blog/
2021 | My Open Source Toolbox |  opensecgeek.blogspot.com/
2021 | Recurity La blog |  blog.recurity-labs.com/
2021 | Red Canary |  redcanary.com/blog/
2021 | RIFF Box Blog |  riffbox.org/
2021 | Security Watch |  bhconsulting.ie/securitywatch
2021 | SENKI |  senki.org/
2021 | SIP Vicious Blog |  blog.sipvicious.org/  
2021 | SmarterForensics |  smarterforensics.com/blog/
2021 | TaoSecurity |  taosecurity.blogspot.com/
2021 | The Honeynet Project |  honeynet.org/blog
2021 | The PC N3rd Blog |  thepcn3rd.blogspot.com/
2021 | thepcn3rd - Passion for Infosec |  thepcn3rd.blogspot.com/
2021 | Tim Tomes Blog |  lanmaster53.com/
2021 | trustedsignal blog |  trustedsignal.blogspot.com/
2021 | Volatility Labs |  volatility-labs.blogspot.com/
2021 | Zena Forensics |  blog.digital-forensics.it/
2021 | ADD/XOR/ROL |  addxorrol.blogspot.ch/
2021 | Andrew  Hay |  andrewhay.ca/
2021 | Count Upon Security |  countuponsecurity.com/
2021 | That Security Blog |  fl0x2208.wordpress.com/
2021 | ChipDFIR |  chip-dfir.techanarchy.net/
2021 | DFIR and Threat Hunting |  findingbad.blogspot.com/
2021 | Grand Street Dreams |  grandstreamdreams.blogspot.com/
2021 | Henrybasset Red Sky Alliance Blog |  henrybasset.blogspot.com/
2021 | Infrequently Noted |  infrequently.org/
2021 | Just Another DFIR Blog |  justanotherdfirblog.blogspot.com
2021 | UNIX |  unixsadm.blogspot.com/
2021 | Break and Enter |  breaknenter.org/
2021 | Stop Malvertising |  stopmalvertising.com/
2021 | Digital Forensic Source |  digitalforensicsource.com/
2021 | Student of Security |  mikeahrendt.blogspot.com/
2021,Arbor Networks Corporate Blog |  arbornetworks.com/corporate/blog
2021,The Recurity Lablog |  blog.recurity-labs.com/
2020 | Be-binary 4n6 |  bebinary4n6.blogspot.com/
2020 | Bit of Hex |  bitofhex.com/
2020 | ContagioDump |  c ontagiodump.blogspot.com/
2020 | Dark Operator |  darkoperator.com/blog
2020 | Developer Notes |  jardinesoftware.net/
2020 | DFstudent |  https://digitalforensicstudent.wordpress.com/
2020 | Exploring Possibility Space |  exploringpossibilityspace.blogspot.com/
2020 | Forensic Control |  forensiccontrol.com/blog/
2020 | Forensic Multimedia Analysis |  forensicphotoshop.blogspot.com/
2020 | Free Android Forensics |  freeandroidforensics.blogspot.com/
2020 | Hacker Hurricane |  hackerhurricane.blogspot.com
2020 | Hats off Security |  hatsoffsecurity.com/
2020 | http://exposedbotnets.com |  exposedbotnets.com/
2020 | init infosec |  initinfosec.com/
2020 | Inside Your Botnet |  exposedbotnets.com/
2020 | Kahu Security |  kahusecurity.com/
2020 | Linux Audit |  linux-audit.com/
2020 | Malware Nailed |  malwarenailed.blogspot.com/
2020 | Malware.Don't Need Coffee |  malware.dontneedcoffee.com/
2020 | Matthieu Suiche blog |  msuiche.net/
2020 | Nart Villeneuve |  nartv.org/
2020 | OpenAnalysis Labs |  oalabs.openanalysis.net/
2020 | Politonic Inc Masterful Cyber Security |  politoinc.com/news
2020 | Rarst.net |  rarst.net/
2020 | SecTechno |  sectechno.com/
2020 | Shell is Only the Beginning |  darkoperator.com/blog
2020 | Team Cymru Internet Security News |  team-cymru.org/
2020 | Trend MicroBlog |  blog.trendmicro.com/
2020 | Un minion curioso |  u nminioncurioso.blogspot.com/
2020 | X-Ways Forensics Practitioner's Guide |  xwaysforensics.wordpress.com/
2020 | Another Forensics Blog(az4n6) |  az4n6.blogspot.com/
2020 | Cellular Forensics LLC |  cellularforensics.com/
