infosec

Anti-Malware Scan Interface – #AMSI

• The abbreviation AMSI stands for Anti-Malware Scan Interface. Microsoft developed this technology as a method of protecting users from malware and first introduced it in Windows 10. AMSI intercepts scripts and commands in real time, after which it is sent to antivirus software for scanning. Here is a list of components that implement AMSI in Windows 10: User Account Control or UAC (elevation of the rights to install EXE, COM, MSI or ActiveX);• #PowerShell…

Read More

Real Authentic Documents – Buy Authentic Documents (And you can buy this watch)

https://realauthenticdocs.com/ Contact for ordersWhatsApp: +40 7723 433590Telegram: @diago35Website: https://realauthenticdocs.com WHAT YOU NEED TO KNOW ABOUT OUR SERVICESABOUT REAL AUTHENTIC DOCUMENTS We are the #1 producers of real and authentic documents. We help people with difficulties in obtaining document. Our association with numerous agents in embassies, different government institutions and interior or exterior ministries authenticate everything we process and ensure all of the real documents comply with all security features and successfully qualify all airport scans…

Read More

Treadstone 71’s CyberIntellipedia

This wiki is an online system for collaborative data sharing built and used by Treadstone 71 to aid in building Cyber Threat Intelligence programs while establishing intelligence sharing and communities of interest. CyberIntellipedia consists of multiple sections covering strategic planning, policies, procedures, templates, taxonomy, examples, dossiers, finished intelligence, estimative intelligence, open-source tools, adversary research, process flow diagrams, reporting, analytic tools and methods, threat intelligence TTPs, and more. From job descriptions and C-Suite presentations to cyber…

Read More

Cyber Battalion Empowerment Courses in Abali – Iranian Basij Cyber Battalions

Iranian observers review of Basij Cyber Training ranging from cyber personas, denial and deception, hard core hacking, impersonation of groups associated with Reza Pahlavi and associated groups, trolling, and infiltration of American organizations.

Read More

Holy Defense Museum Display of US Gear – UAV

Sardar Haji Zadeh, IRGC Air Force Commander:We are among the top five countries in the world in the field of UAVs. Today, the world's largest drone collection opens at the Museum of the Holy Defense and the Islamic Revolution. This museum is a museum for those who threaten the Iranian nation. We are the top five countries in the world in the field of UAVs. In addition, we have made some great progress in the…

Read More

Cybercrime (hiding activities in cyberspace) more #Iranian training

Friday, September 6, 1:50 pm The purpose of the training course During this course you will learn how to use the internet, social networks, etc. for your own purposes (offensive or defensive) without leaving any trace behind you and no one being able to identify the activities you have done. Prerequisites for this course Before attending this course, the student is required to have a basic understanding of basic networking concepts such as information transmission,…

Read More

Iran’s access to laser cannons

Sensitive Areasiran are protected by laser systems (#indicator) Deputy Minister of Defense Amir Shahrokh Shahram: "It is common in the world that UAVs make their composite layers to be both radar-friendly, lightweight, and to help keep them in the air. This composite body is vulnerable to high-power lasers, and we can destroy them with our own lasers. These laser systems are used in critical areas of the country Today, the world of laser technology is…

Read More

Lab_Dookhtegan Number 19

Implementation of Cyber Threat Security Monitoring System (SATA)

اطلاعاتInformation in transit is secured in communication networks SATA stands for "Threat Information Sharing and Analysis System" The SATA systemaims to analyze and monitor cyber security vulnerabilities, as public and private sectors in their network systems typically transmit information that needs to be secured. س The SATA system for sharing cyber threat information in the territory can share cyber and physical hazard analysis between stakeholders in this area, both public and private, members and upstream…

Read More