The Best Articles in Cybersecurity
The most useful articles in Cybersecurity from around the web—beginners to advanced—curated by thought leaders and our community. We focus on timeless pieces and update the list whenever we discover new, must-read articles or videos—make sure to bookmark and revisit this page.
Top 5 Cybersecurity Articles
At a glance: these are the articles that have been most read, shared, and saved in Cybersecurity by Refind users in 2023 so far.
Videos
Watch a video to get a quick overview.
Eva Galperin: What you need to know about stalkerware
Shared by 147, including L. Taylor Banks, Kevin Marks 🏠kevinmarks.com xoxo.zone/@KevinMarks, Mark Kaigwa, ɐpuɐʎᴉW ᴉʇɐʍɥǝN, Meltem Demirors
What is ...?
New to Cybersecurity? These articles make an excellent introduction.
Exploring the Cybercrime Underground: Part 1
This post is the first in a series by Unit 42 covering the cybercrime underground. We'll explore actors, motivations, and the current threat landscape.
Introduction to Firmware Analysis of a Reolink IP Camera
Introduction to embedded devices, firmware of Reolink RLC 810A, and first steps with binwalk.
How to ...?
How to Check Your Devices for Stalkerware
You deserve privacy. Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder.
Trending
These links are currently making the rounds in Cybersecurity on Refind.
One-third of orgs don’t take cyberwarfare seriously despite the Russia-Ukraine war
Research released by Armis finds that one-third of organizations don't take cyberwarfare seriously, despite the ongoing Russia-Ukraine war.
T-Mobile Suffers Another Data Breach, Affecting 37 Million Accounts
The carrier says a "bad actor" has accessed data from "approximately 37 million current postpaid and prepaid customer accounts."
The FBI Identified a Tor User
No details, though: According to the complaint against him, Al-Azhari allegedly visited a dark web site that hosts “unofficial propaganda and photographs related to ISIS” multiple times on May 14,…
Your encrypted Facebook Messenger chats get some much-needed upgrades
Your favorite customization features are making their way to Messenger’s E2EE chats
ChatGPT is enabling script kiddies to write functional malware
For a beta, ChatGPT isn't all that bad at writing fairly decent malware.
Short Articles
Short on time? Check out these useful short articles in Cybersecurity—all under 10 minutes.
Cryptography’s Future Will Be Quantum-Safe. Here’s How It Will Work.
Lattice cryptography promises to protect secrets from the attacks of far-future quantum computers.
LastPass says hackers obtained password vaults and a wealth of customer info
Password manager says breach it disclosed in August was much worse than thought.
LinkedIn breach reportedly exposes data of 92% of users
A second massive LinkedIn breach reportedly exposes the data of 700M users, which is more than 92% of the total 756M users. The database ...
«The database is for sale on the dark web, with records including phone numbers, physical addresses, geolocation data, and inferred salaries.»
Hackers stole encrypted LastPass password vaults, and we’re just now hearing about it
It’s way worse than the previous notice made it seem.
Okta's source code stolen after GitHub repositories hacked
In a 'confidential' email notification sent by Okta and seen by BleepingComputer, the company states that attackers gained access to its GitHub repositories this month and stole the company's source…
Long Articles
These are some of the most-read long-form articles in Cybersecurity.
American Phone-Tracking Firm Demo’d Surveillance Powers by Spying on CIA and NSA
Anomaly Six, a secretive government contractor, claims to monitor the movements of billions of phones around the world and unmask spies with the press of a button.
«track the movements of billions of people via their phones with a constant stream of data purchased directly from Twitter.»
Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies
Twitter has major security problems that pose a threat to its own users' personal information, to company shareholders, to national security, and to democracy, according to an explosive whistleblower…
Zero Trust Information
Zero Trust Networking is security with Internet assumptions; there is tremendous value if we apply the same approach to information.
Meet your new two-factor authenticator: your Commodore 64
Multi-factor authentication is ripe for disruption. SMS 2FA is inherently defective. Phone authenticators get stolen. Security tokens get lo...
