Reddit

  • r/2fa

    • This subreddit is for news and events regarding second-factor (2FA) and multi-factor (MFA) authentication.

  • r/andSec

    • Information about android security.

  • r/antiforensics

    • Learn how you can better your privacy by making it much more difficult to do any investigation on your computers.

  • r/apple

    • Discuss iPhone, iPad, Mac and all other Apple device and services, along with talking about technology at large.

  • r/AskNetsec

    • Dedicated to those passionate about security.

  • r/AssHatHackers

    • For hacking to have fun and mess with people.

  • r/BadApps

    • A subreddit to discuss and coordinate reporting bad apps to the Google Play Store

  • r/badBIOS

    • BadBIOS and other firmware rootkits, nation-state spyware, interdiction and implants, forensics, how to air gap, hacking air gapped computers, side channel attacks, power line hacking, hacking smart homes, constructing faraday rooms, forensic bags, Libreboot, ultrasound and electromagnetic radiation (EMR) technical surveillance counter measures (TSCM) and shielding.

  • r/blackhat

    • Focused on the ongoing discussion and documentation of vulnerabilities and exploitation techniques. Please read the rules before posting here.

  • r/blueteamsec

    • We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.

  • r/crypto

    • Cryptography is the art of creating mathematical assurances for who can do what with data, including but not limited to encryption of messages such that only the key-holder can read it. Cryptography lives at an intersection of math and computer science.

  • r/codes

    • Hiding data, cracking codes, finding hidden messages, basic cipher-cracking challenges and discussions of simple data hiding.

  • r/ComputerSecurity

    • IT security news, articles and tools.

  • r/computerforensics

    • Dedicated to the branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. This field involves the application of several information security principles and aims to provide for attribution and event reconstruction following forth from audit processes.

  • r/cyber

    • Focused on the geopolitical, corporate, and intelligence impact of Cyber Security, Cyber Warfare, Cyber Crime, hacking, digital espionage, etc.

  • r/cyberlaw

    • Legal news linked to technology usages - such as computer crime, copyright, privacy, free speech, intellectual property, net neutrality, the RIAA, etc.

  • r/cybersecurity101

    • Discussing beginner topics of cybersecurity and privacy from a home, family, personal, perspective.

  • r/cybersecurity

    • This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

  • r/CyberSecurityJobs

    • A forum for discussing cybersecurity career information.

  • r/dfir

    • A subreddit to discuss and share news, content, whitepapers, research, tutorials, webinars, or anything else regarding Digital Forensics and Incident Response.

  • r/DFIRTraining

    • Digital forensics, incident response, electronic discovery (ediscovery), all things software, hardware, training, references, and resources related.

  • r/ethicalhacking

    • A forum for discussion on computer hacking done for ethical purposes.

  • r/ExploitDev

    • Exploit Development for Fun and Profit!

  • r/fulldisclosure

    • This subreddit is for anything related to breaches, data leaks, exploits, vulnerabilities, informed and uninformed disclosures. We will not remove uninformed disclosures or zero-day exploits.

  • r/HackBloc

    • Hacktivism, Crypto-anarchy, Darknets, Free Culture - Proudly Feminist, Anarchist, Anti-Capitalist, Anarchist hackers

  • r/hackers

    • The most interesting recent and historical hacks. Our topics do not need to be technical. We require detailed information in all posts. We are not a place to ask for hacking help.

  • r/hackersec

    • A forum for discussing hacker security.

  • r/hacking

    • A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security.

  • r/Hacking_Tutorials

    • Post various resources that discuss and teach the art of hacking and pentesting while staying ethical and legal.

  • r/howtohack

    • HowToHack is a community designed to help those on their journey from neophyte to veteran in the world of underground skillsets.

  • r/Information_Security

    • Information security news, questions, analysis, and blog posts.

  • r/infosecurity

    • Information about information security.

  • r/InfoSecNews

    • Designed for users to post the latest Information Security related news and articles from around the Internet.

  • r/IOT

    • Staying on top of the emerging trend and technologies behind the "Internet of Things"

  • r/i2p

    • Information and discussions related to the I2P (Cousin of R2D2) anonymous peer-to-peer network. I2P provides applications and tooling for communicating on a privacy-aware, self-defensed, distributed network.

  • r/MacOS

    • Home for macOS Discussion!

  • r/macsysadmin

    • All things related to the administration of Apple devices.

  • r/Malware

    • A place for malware reports and information.

  • r/netsec

    • A community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to provide value to security practitioners, students, researchers, and hackers everywhere. ‎

  • r/netsecstudents

    • A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.

  • r/offensive_security

    • Learn, share, and connect with others in preparation for OSCP & all OffSec certs.

  • r/OperationsSecurity

    • Discussing Operations Security (OPSEC)- the process for identifying and protecting critical information.

  • r/Pentesting

    • Discussion of information technology security topics with a focus on penetration testing.

  • r/purpleteamsec

    • Dedicated to Red Teaming, Purple Teaming, Threat Hunting, Blue Teaming and Threat Intelligence.

  • r/redteam

    • A red team or the red team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view.

  • r/ReverseEngineering

    • A moderated community dedicated to all things reverse engineering.

  • r/SocialEngineering

    • Posts related to social engineering - Tips, Techniques, Tools, Stories.

  • r/techsnap

    • Systems, Network, and Administration Podcast.

  • r/websecurity

    • Links and discussion on the development and maintenance of secure websites, for website owners, developers and pentesters. As applications and services move to the web, avoiding web vulnerabilities such as XSS and CSRF becomes critical.

  • r/zeroday

    • Exploit R&D goes here.

Last updated