The Cyber Shafarat - Treadstone 71

We See What Others Cannot – WWW.TREADSTONE71.COM

Category: counterstrike

31 Posts

Featured

amnpardaz, anonymous, ashiyane, basij, behavior analysis, behrooz kamalian, CICBK, CICMM, cio, ciso, Clandestine, counterintelligence, counterstrike, cyber intelligence, Cyber Intelligence Capability Maturity Model, Cyber Intelligence CBK, Cyber Intelligence Common Body of Knowledge, Cyber Operations, cyber psyops, cyber threat intelligence, cyber training, cyber warfare, espionage, green revolution, HBO, HUMINT, intelligence analysis, intelligence training, Iran, irgc, offsec, Threat intelligence, threat intelligence training, Treadstone 71 Cyber Intelligence Capability Maturity Model

Behzad Mesri – #HBO Hack – Silent Terror

Featured

active defense, adversaries, CEO, CFO, CICBK, CICMM, cio, ciso, Clandestine, counterintelligence, counterstrike, cyber intelligence, Cyber Intelligence Capability Maturity Model, Cyber Intelligence CBK, Cyber Intelligence Common Body of Knowledge, Cyber Operations, cyber psyops, cyber security, cyber threat intelligence, cyber training, cyber warfare, Drone, Drone wars, drones, espionage, gerasimov, GRU, HUMINT, hybrid warfare, information security, infosec, intelligence analysis, Intelligence Estimate, intelligence training, Non-linear warfare, oppression, osint, physical security, PLC, Programmable logic controller, russia, sabotage, satellite, scada, self defense, target centric, target-centric, Threat intelligence, threat intelligence training, tradecraft, Treadstone 71 Cyber Intelligence Capability Maturity Model, United Nations

Zapad Exercises – 2nd/3rd Order Effects

Featured

active defense, adversaries, CEO, CFO, china, CICBK, CICMM, cio, ciso, Clandestine, counterintelligence, counterstrike, cyber intelligence, Cyber Intelligence Capability Maturity Model, Cyber Intelligence CBK, Cyber Intelligence Common Body of Knowledge, Cyber Operations, cyber psyops, cyber security, cyber threat intelligence, cyber training, cyber warfare, Drone, Drone wars, drones, espionage, hybrid warfare, intelligence analysis, Intelligence Estimate, intelligence training, Iran, irgc, isil, isis, islamic extremists, islamic state, kansas state university, Legal Counsel, mercenary, Non-linear warfare, physical security, rsa conference, russia, sabotage, sans, sanspaper, sanstip, satellite, scada, Security Awareness, self defense, socsummit, target centric, target-centric, terror, terrorism, Terrorist, terrorists, Threat intelligence, threat intelligence training, tradecraft, Treadstone 71 Cyber Intelligence Capability Maturity Model, UAS, UAV

Drone Wars! Threats, Vulnerabilities and Hostile Use

Featured

CICBK, CICMM, Clandestine, counterintelligence, counterstrike, cyber intelligence, Cyber Intelligence Capability Maturity Model, Cyber Intelligence CBK, Cyber Intelligence Common Body of Knowledge, Cyber Operations, cyber psyops, cyber threat intelligence, cyber training, cyber warfare, espionage, gerasimov, GRU, hybrid warfare, intelligence analysis, Intelligence Estimate, intelligence training, oppression, physical security, PLC, Programmable logic controller, russia, sabotage, terror, Threat intelligence, threat intelligence training, United Nations

Valery Vasilevich Gerasimov – Валерий Васильевич Герасимов

Featured

adversaries, Clandestine, counterintelligence, counterstrike, cyber intelligence, Cyber Intelligence Capability Maturity Model, Cyber Intelligence CBK, Cyber Intelligence Common Body of Knowledge, Cyber Operations, cyber psyops, cyber security, cyber threat intelligence, cyber training, cyber warfare, espionage, information security, intelligence analysis, Intelligence Estimate, intelligence training, osint, physical security, russia, sabotage, self defense, sock puppet, sockpuppets, socsummit, Syrian Electronic Army, terror, terrorism, Terrorist, terrorists, Threat intelligence, threat intelligence training, Treadstone 71 Cyber Intelligence Capability Maturity Model, United Nations

Dru’a al-Waaqiah lil-Bedoon – Syrian Sanctions Busting with Russian Help

Featured

adversaries, anonymous, ashiyane, behavior analysis, CEO, CFO, CICBK, CICMM, cio, ciso, Clandestine, counterintelligence, counterstrike, cyber intelligence, Cyber Intelligence Capability Maturity Model, Cyber Intelligence CBK, Cyber Intelligence Common Body of Knowledge, Cyber Operations, cyber psyops, cyber threat intelligence, cyber training, cyber warfare, espionage, GRU, HUMINT, hunt, ics, incident response, information security, infosec, intelligence analysis, Intelligence Estimate, intelligence training, osint, PLC, Programmable logic controller, Reporting, rsa conference, russia, sabotage, sans, sanspaper, sanstip, scada, target centric, target-centric, Threat intelligence, threat intelligence training, tradecraft, Treadstone 71 Cyber Intelligence Capability Maturity Model

Dragonfly 2.0? Delta Elektroniks and Pre-embedded Malware

Featured

amnpardaz, anonymous, cio, ciso, Clandestine, counterintelligence, counterstrike, cyber intelligence, Cyber Operations, cyber psyops, cyber security, cyber threat intelligence, cyber training, cyber warfare, HUMINT, hunt, ics, incident response, information security, intelligence analysis, Intelligence Estimate, intelligence training, Iran, irgc, ISSA, ISSAINTL, offsec, osint, sharif university, Threat intelligence, threat intelligence training

Status – Iranian Hacking Tools