The Best Articles in Cybersecurity
The most useful articles and videos in Cybersecurity from around the web, curated by thought leaders and our community.
Refind focuses on timeless pieces and updates the list whenever new, must-read articles or videos are discovered.
Top 5 Cybersecurity Articles
At a glance: these are the articles that have been most read, shared, and saved in Cybersecurity by Refind users in 2024 so far.
Videos
Watch a video to get a quick overview.
Why Passkeys are the future
The future is passwordless! Learn all about Passkeys, the technology set to replace traditional passwords. The best part?! You can start using them today! We...
How Quantum Computers Break The Internet... Starting Now
A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. Head to https://brilliant.org/veritasium to st...
Eva Galperin: What you need to know about stalkerware
Shared by 153, including L. Taylor Banks, Kevin Marks 🏠kevinmarks.com xoxo.zone/@KevinMarks, Mark Kaigwa, ɐpuɐʎᴉW ᴉʇɐʍɥǝN, Meltem Demirors
What is ...?
New to Cybersecurity? These articles make an excellent introduction.
Introduction to Firmware Analysis of a Reolink IP Camera
Introduction to embedded devices, firmware of Reolink RLC 810A, and first steps with binwalk.
Exploring the Cybercrime Underground: Part 1
This post is the first in a series by Unit 42 covering the cybercrime underground. We'll explore actors, motivations, and the current threat landscape.
How to ...?
How to Check Your Devices for Stalkerware
You deserve privacy. Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder.
Trending
These links are currently making the rounds in Cybersecurity on Refind.
Four things you need to know about China’s AI talent pool
Researchers from China make up over one-quarter of the world’s top AI experts, and they are increasingly staying put rather than moving overseas.
The AI Act is done. Here’s what will (and won’t) change
The hard work starts now.
The US Government Has a Microsoft Problem
Microsoft has stumbled through a series of major cybersecurity failures over the past few years. Experts say the US government’s reliance on its systems means the company continues to get a free pass.
Cybersecurity investigators worry ransomware attacks may worsen as young, Western hackers work with Russians
Cybersecurity investigators worry ransomware attacks may worsen as young, native-English speaking hackers in the U.S., U.K. and Canada team up with Russian hackers.
Unpatchable vulnerability in Apple chip leaks secret encryption keys
Fixing newly discovered side channel will likely take a major toll on performance.
Short Articles
Short on time? Check out these useful short articles in Cybersecurity—all under 10 minutes.
Celebrated Cryptography Algorithm Gets an Upgrade
Two researchers have improved a well-known technique for lattice basis reduction, opening up new avenues for practical experiments in cryptography and mathematics.
Elliptic Curves Yield Their Secrets in a New Number System
Ana Caraiani and James Newton have extended an important result in number theory to the imaginary realm.
Deepfake scammer walks off with $25 million in first-of-its-kind AI heist
Hong Kong firm reportedly tricked by simulation of multiple people in video chat.
The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story
Netflix, Spotify, Twitter, PayPal, Slack. All down for millions of people. How a group of teen friends plunged into an underworld of cybercrime and broke the internet—then went to work for the FBI.
Quantum Computers Could Crack Encryption Sooner Than Expected With New Algorithm
A sufficiently powerful quantum computer could render our leading cryptographic schemes worthless—the big question is when that's likely to happen.
Long Articles
These are some of the most-read long-form articles in Cybersecurity.
How I got scammed
Today's links How I got scammed (permalink) I wuz robbed. More spec
On the trail of the Dark Avenger: the most dangerous virus writer in the world
The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
A Confession Exposes India’s Secret Hacking Industry
The country has developed a lucrative speciality: cyberattacks for hire.
The Untold Story of the Boldest Supply-Chain Hack Ever
The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.
Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away
Key-leaking side channels are a fact of life. Now they can be done by video-recording power LEDs.
Thought Leaders
We monitor hundreds of thought leaders, influencers, and newsletters in Cybersecurity, including:
What is Refind?
Every day Refind picks the most relevant links from around the web for you. Picking only a handful of links means focusing on what’s relevant and useful.
How does Refind curate?
It’s a mix of human and algorithmic curation, following a number of steps:
- We monitor 10k+ sources and 1k+ thought leaders on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
- In addition, our users save links from around the web using our Save buttons and our extensions.
- Our algorithm processes 100k+ new links every day and uses external signals to find the most relevant ones, focusing on timeless pieces.
- Our community of active users gets the most relevant links every day, tailored to their interests. They provide feedback via implicit and explicit signals: open, read, listen, share, mark as read, read later, «More/less like this», etc.
- Our algorithm uses these internal signals to refine the selection.
- In addition, we have expert curators who manually curate niche topics.
The result: lists of the best and most useful articles on hundreds of topics.
How does Refind detect «timeless» pieces?
We focus on pieces with long shelf-lives—not news. We determine «timelessness» via a number of metrics, for example, the consumption pattern of links over time.
How many sources does Refind monitor?
We monitor 10k+ content sources on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
Who are the thought leaders in Cybersecurity?
We follow dozens of thought leaders in Cybersecurity, including Troy Hunt, McKinsey & Company, Jane Manchun Wong, Threatpost, OneZero.
Missing a thought leader? Submit them here
Can I submit a link?
Indirectly, by using Refind and saving links from outside (e.g., via our extensions).
How can I report a problem?
When you’re logged-in, you can flag any link via the «More» (...) menu. You can also report problems via email to hello@refind.com
Who uses Refind?
450k+ smart people start their day with Refind. To learn something new. To get inspired. To move forward. Our apps have a 4.9/5 rating.
Is Refind free?
Yes, it’s free!
How can I sign up?
Head over to our homepage and sign up by email or with your Twitter or Google account.
Keep Learning
Learn something new, guided by experts. Deep Dives are carefully hand-curated series of time-tested articles and videos from around the web.
Get the big picture on your favorite topics.