2020 | Cryptographic  Engineering |  blog.cryptographyengineering.com/
2020 | Digital Forensics Tips |  digitalforensicstips.com/
2020 | I Am Security |  iamit.org/blog
2020 | Microsoft Office365 Security |  blogs.technet.microsoft.com/office365security
2020 | Codeslack |  codeslack.blogspot.com/
2020 | Anuj Soni |  malwology.com/
2020 | Avairy Solutions |  avairysolutions.com/blog/
2020 | CyberForensicator |  cyberforensicator.com/
2020 | Data Digitally |  datadigitally.com/
2020 | Gironsec Security System Analysis |  gironsec.com/blog/
2020 | Hacking Exposed - Computer Forensics blog |  hecfblog.com/
2020 | Half Full of Security |  jon.glass/
2020 | https://digitalforensicstudent.wordpress.com/ |  digitalforensicstudent.wordpress.com/
2020 | IMF Security |  imfsecurity.com/blog
2020 | Janathan Glass |  jon.glass/
2020 | Malwology |  malwology.com/
2020 | MB Secure |  mbsecure.nl/blog
2020 | Secure Consulting |  secureconsulting.net/
2020 | Sketchymoose Blog |  sketchymoose.blogspot.com/
2020 | The Lost CISO |  thomlangford.com/
2020 | Thom Langford |  thomlangford.com/
2020 | Josh Moulin |  joshmoulin.com/
2020 | Megabeets |  megabeets.net/
2020 | Netragard SNOsoft Research Team |  pente st.netragard.com/
2020 | Security Ripcord: Cutaway Security Blog and Projects |  cutawaysecurity.com/
2020 | Paul Melson Blog |  pmelson.blogspot.com/
2020 | Many But Finite |  manybutfinite.com/
2020 | Stuff |  michajp.blogspot.com/
2019 | 1234n6 |  blog.1234n6.com/
2019 | BriMor Labs Blog |  brimorlabsblog.com/
2019 | dfir it! |  dfir.it/
2019 | DFIR on the Mountain |  dfironthemountain.wordpress.com/
2019 | Digital Forensics |  outlookpurple.blogspot.com/
2019 | Dlog |  dan3lmi.blogspot.pt/
2019 | Domagoj Babic |  domagoj-babic.com/index.php/Main/Publications
2019 | ForensicZone |  forensiczone.blogspot.com/
2019 | Forensium Blog |  f orensium.com/Web_log
2019 | Lab Of A Penetration Tester |  labofapenetrationtester.com/
2019 | No Secure Code |  nosecurecode.com/blog/
2019 | PacketLife |  packetlife.net/blog/
2019 | Red Rock Solutions Blog |  redrocktx.blogspot.com/
2019 | RRTX Blog |  redrocktx.blogspot.com/
2019 | SALT4N6 |  salt4n6.com/
2019 | Security EDC |  basilisksec.wordpress.com/
2019 | Technolawyer |  blog.technolawyer.com/
2019 | The Bug Charmer |  bugcharmer.blogspot.com/
2019 | Troy 4N6 |  troy4n6.blogspot.com/
2019 | Digital Forensics Stream |  df-stream.com
2019 | Ismael Valenzuela |  blog.ismaelvalenzuela.com/
2019 | Malware Battle |  malwarebattle.blogspot.com/
2019 | insecure |  blog.insecure.in/
2019 | StalkR Blog |  blog.stalkr.net/
2018 | Information Security Short Takes |  shortinfosec.net/
2018 | Malware Breakdown |  malwarebreakdown.com/
2018 | Brian Pennington Blog |  brianpennington.co.uk/
2018 | DanDoesDFIR blog |  dandoesdfir.blogspot.com/
2018 | Enterprise Detection and Response |  detect-respond.blogspot.com/
2018 | Forensic Blog |  forensics.spreitzenbarth.de/
2018 | Hal Pomeranz |  righteousit.wordpress.com/
2018 | http://seclist.us |  seclist.us/
2018 | "Integriography: A Journal of Broken Locks, Ethics, and Computer Forensics ", integriography.wordpress.com/
2018 | Inventor of NORA discusses privacy and all things digital |  jeffjonas.typepad.com/
2018 | Malware Analysis-Final Frontier |  malwageddon.blogspot.com/
2018 | Malware Jake |  malwarejake.blogspot.com/
2018 | Malware List |  malwarelist.net/
2018 | Malware.lu |  malware.lu/
