-=[How do i do my technological watch ?]=-
The only social network I use to do my Technology Watch is Twitter. Nothing more effective than to keep up to date with the latest news from the world of the latest Physical or Online CTFs.
For my part, I use Twitter in two ways:
Either with TweetDeck. Either with the official app.
On TweetDeck, you can group #hastag and/or users into lists.
I use a list of hashtag #security and #cyberdefense and #cybersecurity. As well as a list of tweeting accounts the latest CVEs @CERT_FR, @ExploitDB, @inj3ct0r
But knowing that I spend a lot more time on my phone to do my standby, so I mainly use the mobile application. I recommend to follow:
1@Cyber_Veille 2@yeswehack 3@Snowden 4@offsectraining 5@defcon 6@nolimitsecu 7@comptoirsecu 8@TheHackersNews 9@Hack5 10@three_cube 11@RachelTobac 12@HydeNS33k 13@binitamshah 14@x0rz 15@nixcraft 16@estefanniegg 17@CERT_FR 18@Ogma_Sec 19@owasp 20@hasherezade 21@0xmitsurugi 22@Sh0ckFR 23@qingxp9 24@intellipus 25@Fumik0_ 26@Europol
That’s a good start. There is both technical and non-technical content.
For a monitoring gathering papers from the media and not from researchers or of students, I use Feedly. An account is required, and the free version is more than enough for me.
Feedly is synchronized between your devices.
I find this tool very effective because it allows to remove duplicates, it has also lists to look at later. We can group our RSS feeds under different categories. I’m trying to get as many different sources as possible. I group this under 5 categories: Cybersecurity, Hacking, IT, Politics, Writeups.
As for the monitoring for ctfs, I recommend you:
1lambdhack- @lambdhack personal blog 2BinaryLabs - @Tomtombinary Personal Blog - CTF and InfoSec oriented papers 3low level. 4BitsDeep - @ENOENT Personal Blog - CTF and InfoSec papers oriented low level 5and cryptography. 6Haax - Haax.fr 7HacknDo - beta.hackndo.com
Saucs is a tool developed by Nicolas Crocfer aka @ncrocfer. It allows you to aggregate the latest CVEs discovered by choosing the type of technology on which they apply (These vulnerabilities can be sorted by different attributes such as the score or the version of the technology for example).
The site is available on saucs.com Saucs has an API that is still in progress of evolution as I write this article.
1I also wanted to share with you these few channels that deal with 2computer security: 3- STOK 4- Michael Reeves 5- LockPicking Lawyer 6- LiverOverflow 7- HACK2G2