Information Security

Common Vulnerabilities and Exposures
http://cve.mitre.org/

International in scope and free for public use, CVE is a dictionary of publicly known information security vulnerabilities and exposures.

Data Center Research
http://www.datacenterresearch.com/

DCR is an online service designed to provide its users with easier access to data center related research. Tracking relevant articles and reports from all the leading global industry news sources (media, research firms/analysts, bloggers and more), DCR offers users a convenient, 'one-stop-shop' portal that features thousands of industry relevant white papers and re-sell reports from the top research/analyst firms, and publishers working within the data center and hosting space.

DataLossDB
http://datalossdb.org/

DataLossDB is a research project aimed at documenting known and reported data loss incidents world-wide.

Enigma Software: Threat Database
http://www.enigmasoftware.com/threat-database/

Malware, Spyware and Trojan analysis and removal information.

Identity Theft Resource Center
http://idtheftcenter.org/

Identity Theft Resource Center® (ITRC) is a nonprofit, nationally respected organization dedicated exclusively to the understanding and prevention of identity theft. The ITRC provides consumer and victim support as well as public education. The ITRC also advises governmental agencies, legislators, law enforcement, and businesses about the evolving and growing problem of identity theft.

Internet Crime Complaint Center (IC3)
http://www.ic3.gov/

The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), and the National White Collar Crime Center (NW3C).

Malware Experts
http://www.malwareexperts.com/

MalwareExperts is a passionate, dedicated group of computer security professionals with over 30 years of computer security experience under our belts. We have devoted our lives (our spouses are not happy about this) to helping current and past victims of Malware.

numbrX Security Beat
http://www.numbrx.net/

numbrX keeps an online record of reported personal, private and confidential data breaches which can lead to identity theft and credit fraud.

Payment Card Industry Data Security Standard
http://en.wikipedia.org/wiki/PCI_DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.

Privacy Rights Clearinghouse
http://www.privacyrights.org/ar/ChronDataBreaches.htm

A Chronology of Data Breaches

Recorded Future: Intelligence Analysis
https://www.recordedfuture.com/blog/

Open source intelligence analysis using Recorded Future.

SecurityFocus: BugTraq
http://www.securityfocus.com/archive/1

BugTraq is a high volume, full disclosure mailing list for the detailed discussion and announcement of computer security vulnerabilities. BugTraq serves as the cornerstone of the Internet-wide security community.

SecurityFocus: Vulnerabilities
http://www.securityfocus.com/vulnerabilities

The SecurityFocus Vulnerability Database provides security professionals with the most up-to-date information on vulnerabilities for all platforms and services.

Spam and Open Relay Blocking System (SORBS)
http://www.sorbs.net/

The SORBS (Spam and Open Relay Blocking System) provides free access to its DNS-based Block List (DNSBL) to effectively block email from more than 12 million host servers known to disseminate spam, phishing attacks and other forms of malicious email. The list typically includes email servers suspected of sending or relaying spam, servers that have been hacked and hijacked, and those with Trojan infestations. In an attempt to provide preemptive protection, SORBS also lists servers with dynamically allocated IP addresses.

Spamhaus
http://www.spamhaus.org/

Spamhaus maintains a number of security intelligence databases and realtime spam-blocking databases ('DNSBLs') responsible for keeping back the vast majority of spam and malware sent out on the Internet. These include the Spamhaus Block List (SBL), the Exploits Block List (XBL), the Policy Block List (PBL) and the Domain Block List (DBL). Spamhaus DNSBLs are today used by the majority of the Internet's Email Service Providers, Corporations, Universities, Governments and Military networks.

United States Computer Emergency Readiness Team (US-CERT)
http://www.us-cert.gov/

The United States Computer Emergency Readiness Team (US-CERT) is a partnership between the Department of Homeland Security and the public and private sectors. Established in 2003 to protect the nation's Internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation.

United States Department of Homeland Security
http://www.dhs.gov/index.shtm

Homeland Security leverages resources within federal, state, and local governments, coordinating the transition of multiple agencies and programs into a single, integrated agency focused on protecting the American people and their homeland. More than 87,000 different governmental jurisdictions at the federal, state, and local level have homeland security responsibilities. The comprehensive national strategy seeks to develop a complementary system connecting all levels of government without duplicating effort. Homeland Security is truly a "national mission."

Websense Security Labs
http://securitylabs.websense.com/

Websense Security Labs discovers, investigates and reports on advanced Internet threats that traditional security research methods miss.