Volunteer army issues Top 20 Critical Security Controls that public- and private-sector organizations should use for locking down their environments from the latest attacks
| Google Dorks Database | Exploits Vulnerability | Exploit Shellcodes | 
| CVE List | Tools/Apps | News/Aarticles | 
| Phishing Database | Deepfake Detection | Trends/Statistics & Live Infos | 
							Tags:
							 Ex-NSA Official Heads New Global Consortium Issuing Attack-Driven Security Controls