Which sites do you use to check if a domain or IP is suspicious/compromised?

Cyber SubReddits
SqueezeboxPwning: Get your Logitech Media Server off the internet right now!
CTO at NCSC Summary: week ending April 7th
Question about AI-Generated Code
Cybersecurity compliance software
Kaseya started hiring again: people should be aware of what goes on there
I may be getting offered a job as a Cybersecurity Manager at a Casino, but not sure how to feel about it.
Remote code execution on CHAOS RAT panel v5.01 (CVE-2024-30850) panel and also rickrolling the panel administrators
SASTs are... bad?
Can malware be installed before the creation of the System Restore point?
I'm getting this error when trying to get Mantis set up. Is anyone adept with the Mantis Framework? I did everything step-by-step on a fresh install of ubuntu. All old versions of docker are deleted, and the newest version is installed, as per the instructions. But I'm stuck.
How do you bypass Cloudflare nowadays?
SOC Analyst transitioning to DevSecOps, looking for training recommendations
Tools that do not exist? What could you use to make your job easier?
Does anyone bother to report phishing to the "authorities"?
Why does everyone want free resources?
Whonix on VM or Tails USB
Want to learn Cybersecurity
Top cybersecurity stories for the week of 04-01-24 to 04-05-24
Needing advice on root cause of SocGholish
Client Server
Nessus "Ping On" not working while ping command does
How to have working knowledge of Palo Alto Firewalls
From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware
Threat actors target mining industry.
Any tools or recommendations for employee training for a remote company of 50 people.
AiTM response
Ideas for live demo
Practicing Malware Analysis
Are the shares stored on the clevis machine used for the encryption, in the .jwe or in the Tang?