info@thehackernews.com (The Hacker News)The Hackers News
Brandon VigliaroloThe Register
BrianKrebsKrebs on Security
Jai Vijayan, Contributing Writer, Dark ReadingDark Reading - Threat Intelligence
Nate Nelson, Contributing Writer, Dark ReadingDark Reading - Threat Intelligence
N/ADark Reading - Threat Intelligence
Dark Reading Staff, Dark ReadingDark Reading - Threat Intelligence
Andy GreenbergWired
Karen Spiegelman, Features EditorDark Reading - Threat Intelligence
Dan Raywood, Senior Editor, Dark ReadingDark Reading - Threat Intelligence
Microsoft Threat IntelligenceMicrosoft Security Blog
Steve Preston, Vice President, Metallic Security Services, CommvaultDark Reading - Threat Intelligence
Tara Seals, Managing Editor, News, Dark ReadingDark Reading - Threat Intelligence
Joy ChikMicrosoft Security Blog
Reece RogersWired
Elizabeth Montalbano, Contributor, Dark ReadingDark Reading - Threat Intelligence
Larry Whiteside Jr., Chief Information Security Officer, RegScaleDark Reading - Threat Intelligence
CISAICS-Cert Advisories
Bruce SchneierSchneier on Security
Roman KovESET
Iain ThomsonThe Register
Becky Bracken, Editor, Dark ReadingDark Reading - Threat Intelligence
Joshua Goldfarb, Security and Fraud Architect, F5Dark Reading - Threat Intelligence
Microsoft Security ExpertsMicrosoft Security Blog
Trevor Dearing, Director of Critical Infrastructure Solutions, IllumioDark Reading - Threat Intelligence
Zac LarkhamWired
N/ASANS ICS
Andy Greenberg, Andrew CoutsWired
Robert Lemos, Contributing Writer, Dark ReadingDark Reading - Threat Intelligence
David Randleman, Field CISO Application Security & Pentest, CoalfireDark Reading - Threat Intelligence
Eitan Worcel, Co-Founder & CEO, MobbDark Reading - Threat Intelligence
N/AESET
Lindsay ClarkThe Register
EditorESET
Jessica Lyons HardcastleThe Register
Lily Hay NewmanWired
Microsoft Incident ResponseMicrosoft Security Blog
Seth Boro, Managing Partner, ThomaBravoDark Reading - Threat Intelligence
Rob LeffertsMicrosoft Security Blog
Ryan Kalember, Executive Vice President of Cybersecurity Strategy, ProofpointDark Reading - Threat Intelligence
Microsoft Security, MicrosoftDark Reading - Threat Intelligence