Skip to content

Commit a3e848d

Browse files
committed
Update index.html
1 parent dc000e4 commit a3e848d

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

β€Žindex.htmlβ€Ž

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -127,26 +127,26 @@ <h2>πŸ“ˆ Curtis' Security Dashboard</h2>
127127
<section>
128128
<h2>My Top 20 Cybersecurity CVE Alert & Threat Intelligence Self Study & Update Repos</h2>
129129
<ul>
130-
<li><a href="https://otx.alienvault.com/browse/global/pulses?include_inactive=0&sort=-modified&page=1&limit=1000" target="_blank">AlienVault OTX</a></li>
131-
<li><a href="https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&search_type=all&isCpeNameSearch=false" target="_blank">NIST National Vulnerability Database (NVD)</a></li>
132-
<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank">CISA KEV Catalog</a></li>
133-
<li><a href="https://www.exploit-db.com/" target="_blank">Exploit Database</a></li>
134-
<li><a href="https://www.rapid7.com/db/" target="_blank">Rapid7 Vulnerability DB</a></li>
135-
<li><a href="https://packetstormsecurity.com/" target="_blank">Packet Storm Security</a></li>
136-
<li><a href="https://www.cve.org/" target="_blank">CVE.org (MITRE)</a></li>
137-
<li><a href="https://security-tracker.debian.org/" target="_blank">Debian Security Tracker</a></li>
138-
<li><a href="https://security.snyk.io/" target="_blank">Snyk Vulnerability DB</a></li>
139-
<li><a href="https://attack.mitre.org/" target="_blank">MITRE ATT&CK Framework</a></li>
140-
<li><a href="https://www.zerodayinitiative.com/advisories/published/" target="_blank">Zero Day Initiative</a></li>
141-
<li><a href="https://redcanary.com/threat-detection-report/" target="_blank">Red Canary Threat Detection Report</a></li>
142-
<li><a href="https://threatpost.com/" target="_blank">ThreatPost</a></li>
143-
<li><a href="https://www.recordedfuture.com/threat-intelligence" target="_blank">Recorded Future</a></li>
144-
<li><a href="https://www.fireeye.com/current-threats.html" target="_blank">Mandiant Threat Intelligence</a></li>
145-
<li><a href="https://www.trendmicro.com/vinfo/us/security/news/vulnerability" target="_blank">Trend Micro Security News</a></li>
146-
<li><a href="https://security.googleblog.com/" target="_blank">Google Security Blog</a></li>
147-
<li><a href="https://kb.cert.org/vuls/" target="_blank">CERT Vulnerability Notes</a></li>
148-
<li><a href="https://community.qualys.com/community/vulnerabilities" target="_blank">Qualys Vulnerability Alerts</a></li>
149-
<li><a href="https://www.tenable.com/security/research" target="_blank">Tenable Security Advisories</a></li>
130+
<li><a href="https://otx.alienvault.com/browse/global/pulses?include_inactive=0&sort=-modified&page=1&limit=1000" target="_blank">AlienVault OTX πŸ‘½</a></li>
131+
<li><a href="https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&search_type=all&isCpeNameSearch=false" target="_blank">NIST National Vulnerability Database (NVD) 🌐</a></li>
132+
<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank">CISA KEV Catalog πŸ’‘a></li>
133+
<li><a href="https://www.exploit-db.com/" target="_blank">Exploit Database πŸ’Ώ</a></li>
134+
<li><a href="https://www.rapid7.com/db/" target="_blank">Rapid7 Vulnerability DB 7 ️⃣</a></li>
135+
<li><a href="https://packetstormsecurity.com/" target="_blank">Packet Storm Security πŸ”±</a></li>
136+
<li><a href="https://www.cve.org/" target="_blank">CVE.org (MITRE) πŸ›‘</a></li>
137+
<li><a href="https://security-tracker.debian.org/" target="_blank">Debian Security Tracker πŸš₯</a></li>
138+
<li><a href="https://security.snyk.io/" target="_blank">Snyk Vulnerability DB πŸ•β€πŸ¦Ί</a></li>
139+
<li><a href="https://attack.mitre.org/" target="_blank">MITRE ATT&CK Framework πŸ–Ό</a></li>
140+
<li><a href="https://www.zerodayinitiative.com/advisories/published/" target="_blank">Zero Day Initiative 0️⃣</a></li>
141+
<li><a href="https://redcanary.com/threat-detection-report/" target="_blank">Red Canary Threat Detection Report ♦</a></li>
142+
<li><a href="https://threatpost.com/" target="_blank">ThreatPost πŸ“«</a></li>
143+
<li><a href="https://www.recordedfuture.com/threat-intelligence" target="_blank">Recorded Future ⏺</a></li>
144+
<li><a href="https://www.fireeye.com/current-threats.html" target="_blank">Mandiant Threat Intelligence πŸ“²</a></li>
145+
<li><a href="https://www.trendmicro.com/vinfo/us/security/news/vulnerability" target="_blank">Trend Micro Security News πŸ“°</a></li>
146+
<li><a href="https://security.googleblog.com/" target="_blank">Google Security Blog 🌈</a></li>
147+
<li><a href="https://kb.cert.org/vuls/" target="_blank">CERT Vulnerability Notes πŸ“</a></li>
148+
<li><a href="https://community.qualys.com/community/vulnerabilities" target="_blank">Qualys Vulnerability Alerts ⚠</a></li>
149+
<li><a href="https://www.tenable.com/security/research" target="_blank">Tenable Security Advisories ☣</a></li>
150150
</ul>
151151
<p style="font-style: italic; font-size: 0.9em;">Compiled by Curtis Jones, Msc, CISSP, OSCP, MSCA, GIAC, πŸ”΄πŸ”΅πŸŸ£ Team - Blactec Cyber Threat Monitoring Resources <li><a href="https://blactec.biz/" target="_blank">Blactec</a></li></p>
152152
</section>

0 commit comments

Comments
Β (0)