B.8. Hacker and “Underground” Organizations

Not every hacker is a bad person. Not every “underground” organization is looking to take over the cyber world. However, I have found that the information on many of these sites is posted quicker than on so-called legitimate sites, and many times they describe the exploit better. Security professionals can learn a lot by reading the information these groups provide. I am not passing judgment on what these groups do with the information or how they obtain it.The sites here are a sample of those I read on a regular basis.

Get Writing Information Security Policies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.