Taking off with Nix at FlightAware
In this blog post, we’ll provide an account of the problems that motivated FlightAware to adopt Nix and how we’ve used Nix to solve them at scale.
Thought Leaders
We monitor hundreds of thought leaders, influencers, and newsletters in Cybersecurity, including:
Troy Hunt
Creator of @haveibeenpwned. Microsoft Regional Director. Pluralsight author. Online security, technology and “The Cloud”. Australian.

Jane Manchun Wong
the real hidden features are the friends we made along the way
Threatpost
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.
McKinsey & Company
Since 1926, the trusted advisor to the world's leading businesses, governments, and institutions. 130+ offices in 65+ countries.
OneZero
The undercurrents of the future. The OneZero team at @Medium publishes stories about tech and science from Debugger, Future Human, and our namesake publication.
Publications
We monitor hundreds of publications, blogs, newsletters, and news sources in Cybersecurity, including:
Quanta Magazine
Big ideas in science and math. Because you want to know more. Launched by @SimonsFdn. 2022 Pulitzer Prize in Explanatory Reporting. http://quantamagazine.org
briankrebs
Independent investigative journalist. Author of 'Spam Nation,' a NYT bestseller. Former Washington Post reporter. Mastodon: http://infosec.exchange/@briankrebs
Stack Overflow
Stack Overflow empowers the world to develop technology through collective knowledge.
Citizen Lab
Research & development at the intersection of cyberspace, global security & human rights. Munk School of Global Affairs & Public Policy, University of Toronto
The Intercept
Fearless, adversarial journalism. Join our newsletter to get our best investigative reporting delivered to you: http://interc.pt/newsletter
What is Refind?
Every day Refind picks 5 links from around the web for every user, tailored to the user’s interests. Picking only a handful of links means focusing on what’s relevant and useful. We favor timeless pieces—links with long shelf-lives, articles that are still relevant one month, one year, or even ten years from now. These lists of the best resources on any topic are the result of years of careful curation.
How does Refind curate?
It’s a mix of human and algorithmic curation, following a number of steps:
- We monitor 10k+ sources and 1k+ thought leaders on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
- In addition, our users save links from around the web using our Save buttons and our extensions.
- Our algorithm processes 100k+ new links every day and uses external signals to find the most relevant ones, focusing on timeless pieces.
- Our community of active users gets 5 links every day, tailored to their interests. They provide feedback via implicit and explicit signals: open, read, listen, share, add to reading list, save to «Made me smarter», «More/less like this», etc.
- Our algorithm uses these internal signals to refine the selection.
- In addition, we have expert curators who manually curate niche topics.
The result: lists of the best and most useful articles on hundreds of topics.
How does Refind detect «timeless» pieces?
We focus on pieces with long shelf-lives—not news. We determine «timelessness» via a number of metrics, for example, the consumption pattern of links over time.
How many sources does Refind monitor?
We monitor 10k+ content sources on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
Which sources does Refind monitor in Cybersecurity?
We monitor hundreds of sources in Cybersecurity, including Quanta Magazine, briankrebs, Stack Overflow, Citizen Lab, The Intercept, and many more.
Who are the thought leaders in Cybersecurity?
We follow dozens of thought leaders in Cybersecurity, including Troy Hunt, Jane Manchun Wong, Threatpost, McKinsey & Company, OneZero.
Missing a thought leader? Submit them here
Can I submit a link?
Indirectly, by using Refind and saving links from outside (e.g., via our extensions).
How can I report a problem?
When you’re logged-in, you can flag any link via the «More» (...) menu. You can also report problems via email to hello@refind.com
Who uses Refind?
100k+ smart people start their day with Refind. To learn something new. To get inspired. To move forward. Our apps have a 4.9/5 rating.
Is Refind free?
Yes, it’s free!
How can I sign up?
Head over to our homepage and sign up by email or with your Twitter or Google account.