Month: February 2018

Confuser and Oilrig – Iranian Hacks

This is a bit disjointed at this time and is raw data. This is not intelligence, has not been analyzed but does tie directly to Oilrig. A powerful program to pack your apps. With this program, you can pack programs in C # and VB.Net Confuser - Confuser program zipped. For download and analysis a1ir3z4-HK Frequently found on anonysec.org, c-cracking.org, formerly of the Kalli Hack Team (kallihack), http://haraji.8tag.ir Others in the mix: XVII_Hacker, #XVII_Roman &…

Read More

Iranian Hacking – Saudi Sites – Bruteforcing facebook zhacker

zhacker

Read More

Treadstone 71 Selected to Deliver at the RSA Conference 2018 San Francisco

Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided

Read More

Plague of the Cyber RATS

a new era of warfare… a destructive and deadly mix of conventional military might and malicious cyber attacks

Read More

Intelligence Training – Timely, focused, hands-on

Intelligence Tradecraft CounterIntelligence Clandestine Cyber HUMINT Cyber Psyops Persona Creation and Management Cyber Influence Operations Middle Eastern Cyber Warfare Tradecraft Blended courses Courses on demand Courses developed per your needs, quietly and quickly Treadstone 71    

Read More

Artificial intelligence is surely one thing – artificially defined and erroneously articulated

As I look at the threat intelligence platforms and other IT solutions claiming to be artificial intelligence platforms, I can only surmise that this coincidence is in lockstep with the dumbing down of America. “Artificial intelligence is intelligence displayed by machines, in contrast with the natural intelligence displayed by humans and other animals,” as defined by Wikipedia surmises that computer systems must display the same level of intelligence as humans or even animals. If this…

Read More