Track Awesome Cybersecurity Blueteam Updates Daily

:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.

🏠 Home · 🔍 Search · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor · 😺 fabacab/awesome-cybersecurity-blueteam · ⭐ 2.9K · 🏷️ Security

[ Daily / Weekly / Overview ]

Dec 22, 2022

Host-based tools / Tarpits

Dec 16, 2022

Security monitoring / Network Security Monitoring (NSM)

Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)

Sep 28, 2022

Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)

Sep 14, 2022

DevSecOps / Policy enforcement

Aug 11, 2022

Preparedness training and wargaming / Firewall appliances or distributions

May 16, 2022

DevSecOps / Service meshes

May 09, 2022

DevSecOps / Dependency confusion

Threat intelligence / Fingerprinting

Mar 30, 2022

Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)

Feb 26, 2022

Security monitoring / Firewall appliances or distributions

Feb 10, 2022

Cloud platform security / Kubernetes

Feb 05, 2022

Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)

Jan 13, 2022

Preparedness training and wargaming / Firewall appliances or distributions

Nov 28, 2021

Honeypots / Supply chain security

Preparedness training and wargaming / Firewall appliances or distributions

Windows-based defenses / Overlay and Virtual Private Networks (VPNs)

Nov 27, 2021

Windows-based defenses / Active Directory

Nov 13, 2021

DevSecOps / Dependency confusion

Oct 28, 2021

Cloud platform security / Security Orchestration, Automation, and Response (SOAR)

Oct 12, 2021

DevSecOps / Supply chain security

Sep 18, 2021

Identity and AuthN/AuthZ / Sandboxes

Aug 14, 2021

DevSecOps / Policy enforcement

Aug 06, 2021

Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)

Aug 02, 2021

Preparedness training and wargaming / Firewall appliances or distributions

Jun 11, 2021

Threat intelligence / Threat hunting

May 22, 2021

DevSecOps / Policy enforcement

May 18, 2021

DevSecOps / Supply chain security

May 15, 2021

DevSecOps / Service meshes

May 09, 2021

Communications security (COMSEC) / Service meshes

May 04, 2021

Cloud platform security / Kubernetes

Apr 26, 2021

DevSecOps / Policy enforcement

Apr 11, 2021

Cloud platform security / Distributed monitoring

Apr 10, 2021

Cloud platform security / Distributed monitoring

Cloud platform security / Kubernetes

Apr 04, 2021

Network perimeter defenses / Firewall appliances or distributions

Mar 29, 2021

Cloud platform security / Distributed monitoring

Cloud platform security / Kubernetes

Cloud platform security / Service meshes

Mar 27, 2021

Cloud platform security / Kubernetes

Communications security (COMSEC) / Service meshes

Operating System distributions / Firewall appliances or distributions

Mar 16, 2021

Host-based tools / Sandboxes

Mar 14, 2021

Threat intelligence / Threat signature packages and collections

Mar 06, 2021

Host-based tools / Sandboxes

Feb 06, 2021

Cloud platform security / Kubernetes

Threat intelligence / Threat hunting

Jan 01, 2021

Security configurations / Firewall appliances or distributions

Dec 14, 2020

Threat intelligence / Threat signature packages and collections

Dec 12, 2020

DevSecOps / Fuzzing

Dec 09, 2020

Threat intelligence / Threat signature packages and collections

Dec 06, 2020

Preparedness training and wargaming / Firewall appliances or distributions

Threat intelligence / Threat hunting

Nov 13, 2020

macOS-based defenses / Overlay and Virtual Private Networks (VPNs)

Oct 25, 2020

Automation

Oct 11, 2020

Threat intelligence / Threat hunting

Sep 19, 2020

DevSecOps / Fuzzing

Sep 16, 2020

Automation

Aug 14, 2020

DevSecOps / Service meshes

Aug 13, 2020

Communications security (COMSEC) / Service meshes

Aug 11, 2020

DevSecOps / Compliance testing and reporting

Jul 28, 2020

DevSecOps / Application or Binary Hardening

Jul 15, 2020

Cloud platform security / Security Orchestration, Automation, and Response (SOAR)

Security monitoring / Network Security Monitoring (NSM)

Jul 14, 2020

DevSecOps / Service meshes

Jun 24, 2020

Network perimeter defenses / Evidence collection

Jun 21, 2020

Incident Response tools / Sandboxes

Security monitoring / Network Security Monitoring (NSM)

Jun 18, 2020

Automation

Automation / Security Orchestration, Automation, and Response (SOAR)

