Resources

Category Title Description
Articles Google's $5,000 Error Page A researcher stumbled upon an internal Google 404 page that showed extra debug information. He submitted it to Google's bug bounty program and received $5,000 for it.
Articles Krebs on Security Brian Krebs is a journalist and investigative reporter that focuses on the cybersecurity sector. He does writeups on the latest attacks, malware, and vulnerabilities.
Articles UGA named National Center of Academic Excellence in Cyber Defense Research The University of Georgia has been named a National Center of Academic Excellence in Cyber Defense Research, a designation that underscores the role the university plays in advancing technology, policy and practices that strengthen America's cyber defense capabilities.
Articles Microsoft TechNet Security Blog Security information, news, intelligence, and next-gen security technologies from Microsoft
Articles Ships fooled in GPS spoofing attack suggest Russian cyberweapon Reports of satellite navigation problems in the Black Sea suggest that Russia may be testing a new system for spoofing GPS.
Articles GBM 3 Data Privacy This is the powerpoint from the March 28th, 2018 meeting.
Articles How to protect against identity theft An easy 6 steps to help guard against identity theft in small businesses.
News WannaCry Ransomware WannaCry encrypted and locked down over 300,000 computers in over 150 countries in a matter of two days. However, it was simply stopped by registering a domain name.
News The Cyber Wire Daily cybersecurity briefings
News Security Now Weekly cybersecurity podcast, fairly in-depth, with a focus on current topics
Other National Cyber League The NCL is a 501(c)(3) non-profit founded in May 2011 to provide an ongoing virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills using next-generation high-fidelity simulation environments.
Other National Collegiate Cyber Defense Competition The mission of the Collegiate Cyber Defense Competition (CCDC) system is to provide institutions with an information assurance or computer security curriculum a controlled, competitive environment to assess their student's depth of understanding and operational competency in managing the challenges inherent in protecting a corporate network infrastructure and business information systems.
Other Security Roles Definitions Security Roles Definitions
Other Recommended Readings for Security Topics For learning topics within computer security, digital forensics, incident response, malware analysis, and reverse engineering, and other related topics.
Other Southern Fried Security Podcast A podcast that takes multiple point of views including, a consultant, pen-tester, security architect, and more and they take various topics and have casual but informed conversations on it. Very good podcast for a more chill security learning experience.
Tutorials CyberSecurityChallenge This website has a pretty broad list of different cyber security topics along with quizzes and games you can play related to each of those. There are easy/medium/hard difficulties but they look to be more catered towards field experts.
Tutorials Cybrary Cybrary provides free and open-source cyber security training, certifications, and courses.
Tutorials Malware Analysis - Learning How To Reverse Malware: A collection of guides and tools Malware Analysis Resources
Tutorials Printer Exploit code by Jens Muller This is the repository for the code mentioned at our first GBM.
Videos Exploiting Network Printers - Blackhat 2017 A Blackhat 2017 presentation on the art of exploiting printers.

If you wish to submit a new link, log in to your account and then click "Submit Resource" under the profile tab. We welcome all submissions!