2018 | Meridian Discovery |  meridiandiscovery.com/blog/
2018 | mobile phone forensics and mobile malware |  forensics.spreitzenbarth.de/
2018 | Nerdiosity Blog |  nerdiosity.com/blog
2018 | Phil Hagen |  stuffphilwrites.com/
2018 | Ponder the Bits |  ponderthebits.com/
2018 | Push the Red Button |  moyix.blogspot.com/
2018 | Raedts.Biz |  raedts.biz/
2018 | reflections |  reflections.my4n6.de/
2018 | Rekall Memory Forensics blog |  rekall-forensic.blogspot.com/
2018 | The Positronikal Chronikal |  thepositronikal.blogspot.com/
2018 | Malicious PDF Analysis |  securityforrealpeople.com
2018 | zforensic Blogspot |  zforensic.blogspot.com/
2018 | Security-Malware Blog |  artemonsecurity.blogspot.com/
2017 | AcidX |  acidx.net/wordpress
2017 | c-APT-ure Blog |  c-apt-ure.blogspot.com/
2017 | Christopher Truncer |  christophertruncer.com/
2017 | Command Line Kung Fu |  blog.commandlinekungfu.com/
2017 | CYB3RCRIM3 |  cyb3rcrim3.blogspot.com/
2017 | CyberSpeak's Podcast |  cyberspeak.libsyn.com/
2017 | DAFTHACK Blog |  dafthack.com/
2017 | Dan Kaminsky Blog |  dankaminsky.com/
2017 | Endarkenment |  c6i.blogspot.com/
2017 | JIIR Digital Forensics Google Search |  journeyintoir.blogspot.com/2011/04/introducing-digital-forensics-search.html
2017 | Jim Kesselring Blog |  404hack.blogspot.com/
2017 | Journey into Incident Response |  journeyintoir.blogspot.com/
2017 | My Infected Computer |  zairon.wordpress.com/
2017 | NerdWorks Blog |  blogorama.nerdworks.in/
2017 | Pingle Blog |  pingle.org/
2021 | Security |  scarybeastsecurity.blogspot.com/
2017 | What on Earth is hunting anyway? |  vector8.io/blog/what-is-hunting
2016 | Andrew Case Memory Forensics Blog |  memoryforensics.blogspot.com/
2017 | computer-forensik.org |  computer-forensik.org/
2016 | Thomas Chopitea Blog |  tomchop.me/
2016 | 4n6tacohut |  4n6tacohut.blogspot.com/
2016 | Conexión inversa |  conexioninversa.blogspot.com/
2016 | Cyb3rsleuth Blog |  cyb3rsleuth.blogspot.com/
2016 | Faraday Security |  blog.nibblesec.org/
2016 | Forensically sound(ing off) |  marshalla99.wordpress.com/
2016 | Forensic-Proof |  forensic-proof.com/
2016 | JL stuff |  gleeda.blogspot.com/
2021 | Prowling-NSM Foo |  blog.prowling.nu/
2016 | SaneSecurity ClamAV Blog |  sanesecurity.blogspot.co.uk/
2016 | the world. according to koto |  blog.kotowicz.net/
2016 | siri-urz |  siri-urz.blogspot.com/
2016 | slight paranoia |  paranoia.dubfire.net/
2016 | TekDefense |  tekdefense.com/downloads/malware-samples
2016 | Terminally Incoherent |  terminally-incoherent.com/blog
2016 | ThemBits Blog |  thembits.blogspot.com/
2016 | XyliBox |  xylibox.com/
2015 | 1 Raindrop |  1raindrop.typepad.com/1_raindrop
2015 | Chris John Riley |  blog.c22.cc/
2015 | Delusions of Grandeur NetSec Blog |  delogrand.blogspot.com/
2015 | Fast Horizon |  fasthorizon.blogspot.com/
2015 | Jamaal Speights-devblog |  jamaaldev.blogspot.com/
2015 | Moxie Marlinspike Blog |  thoughtcrime.org/blog
2015 | RAM Slack |  ramslack.wordpress.com/
2015 | Takahiro Haruyama |  takahiroharuyama.github.io/
2015 | The Invisible Things Lab blog |  theinvisiblethings.blogspot.com/
2015 | Xsp!d3r Junkyard |  xspid3r.blogspot.com/
2014 | Boredliner |  boredliner.wordpress.com/
2014 | Code Zen Blog |  codezen.fr/
2014 | Dave Schwartzberg Power Notes |  dschwartzberg.wordpress.com/
2014 | Digital Forensics Notes |  digfor.blogspot.com/
2014 | Ensourced |  ensourced.wordpress.com/
