- http://blogs.adobe.com/psirt/
- http://anti-virus-rants.blogspot.com/
- http://asert.arbornetworks.com/
- http://blog.avast.com/
- http://www.blackbag.nl/
- http://www.bunniestudios.com/wordpress/
- http://cansecwest.com/
- http://carnal0wnage.attackresearch.com/
- http://www.cerias.purdue.edu/site/blog
- http://cerias.purdue.edu/site/blog/author/spaf
- http://blogs.cisco.com/security
- http://blog.clamav.net/
- http://blog.commandlinekungfu.com/
- http://computer.forensikblog.de/en/
- http://www.cryptogon.com/
- http://www.cryptome.org/
- http://www.cutawaysecurity.com/blog/
- http://cyb3rcrim3.blogspot.com/
- http://garwarner.blogspot.com/
- http://cyberspeak.libsyn.com/
- http://ddanchev.blogspot.com/
- http://darknet.org.uk/
- http://darkreading.com/
- http://www.thedarkvisitor.com/
- http://blog.didierstevens.com/
- http://digfor.blogspot.com/
- http://edsmiley.com/
- http://emergentchaos.com/
- http://blog.emsisoft.com/
- http://blog.eset.com/
- http://fasthorizon.blogspot.com/
- http://www.financialcryptography.com/
- http://blog.fireeye.com/research
- http://www.forensickb.com/
- http://fraudwar.blogspot.com/
- http://www.f-secure.com/weblog
- http://blog.oxff.net/
- http://gleeda.blogspot.com/
- http://googleonlinesecurity.blogspot.com/
- http://www.sophos.com/blogs/gc
- http://grandstreamdreams.blogspot.com/
- http://www.hackaday.com/
- http://ha.ckers.org/blog
- http://www.hexblog.com/
- http://holisticinfosec.blogspot.com/
- http://honeyblog.org/
- http://www.h-online.com/security/
- http://blogs.iss.net/
- http://invisiblethings.org/
- http://theinvisiblethings.blogspot.com/
- http://jeremiahgrossman.blogspot.com/
- http://krebsonsecurity.com/
- http://www.l0t3k.org/en/
- http://blog.layeredsec.com/
- http://www.lightbluetouchpaper.org/
- http://blog.trendmicro.com/
- http://www.malwaredomainlist.com/
- http://chargen.matasano.com/
- http://www.avertlabs.com/research/blog/
- http://blog.metasploit.com/
- http://blogs.technet.com/mmpc/default.aspx
- http://securityincite.com/blog/mike-rothman
- http://www.milw0rm.com/
- http://blog.mandiant.com/
- http://www.offensivecomputing.net/
- http://www.offensive-security.com/blog/
- http://www.openrce.org/articles/
- http://www.packetstormsecurity.org/
- http://philosecurity.org/
- http://praetorianprefect.com/
- http://www.prevx.com/blog.asp
- http://pseudo-flaw.net/log/
- http://www.rationalsurvivability.com/blog/
- http://rdist.root.org/
- http://blogs.sans.org/
- https://blogs.sans.org/computer-forensics/
- http://www.schneier.com/blog
- http://blog.zoller.lu/
- http://www.fas.org/blog/secrecy/
- http://www.secsocial.com/blog/
- http://secunia.com/advisories/
- http://www.securelist.com/en/weblog
- http://blogs.securiteam.com/
- http://blog.security4all.be/
- http://securosis.com/blog
- http://www.shmoocon.org/
- http://www.shmoo.com/news/
- http://blog.snort.org/
- http://blog.stopbadware.org/
- http://sunbeltblog.blogspot.com/
- http://www.symantec.com/business/security_response/weblog/
- http://taosecurity.blogspot.com/
- http://www.teamfurry.com/wordpress/
- http://blogs.technet.com/msrc/
- http://blog.threatexpert.com/
- http://threatpost.com/
- http://blog.tsa.gov/
- http://blog.uncommonsensesecurity.com/
- http://volatility.tumblr.com/
- http://securitylabs.websense.com/
- http://windowsir.blogspot.com/
- http://www.wired.com/threatlevel/
- http://blogs.zdnet.com/security/
- http://blog.zynamics.com/
- http://www.afcea.org/signal/signalscape/
- http://dhs-daily-report.blogspot.com/
- https://blog.torproject.org/
- http://www.securitywire.com/
- http://pauldotcom.com/
- http://www.exploit-db.com/
- http://www.networkworld.com/topics/security.html
- http://www.acunetix.com/blog/
- http://www.allspammedup.com/
- http://www.gfi.com/blog/
- http://www.infosecblog.org/
- http://www.techrepublic.com/blog/security
- http://www.theemailadmin.com/
- http://www.theregister.co.uk/security/
- http://seclists.org/
- http://www.afcea.org/signal/signalscape/
- http://www.woodmann.com/forum/blog.php
- http://www.nsa.gov/
- http://blogs.technet.com/b/sysinternals/
- http://www.securityweek.com/
- http://superantispyware.com/blog/
- http://www.securitytracker.com/
- http://spyblog.org.uk/
- http://www.net-security.org/
- http://news.cnet.com/security
- http://www.fas.org/blog/ssp/
- http://cryptocomb.org/
- http://anonymous.livelyblog.com/
- https://trac.torproject.org/projects/tor/wiki
- http://www.security-ray.com/
- http://ticklethewire.com/
- http://vulnfactory.org/blog/
- https://psal.cs.drexel.edu/index.php/Main_Page
- http://www.pgpboard.com/
- https://yorkporc.wordpress.com/
- http://www.catonmat.net/
- http://www.heinz.cmu.edu/~acquisti/shb/participants.htm
- http://www.cyberciti.biz/
- http://www.omgubuntu.co.uk/
- http://www.ledge.co.za/software/lpinotes/
- http://inciweb.org/
- https://www.ibm.com/developerworks/linux/
- https://www.ibm.com/developerworks/topics/
- https://www.ibm.com/developerworks/
- https://www.ibm.com/developerworks/aix/library/
- http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
- http://www.hackinglinuxexposed.com/articles/
- http://dankaminsky.com/
- http://blog.bodhizazen.net/
- http://askubuntu.com/
- Freedom Box: http://wiki.debian.org/freedombox
- http://blogs.pcmag.com/securitywatch/
- http://labs.m86security.com/
- http://www.irongeek.com/
- http://rijmenants.blogspot.com/
- http://blog.webroot.com/
- http://crypto.stanford.edu/
- https://ssd.eff.org/
- http://publicintelligence.net/
- http://www.wikileaks.org/
- http://www.itstactical.com/
- http://www.forensicswiki.org/
- http://p4r4n0id.com/
The list came from Cryptome. I had a great many of the sites bookmarked already, but can not take credit for compiling the entire thing. Would have mentioned this sooner, but find it bothersome linking to the same site repeatedly.