Cyber Threat Intelligence

Training Report – Treadstone 71 Cyber Intelligence Tradecraft Professional Certification

I would highly recommend this course to anyone looking to further their knowledge in the cyber area. It will also allow you to become a better intelligence analyst, as a whole.

Read More

Wilderness of Shlemiels 

Thurs 9:15 AM Moscone South 307. Treadstone 71 talk on adversary infiltration target centric DandD @RSAConference ‬https://www.rsaconference.com/events/us17/agenda/sessions/6113-wilderness-of-shlemiels Register ahead of time for a seat Be there! www.treadstone71.com

Read More

Full Suite of Cyber-Threat Intelligence and Counterintelligence Courses Ready for Global Delivery

HALF MOON BAY, CA (PRWEB) JANUARY 25, 2017 Treadstone 71 today announced a full suite of Cyber and Threat Intelligence and CounterIntelligence training courses. The courses drive the expansion of Treadstone 71’s accelerated, academically validated, intelligence training to global markets. Treadstone 71 delivers courses in California, Virginia, Canada, the United Kingdom, and the Netherlands and is set to expand to the Middle East and Asia later this year. (www.planetreg.com/T71IntelTraining) Treadstone 71 offers a compelling business…

Read More

We Are in a State of Cyber Cold War?

Wisdom begins with the definition of terms – Socrates Many believe that we are not in some sort of state of cyber warfare. Many believe that it is only influence operations. These are the same people who are selling you security technologies and services to protect your environment. They believe calling our current state cyber war is hype. They fact that they believe this is demonstrated in their technologies that have double and triple downed…

Read More

Iranian SQLMap Regurgitation

[wpvideo nFE9Mrzx] SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. The above is a repurposed video on how to use this tool as circulated by Iranian hackers.  

Read More

Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures

This article is partially written in analytic writing format starting with the conclusions first. The Conclusion section does not include normal analytic paragraphs and alternative analysis following standard intelligence tradecraft analytic writing. Instead, the Recommendations and Opportunities section represents supervisory actions. The article uses the Admiralty System or NATO System as a method for evaluating collected items of intelligence recognized by a letter/number combination found after article citations. The article discusses the issues associated with…

Read More