Jun 08, 2020

Security monitoring / Network Security Monitoring (NSM)

Security monitoring / Service and performance monitoring

May 29, 2020

Cloud platform security / Security Orchestration, Automation, and Response (SOAR)

May 11, 2020

macOS-based defenses / Overlay and Virtual Private Networks (VPNs)

Apr 23, 2020

Windows-based defenses / Overlay and Virtual Private Networks (VPNs)

Apr 19, 2020

DevSecOps / Service meshes

DevSecOps / Fuzzing

Apr 15, 2020

Threat intelligence / Threat hunting

Apr 06, 2020

DevSecOps / Service meshes

Apr 02, 2020

Security monitoring / Network Security Monitoring (NSM)

Mar 26, 2020

Host-based tools / Tarpits

Security monitoring / Endpoint Detection and Response (EDR)

Security monitoring / Network Security Monitoring (NSM)

Security monitoring / Threat hunting

Mar 16, 2020

Automation

DevSecOps / Policy enforcement

Feb 26, 2020

DevSecOps / Service meshes

Feb 18, 2020

DevSecOps / Application or Binary Hardening

Feb 10, 2020

Network perimeter defenses / Evidence collection

Nov 21, 2019

Honeypots / Supply chain security

Nov 06, 2019

Phishing awareness and reporting / Firewall appliances or distributions

Nov 05, 2019

Cloud platform security / Security Orchestration, Automation, and Response (SOAR)

Phishing awareness and reporting / Firewall appliances or distributions

Nov 04, 2019

Phishing awareness and reporting / Firewall appliances or distributions

Sep 24, 2019

Phishing awareness and reporting / Firewall appliances or distributions

Aug 06, 2019

Automation

Aug 05, 2019

Automation / Code libraries and bindings

Security monitoring / Service and performance monitoring

Jul 29, 2019

macOS-based defenses / Overlay and Virtual Private Networks (VPNs)

Jul 27, 2019

Phishing awareness and reporting / Firewall appliances or distributions

Jul 13, 2019

Incident Response tools / IR management consoles

Jul 11, 2019

Automation

Jun 13, 2019

Host-based tools / Tarpits

Host-based tools / Sandboxes

Jun 06, 2019

Incident Response tools / Evidence collection

May 05, 2019

DevSecOps / Service meshes

Mar 31, 2019

Honeypots / Tarpits

Mar 19, 2019

Transport-layer defenses / Threat signature packages and collections

Mar 16, 2019

Automation / Code libraries and bindings

Mar 11, 2019

Windows-based defenses / Overlay and Virtual Private Networks (VPNs)

Mar 08, 2019

Communications security (COMSEC) / Service meshes

Feb 26, 2019

Host-based tools / Tarpits

Jan 01, 2019

DevSecOps / Service meshes

Transport-layer defenses / Threat signature packages and collections

Nov 16, 2018

DevSecOps / Service meshes

Aug 29, 2018

Automation / Code libraries and bindings

Threat intelligence / Threat hunting

Aug 22, 2018

Incident Response tools / Sandboxes

Incident Response tools / Evidence collection

Aug 21, 2018

DevSecOps / Service meshes

Aug 10, 2018

Host-based tools / Tarpits

Aug 06, 2018

Host-based tools / Tarpits

Incident Response tools / IR management consoles

Incident Response tools / Evidence collection

Operating System distributions / Firewall appliances or distributions

Preparedness training and wargaming / Firewall appliances or distributions

Threat intelligence / Threat hunting

Transport-layer defenses / Threat signature packages and collections

Windows-based defenses / Overlay and Virtual Private Networks (VPNs)

Aug 05, 2018

Automation / Code libraries and bindings

Incident Response tools / IR management consoles

Security monitoring / Service and performance monitoring

Threat intelligence / Threat hunting

Windows-based defenses / Overlay and Virtual Private Networks (VPNs)

Jul 31, 2018

Honeypots / Supply chain security

Host-based tools / Tarpits

Preparedness training and wargaming / Firewall appliances or distributions

Tor Onion service defenses / Threat signature packages and collections

Windows-based defenses / Overlay and Virtual Private Networks (VPNs)

Jul 27, 2018

Threat intelligence / Threat hunting

Jul 26, 2018

Threat intelligence / Threat hunting

Jul 25, 2018

Security monitoring / Service and performance monitoring

Jul 23, 2018

Network perimeter defenses / Evidence collection

Security monitoring / Security Information and Event Management (SIEM)