Andy GreenbergWired
Advisory DocumentICS-Cert Advisories
Konstantin Zykov, Jornt van der WielSecure List
Laura DobbersteinThe Register
Dave CartwrightThe Register
noreply@blogger.com (Ravie Lakshmanan)The Hackers News
Jessica Lyons HardcastleThe Register
Lily Hay NewmanWired
Nathan Eddy, Contributing Writer, Dark ReadingDark Reading - Threat Intelligence
Jeff BurtThe Register
Jai Vijayan, Contributing Writer, Dark ReadingDark Reading - Threat Intelligence
Dark Reading Staff, Dark ReadingDark Reading - Threat Intelligence
Schneier.com WebmasterSchneier on Security
N/ADark Reading - Threat Intelligence
Konstantinos Karagiannis, Director, Quantum Computing Services, ProtivitiDark Reading - Threat Intelligence
Joshua Goldfarb, Fraud Solutions Architect - EMEA and APCJ, F5Dark Reading - Threat Intelligence
Bruce SchneierSchneier on Security
Jean-Ian BoutinESET
noreply@blogger.com (The Hacker News)The Hackers News
GReATSecure List
Simon SharwoodThe Register
N/ASANS ICS
Dhruv MehrotraWired
Brandon VigliaroloThe Register
Fahmida Y. Rashid, Managing Editor, Features, Dark ReadingDark Reading - Threat Intelligence
Robert Lemos, Contributing Writer, Dark ReadingDark Reading - Threat Intelligence
Becky Bracken, Editor, Dark ReadingDark Reading - Threat Intelligence
Mari ZhouCitizen Lab
EditorESET
Alex Spivakovsky, VP of Research, PenteraDark Reading - Threat Intelligence
Matt BurgessWired
Juan Manuel HarnESET
John McClurg, Sr. VP & CISO, BlackBerryDark Reading - Threat Intelligence
BrianKrebsKrebs on Security
Christine BarrettMicrosoft Security Blog
Microsoft 365 Defender Threat Intelligence TeamMicrosoft Security Blog
Lindsay ClarkThe Register
Elizabeth Montalbano, Contributor, Dark ReadingDark Reading - Threat Intelligence
Kirsten Newcomer, Director, Cloud and DevSecOps Strategy, Red HatDark Reading - Threat Intelligence
James ShepperdESET
David GordonThe Register
Dmitry Kondratyev, Andrey IvanovSecure List