ARS Technica Security http://arstechnica.com/security/
Attack and Threat Maps: CTF365 https://ctf365.com/pages/map
Digital DDOS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&time=16245&view=map
Deutsch Telekom http://www.sicherheitstacho.eu/
ESET Virus Map http://www.virus-radar.com/
Fire Eye Attack Map https://www.fireeye.com/cyber-map/threat-map.html
Fortintet Threat Map http://threatmap.fortiguard.com/?ref=producthunt
IBM X-Force https://exchange.xforce.ibmcloud.com/
Kapersky 3D http://cybermap.kaspersky.com/
Malware Global http://globe.cyberfeed.net/
Norse Attack Map http://map.norsecorp.com/
Carnal0wnage & Attack Research Blog http://carnal0wnage.blogspot.com/
Center for Internet Security http://www.cisecurity.org/
CERIAS/Spaf http://www.cerias.purdue.edu/site/blog/author/spaf
Contagio Malware Dump http://contagiodump.blogspot.com/
Controls:
20 Critical Security Controls https://www.sans.org/critical-security-controls/
STIG Viewer NIST http://www.stigviewer.com/controls/800-53
CSO Online http://www.csoonline.com/
Cyber Crime & Doing Time http://garwarner.blogspot.com/
Cyber Security Canon https://www.paloaltonetworks.com/threat-research/cybercanon.html
The Cyber Wire http://www.thecyberwire.com/index.html
Cyber War Zone http://cyberwarzone.com/
Cyveillance Blog https://blog.cyveillance.com/
Dark Reading http://www.darkreading.com/
DFIR http://www.digitalforensicsmagazine.com/
DHS:
Daily Report http://dhs-daily-report.blogspot.com/
DHS Portal http://www.dhs.gov/topic/cybersecurity?utm_source=frequent_page&utm_medium=web&utm_campaign=dhs_frp
DSL Reports http://www.dslreports.com/forum/security,1
ESET Threat Blog http://blog.eset.com/
F-Secure Blog http://www.f-secure.com/weblog/
Fire Eye Malware Intel Lab http://blog.fireeye.com/research/
Fortinet Blog http://blog.fortinet.com/
Guardian Online http://www.theguardian.com/media-network/information-security
Google:
Google Safety Center https://www.google.com/safetycenter/everyone/start/
Google Security Blog http://googleonlinesecurity.blogspot.com/
Gov Security http://www.govinfosecurity.com/
The Hacker News http://thehackernews.com/
Help Net Security http://www.net-security.org/
HP Security Research http://www8.hp.com/us/en/software-solutions/security-research/
(ISC)2 http://blog.isc2.org/isc2_blog/
Info Sec Island http://www.infosecisland.com/
Krebs on Security http://krebsonsecurity.com/
Malcovery Security http://www.malcovery.com/blog/
Malware Domain List Forum http://www.malwaredomainlist.com/forums/index.php?PHPSESSID=1629054e913cb2ca8f0c59ffa27e9e94&board=13.0
Malware Don't Need Coffee http://malware.dontneedcoffee.com/
Microsoft Malware Protection Center http://blogs.technet.com/mmpc/default.aspx
Naked Security (Sophos) https://nakedsecurity.sophos.com/
NIST:
NIST Publications http://csrc.nist.gov/publications/index.html
NVD https://nvd.nist.gov/
Penetration Testing:
Pen Test Tools https://pentest-tools.com/blog/
Phishing:
Know B 4 http://www.knowbe4.com/
Phish Tank http://www.phishtank.com/
RAND on Cyber Warfare http://www.rand.org/topics/cyber-warfare.html
Reddit Netsec http://www.reddit.com/r/netsec/
SANS:
SANS Portal http://portal.sans.org/
Infosec Handlers Diary https://isc.sans.edu//diary.html
Internet Storm Center http://isc.sans.org/
Reading Room https://www.sans.org/reading-room/
Securing the Human http://www.securingthehuman.org/blog
SC Magazine http://www.scmagazine.com/
SCADA Hacker https://scadahacker.com/
Schneier on Security http://www.schneier.com/blog/
SecureWorks? http://www.secureworks.com/resources/blog/research/
Security Tube http://www.securitytube.net/
Security Week http://www.securityweek.com/
Securosis http://securosis.com/blog
SIGNAL Magazine Cyber http://www.afcea.org/content/?q=taxonomy/term/5361
Spamtitan Blog http://solutions.webtitan.com/
Steve Gibson/Security Now https://www.grc.com/securitynow.htm
Stop Badware http://blog.stopbadware.org/
Symantec Response Blog http://www.symantec.com/business/security_response/weblog/
System Forensics http://www.sysforensics.org/
Tao Security http://taosecurity.blogspot.com/
Tech Target http://searchsecurity.techtarget.com/
Tenable Security http://www.tenable.com/blog
Tools:
Online Domain Tools http://online-domain-tools.com/
Trend Micro Blog http://blog.trendmicro.com/
Trip Wire http://www.tripwire.com/state-of-security/topics/latest-security-news/
UMUC Cyber Program http://www.umuc.edu/cybersecurity/index.cfm
US-CERT https://www.us-cert.gov/
Vulnerabilities:
CVE http://cve.mitre.org/cve/index.html
OSVDB http://www.osvdb.org/
Like what you've seen so far? There's more at: Top 100 Cyber Resources http://ddosattackprotection.org/blog/cyber-security-blogs/