The Best Articles in Cybersecurity
The most useful articles and videos in Cybersecurity from around the web—beginners to advanced—curated by thought leaders and our community. We focus on timeless pieces and update the list whenever we discover new, must-read articles or videos—make sure to bookmark and revisit this page.
Top 5 Cybersecurity Articles
At a glance: these are the articles that have been most read, shared, and saved in Cybersecurity by Refind users in 2023.
Videos
Watch a video to get a quick overview.
How Quantum Computers Break The Internet... Starting Now
A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. Head to https://brilliant.org/veritasium to st...
Why Passkeys are the future
The future is passwordless! Learn all about Passkeys, the technology set to replace traditional passwords. The best part?! You can start using them today! We...
Eva Galperin: What you need to know about stalkerware
Shared by 148, including L. Taylor Banks, Kevin Marks 🏠kevinmarks.com xoxo.zone/@KevinMarks, Mark Kaigwa, ɐpuɐʎᴉW ᴉʇɐʍɥǝN, Meltem Demirors
What is ...?
New to Cybersecurity? These articles make an excellent introduction.
Introduction to Firmware Analysis of a Reolink IP Camera
Introduction to embedded devices, firmware of Reolink RLC 810A, and first steps with binwalk.
Exploring the Cybercrime Underground: Part 1
This post is the first in a series by Unit 42 covering the cybercrime underground. We'll explore actors, motivations, and the current threat landscape.
How to ...?
How to Check Your Devices for Stalkerware
You deserve privacy. Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder.
Trending
These links are currently making the rounds in Cybersecurity on Refind.
The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story
Netflix, Spotify, Twitter, PayPal, Slack. All down for millions of people. How a group of teen friends plunged into an underworld of cybercrime and broke the internet—then went to work for the FBI.
Zelle finally caves after years of refusing to refund scam victims
Zelle now shielding users from the most reported scam in payments.
The Evolving Role of the CISO: More Than Just Security
A tool to help information security teams better address the range of cyber- and business-related risks their organizations grapple daily.
Short Articles
Short on time? Check out these useful short articles in Cybersecurity—all under 10 minutes.
Elliptic Curves Yield Their Secrets in a New Number System
Ana Caraiani and James Newton have extended an important result in number theory to the imaginary realm.
Quantum Computers Could Crack Encryption Sooner Than Expected With New Algorithm
A sufficiently powerful quantum computer could render our leading cryptographic schemes worthless—the big question is when that's likely to happen.
Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios
The TETRA standard is used in radios worldwide. Security researchers have found multiple vulnerabilities in the underlying cryptography and its implementation, including issues that allow for the…
Three ways AI chatbots are a security disaster
Large language models are full of security vulnerabilities, yet they’re being embedded into tech products on a vast scale.
The Cloud Is a Prison. Can the Local-First Software Movement Set Us Free?
Tired of relying on Big Tech to enable collaboration, peer-to-peer enthusiasts are creating a new model that cuts out the middleman. (That’s you, Google.)
Long Articles
These are some of the most-read long-form articles in Cybersecurity.
On the trail of the Dark Avenger: the most dangerous virus writer in the world
The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
A Confession Exposes India’s Secret Hacking Industry
The country has developed a lucrative speciality: cyberattacks for hire.
The Untold Story of the Boldest Supply-Chain Hack Ever
The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.
Meet Window Snyder, the trailblazer who helped secure the internet and billions of devices
Meet Window Snyder, a veteran hacker and cybersecurity pro who has helped companies like Microsoft, Mozilla, and Apple be more secure.
Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away
Key-leaking side channels are a fact of life. Now they can be done by video-recording power LEDs.
Thought Leaders
We monitor hundreds of thought leaders, influencers, and newsletters in Cybersecurity, including:
Troy Hunt
Creator of @haveibeenpwned. Microsoft Regional Director. Pluralsight author. Online security, technology and “The Cloud”. Australian.
McKinsey & Company
Since 1926, the trusted advisor to the world's leading businesses, governments, and institutions. 130+ offices in 65+ countries.

Jane Manchun Wong
the real hidden features are the friends we made along the way.forbes 30u30.🇭🇰×🇯🇵.eng @instagram
Threatpost
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.
OneZero
The undercurrents of the future. The OneZero team at @Medium publishes stories about tech and science from Debugger, Future Human, and our namesake publication.
What is Refind?
Every day Refind picks the most relevant links from around the web for you. Picking only a handful of links means focusing on what’s relevant and useful. We favor timeless pieces—links with long shelf-lives, articles that are still relevant one month, one year, or even ten years from now. These lists of the best resources on any topic are the result of years of careful curation.
How does Refind curate?
It’s a mix of human and algorithmic curation, following a number of steps:
- We monitor 10k+ sources and 1k+ thought leaders on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
- In addition, our users save links from around the web using our Save buttons and our extensions.
- Our algorithm processes 100k+ new links every day and uses external signals to find the most relevant ones, focusing on timeless pieces.
- Our community of active users gets the most relevant links every day, tailored to their interests. They provide feedback via implicit and explicit signals: open, read, listen, share, mark as read, read later, «More/less like this», etc.
- Our algorithm uses these internal signals to refine the selection.
- In addition, we have expert curators who manually curate niche topics.
The result: lists of the best and most useful articles on hundreds of topics.
How does Refind detect «timeless» pieces?
We focus on pieces with long shelf-lives—not news. We determine «timelessness» via a number of metrics, for example, the consumption pattern of links over time.
How many sources does Refind monitor?
We monitor 10k+ content sources on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
Who are the thought leaders in Cybersecurity?
We follow dozens of thought leaders in Cybersecurity, including Troy Hunt, McKinsey & Company, Jane Manchun Wong, Threatpost, OneZero.
Missing a thought leader? Submit them here
Can I submit a link?
Indirectly, by using Refind and saving links from outside (e.g., via our extensions).
How can I report a problem?
When you’re logged-in, you can flag any link via the «More» (...) menu. You can also report problems via email to hello@refind.com
Who uses Refind?
400k+ smart people start their day with Refind. To learn something new. To get inspired. To move forward. Our apps have a 4.9/5 rating.
Is Refind free?
Yes, it’s free!
How can I sign up?
Head over to our homepage and sign up by email or with your Twitter or Google account.