The Best Articles in Cybersecurity
The most useful articles and videos in Cybersecurity from around the web—beginners to advanced—curated by thought leaders and our community. We focus on timeless pieces and update the list whenever we discover new, must-read articles or videos—make sure to bookmark and revisit this page.
Top 5 Cybersecurity Articles
At a glance: these are the articles that have been most read, shared, and saved in Cybersecurity by Refind users in 2023 so far.
- American Phone-Tracking Firm Demo’d Surveillance Powers by Spying on CIA and NSA
- On the trail of the Dark Avenger: the most dangerous virus writer in the world
- How to Check Your Devices for Stalkerware
- AI-powered Bing Chat spills its secrets via prompt injection attack
- Three ways AI chatbots are a security disaster
Videos
Watch a video to get a quick overview.
How Quantum Computers Break The Internet... Starting Now
A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. Head to https://brilliant.org/veritasium to st...
Eva Galperin: What you need to know about stalkerware
Shared by 147, including L. Taylor Banks, Kevin Marks 🏠kevinmarks.com xoxo.zone/@KevinMarks, Mark Kaigwa, ɐpuɐʎᴉW ᴉʇɐʍɥǝN, Meltem Demirors
What is ...?
New to Cybersecurity? These articles make an excellent introduction.
Introduction to Firmware Analysis of a Reolink IP Camera
Introduction to embedded devices, firmware of Reolink RLC 810A, and first steps with binwalk.
Exploring the Cybercrime Underground: Part 1
This post is the first in a series by Unit 42 covering the cybercrime underground. We'll explore actors, motivations, and the current threat landscape.
How to ...?
How to Check Your Devices for Stalkerware
You deserve privacy. Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder.
Trending
These links are currently making the rounds in Cybersecurity on Refind.
On the trail of the Dark Avenger: the most dangerous virus writer in the world
The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
Cybersecurity faces a challenge from artificial intelligence’s rise
The prospect comes as a range of professionals report real progress in security, from slowing ransomware attacks to more timely sharing of information by the U.S. government.
The beginning of the end of the password
For some time we and others in the industry have been working on a simpler and safer alternative to passwords. While passwords will be with us for some time to come, they are often frustrating to…
The Untold Story of the Boldest Supply-Chain Hack Ever
The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.
Testing a new encrypted messaging app's extraordinary claims
How I accidentally breached a nonexistent database and found every private key in a 'state-of-the-art' encrypted messenger.
Short Articles
Short on time? Check out these useful short articles in Cybersecurity—all under 10 minutes.
Three ways AI chatbots are a security disaster
Large language models are full of security vulnerabilities, yet they’re being embedded into tech products on a vast scale.
AI-powered Bing Chat spills its secrets via prompt injection attack
By asking "Sydney" to ignore previous instructions, it reveals its original directives.
We updated our RSA SSH host key
At approximately 05:00 UTC on March 24, out of an abundance of caution, we replaced our RSA SSH host key used to secure Git operations for GitHub.com.
Crooks’ Mistaken Bet on Encrypted Phones
Drug syndicates and other criminal groups bought into the idea that a new kind of phone network couldn’t be infiltrated by cops. They were wrong—big time.
Thousands scammed by AI voices mimicking loved ones in emergencies
In 2022, $11 million was stolen through thousands of impostor phone scams.
Long Articles
These are some of the most-read long-form articles in Cybersecurity.
Malleable software in the age of LLMs
All computer users may soon have the ability to author small bits of code. What structural changes does this imply for the production and distribution of software?
American Phone-Tracking Firm Demo’d Surveillance Powers by Spying on CIA and NSA
Anomaly Six, a secretive government contractor, claims to monitor the movements of billions of phones around the world and unmask spies with the press of a button.
«track the movements of billions of people via their phones with a constant stream of data purchased directly from Twitter.»
SAST: how code analysis tools look for security flaws
Here we'll discuss how SAST solutions find security flaws.
Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies
Twitter has major security problems that pose a threat to its own users' personal information, to company shareholders, to national security, and to democracy, according to an explosive whistleblower…
Abusing Exceptions for Code Execution, Part 2
In this article, we'll explore how the concepts behind Exception Oriented Programming can be abused when exploiting stack overflow vulnerabilities on Windows.
Thought Leaders
We monitor hundreds of thought leaders, influencers, and newsletters in Cybersecurity, including:
Troy Hunt
Creator of @haveibeenpwned. Microsoft Regional Director. Pluralsight author. Online security, technology and “The Cloud”. Australian.

Jane Manchun Wong
the real hidden features are the friends we made along the way.forbes 30u30.🇭🇰×🇯🇵
McKinsey & Company
Since 1926, the trusted advisor to the world's leading businesses, governments, and institutions. 130+ offices in 65+ countries.
Threatpost
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.
OneZero
The undercurrents of the future. The OneZero team at @Medium publishes stories about tech and science from Debugger, Future Human, and our namesake publication.
Publications
We monitor hundreds of publications, blogs, newsletters, and news sources in Cybersecurity, including:
ZDNET
Tomorrow belongs to those who embrace it today.
Quanta Magazine
Big ideas in science and math. Because you want to know more. Launched by @SimonsFdn. 2022 Pulitzer Prize in Explanatory Reporting. http://quantamagazine.org
Stack Overflow
Stack Overflow empowers the world to develop technology through collective knowledge.
The Intercept
Fearless, adversarial journalism. Join our newsletter to get our best investigative reporting delivered to you: http://interc.pt/newsletter
The Hacker News
#1 Most trusted publication for breaking cybersecurity and hacking news, insights, and analysis for information security professionals.
What is Refind?
Every day Refind picks the most relevant links from around the web for you. Picking only a handful of links means focusing on what’s relevant and useful. We favor timeless pieces—links with long shelf-lives, articles that are still relevant one month, one year, or even ten years from now. These lists of the best resources on any topic are the result of years of careful curation.
How does Refind curate?
It’s a mix of human and algorithmic curation, following a number of steps:
- We monitor 10k+ sources and 1k+ thought leaders on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
- In addition, our users save links from around the web using our Save buttons and our extensions.
- Our algorithm processes 100k+ new links every day and uses external signals to find the most relevant ones, focusing on timeless pieces.
- Our community of active users gets the most relevant links every day, tailored to their interests. They provide feedback via implicit and explicit signals: open, read, listen, share, mark as read, read later, «More/less like this», etc.
- Our algorithm uses these internal signals to refine the selection.
- In addition, we have expert curators who manually curate niche topics.
The result: lists of the best and most useful articles on hundreds of topics.
How does Refind detect «timeless» pieces?
We focus on pieces with long shelf-lives—not news. We determine «timelessness» via a number of metrics, for example, the consumption pattern of links over time.
How many sources does Refind monitor?
We monitor 10k+ content sources on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
Which sources does Refind monitor in Cybersecurity?
We monitor hundreds of sources in Cybersecurity, including ZDNET, Quanta Magazine, Stack Overflow, The Intercept, The Hacker News, and many more.
Who are the thought leaders in Cybersecurity?
We follow dozens of thought leaders in Cybersecurity, including Troy Hunt, Jane Manchun Wong, McKinsey & Company, Threatpost, OneZero.
Missing a thought leader? Submit them here
Can I submit a link?
Indirectly, by using Refind and saving links from outside (e.g., via our extensions).
How can I report a problem?
When you’re logged-in, you can flag any link via the «More» (...) menu. You can also report problems via email to hello@refind.com
Who uses Refind?
200k+ smart people start their day with Refind. To learn something new. To get inspired. To move forward. Our apps have a 4.9/5 rating.
Is Refind free?
Yes, it’s free!
How can I sign up?
Head over to our homepage and sign up by email or with your Twitter or Google account.