2014 | Forensecurity Blog |  forensecurity.blogspot.com/
2014 | Forensicaliente |  forensicaliente.blogspot.com/
2014 | Forensics from the sausage factory |  forensicsfromthesausagefactory.blogspot.com/
2014 | Free%20Virus%20Removal |  myvirusremoval.wordpress.com/
2014 | GDTR |  gdtr.wordpress.com/
2014 | Google Glass Forensics Blog |  desautelsja.blogspot.com/
2014 | Hidden Illusion Blog |  hiddenillusion.blogspot.com/
2014 | Mobile Forensics |  mobileforensics.wordpress.com/
2014 | mossmann blog |  ossmann.blogspot.com/
2014 | NullconCTF2014 |  sourceforge.net/projects/nullconctf2014/
2014 | Parry Aftab Blog |  parryaftab.blogspot.com/
2014 | Scudette in Wonderland |  s cudette.blogspot.com/
2014 | The Wall of Shame |  hfwallofshame.blogspot.com/
2014 | Wyatt Roersma Blog |  wyattroersma.com/
2014 | Various Authors - Intrusions and Malware Analysis |  intrusions.blogspot.com/
2013 | 8 bits |  stam.blogs.com/8bits/
2013 | Forensics with Fowler |  forensicswithfowler.blogspot.com/
2013 | MNIN Security Blog |  mnin.blogspot.com/
2013 | Named Plume |  namedeplume.blogspot.com/
2013 | Open Source Security Tools |  ossectools.blogspot.com/
2013 | Privacy Think-A Stephen Cobb Blog |  privacythink.blogspot.com/
2013 | Reversing Malware |  internetopenurla.blogspot.com/
2013 | Rich Harman |  warewolf.github.io/
2013 | Security Research by Dan Rosenberg |  vulnfactory.org/blog
2013 | SemperSecurus |  sempersecurus.blogspot.com/
2013 | Strangely Relevant |  strangelyrelevant.blogspot.com/
2013 | Tojo Walls |  tojoswalls.blogspot.com/
2013 | Tracking CyberCrime | trackingcybercrime.blogspot.com/
2013 | websecnoob |  websecnoob.wordpress.com/
2012 | A Renaissance Security Professional |  renaissancesecurity.blogspot.com/
2012 | Active Security |  active-security.blogspot.com/    
2012 | Anti-Malware Assistant |  anti-malware-assistant.blogspot.com/
2012 | Derek Newton |  dereknewton.com/
2012 | dont blink |  gutterchurl.blogspot.com/
2012 | Dr. Fu Security Blog |  fumalwareanalysis.blogspot.com/
2012 | Geoff Black Forensic Gremlins |  geoffblack.com/
2012 | HandlerDiaries |  handlerdiaries.blogspot.com/
2012 | J.Michael Roberts |  forensication.com/
2012 | Malware Disasters Team |  malwaredisasters.blogspot.com/
2012 | Malware Intelligence |  malwareint.blogspot.com/
2012 | Offensive Infosec Blog |  offensiveinfosec.wordpress.com/
2012 | SecureArtisan Blog |  secureartisan.wordpress.com/
2012 | Windows Sleuthing |  lowcostwin4n6.blogspot.com.au/
2011 | deforensics |  deforensics.blogspot.com/
2011 | Forensic Incident Response |  forensicir.blogspot.com/
2011 | Incident Analyzer |  incidentanalyser.blogspot.com/
2011 | Malware Analyzer |  malwareanalyser.blogspot.com/
2011 | Malware and Security |  malwareandsecurity.blogspot.com/
2011 | My Stupid Forensic Blog |  marksforensicblog.wordpress.com/
2011 | PenTest Monkey |  pentestmonkey | Taking the monkey work out of pentesting
2011 | RCE Lab |  rcelab.wordpress.com/
2011 | Security Intelligence |  SecurityIntelligence. A division of Malware Intelligence
2010 | Computer Forensics Blog |  forensicblog.org/
2010 | forensic . seccure . net
2010 | Securityfu |  securityfu.blogspot.com/
2009 | Computer Forensics E-Discovery Tips Tricks and Information |  cfed-ttf.blogspot.com/
2009 | Volatile Systems |  volatilesystems.blogspot.com/
2008 | Henri Becker |  henrikbecker.blogspot.com/ 
2007 | forenshick |  forenshick.blogspot.com/