初衷

援引:[THM]Red Team Threat Intel(红队威胁情报)-红队

受此启发 决心搭建一个有用的威胁情报狩猎机制,用于接轨日新月异的网络对抗生态

同时也是拓宽自己的选择吧 除了日站之外 一定还有能激发自己兴趣的 愿意一直做下去的内容 想跳出舒适圈接触一些更新的东西

会持续更新的 慢慢添加一些感兴趣的 有价值的内容

image-20250823210730017

RSS

APT 与威胁情报类 RSS

1
2
3
4
5
6
7
8
9
10
11
https://securelist.com/feed/                    # Kaspersky Securelist(APT研究密集)。来源见Securelist与ThreatConnect汇总。 :contentReference[oaicite:0]{index=0}
https://blog.google/threat-analysis-group/rss # Google TAG(国家级威胁/0day生态)。来源见Google与汇总。 :contentReference[oaicite:1]{index=1}
https://cloudblog.withgoogle.com/topics/threat-intelligence/rss # Google Cloud/Mandiant TI专栏。 :contentReference[oaicite:2]{index=2}
https://www.mandiant.com/resources/blog/rss.xml # Mandiant 博客RSS(APT/入侵链深度)。 :contentReference[oaicite:3]{index=3}
https://www.microsoft.com/security/blog/feed/ # Microsoft Secure(APT、云身份、企业级漏洞)。 :contentReference[oaicite:4]{index=4}
https://msrc.microsoft.com/blog/feed/ # MSRC(微软产品安全通告/深度分析)。 :contentReference[oaicite:5]{index=5}
https://www.welivesecurity.com/feed/ # ESET WeLiveSecurity(APT与恶意代码调查)。 :contentReference[oaicite:6]{index=6}
https://unit42.paloaltonetworks.com/feed/ # Palo Alto Networks Unit 42(APT/入侵面趋势)。*若客户端无法发现,可退订用主站博客feed*。 :contentReference[oaicite:7]{index=7}
https://blog.talosintelligence.com/feeds/posts/default?alt=rss # Cisco Talos(威胁情报/漏洞利用追踪)。 :contentReference[oaicite:8]{index=8}
https://www.proofpoint.com/us/rss-feeds/blog-feed.xml # Proofpoint Threat Insight(鱼叉与TA家族)。 :contentReference[oaicite:9]{index=9}

漏洞/预警类 RSS(高危、被利用优先)

1
2
3
4
5
https://www.cisa.gov/cybersecurity-advisories/ics-advisories.xml         # CISA 工控ICS通告(全球影响力高)。 :contentReference[oaicite:10]{index=10}
https://www.cisa.gov/cybersecurity-advisories/ics-medical-advisories.xml # CISA 医疗ICS通告。 :contentReference[oaicite:11]{index=11}
https://isc.sans.edu/rssfeed_full.xml # SANS Internet Storm Center(热点威胁/在野利用观测)。 :contentReference[oaicite:12]{index=12}
https://github.com/CryptoGenNepal/CVE-KEV-RSS # 社区维护的“CISA KEV” RSS镜像(官方KEV现偏向邮件推送,此处替代)。 :contentReference[oaicite:13]{index=13}

补充说明(别被坑):

  • CISA KEV官方近月调整了更新机制,官方RSS时好时坏,更稳的是邮箱/GovDelivery;上面给的是社区可靠镜像以便自动化使用
  • NVD当前主推 JSON 数据源(不是RSS)。做自动化筛选(CVSS≥9/含“exploited”标签)请走其数据/接口。

SubReddit

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
https://www.reddit.com/r/cybersecurity/
https://www.reddit.com/r/netsec/
https://www.reddit.com/r/hacking/
https://www.reddit.com/r/crypto/
https://www.reddit.com/r/AskNetsec/
https://www.reddit.com/r/Information_Security/
https://www.reddit.com/r/Malware/
https://www.reddit.com/r/ReverseEngineering/
https://www.reddit.com/r/Pentesting/
https://www.reddit.com/r/cyber_security/
https://www.reddit.com/r/CyberSecurityAdvice/
https://www.reddit.com/r/ComputerSecurity/
https://www.reddit.com/r/SecurityAnalysis/
https://www.reddit.com/r/netsecstudents/
https://www.reddit.com/r/threatintel/
https://www.reddit.com/r/blueteamsec/
https://www.reddit.com/r/redteamsec/
https://www.reddit.com/r/SCADA/
https://www.reddit.com/r/digitalforensics/
https://www.reddit.com/r/phishing/
https://www.reddit.com/r/WindowsSecurity/
https://www.reddit.com/r/macOSsecurity/
https://www.reddit.com/r/Android_Security/
https://www.reddit.com/r/chromeos/
https://www.reddit.com/r/OSINT/
https://www.reddit.com/r/Cybersecurity101/
https://www.reddit.com/r/Hacking_Tutorials/
https://www.reddit.com/r/CyberSecurityJobs/
https://www.reddit.com/r/CybersecurityMemes/

安全研究员

1
2
3
4
5
6
7
8
9
10
11
12
https://adsecurity.org/
https://blog.harmj0y.net/
https://enigma0x3.net/
https://doublepulsar.com/
https://github.com/gentilkiwi
https://lock.cmpxchg8b.com/
https://doublepulsar.com/
https://www.schneier.com/
https://danielmiessler.com/
https://blog.harmj0y.net/
https://itm4n.github.io/
https://9bie.org/

较为完善的系列

1
2
3
https://y4er.com/
https://3gstudent.github.io/
https://www.outflank.nl/blog/

本站由 Satoru 使用 Stellar 主题创建。
本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议,转载请注明出处。