cyber espionage

Cyber Battalion Empowerment Courses in Abali – Iranian Basij Cyber Battalions

Iranian observers review of Basij Cyber Training ranging from cyber personas, denial and deception, hard core hacking, impersonation of groups associated with Reza Pahlavi and associated groups, trolling, and infiltration of American organizations.

Read More

Network+ Iranian recommended

#Network Plus In this post, I'll outline how the hacker needs a Networks plug-in, and we'll also look at what matters in the course of the discussion, and to what extent we need to know how sensitive it is to us. This is the second item of the Roadmap ... In this course, we have some important discussions like the router and what it does, what is routing between networks, metric metrics in routing, switches,…

Read More

Day 2 and 3 #VAJA #MOIS data release from Parastoo as of 16:00 May 5 ETD

Day one information Day 3 #Disclosure Staff and students at Tarbist Modarres University were victims of the Ministry of Intelligence! Databases at Tarbiat Modarres University have been hacked and infiltrated by unauthorized and unauthorized operations by the cyberattacher of the General Directorate 31332. The Attorney General and the Ministry of Information must be held accountable to whom and to what extent such permission has been given to the massive espionage of the nation by the…

Read More

Cyber Intelligence Collection Managers Course

Treadstone 71 Cyber Intelligence Manager's Course Course syllabus and content proprietary to Treadstone 71 For questions on the course, contract Treadstone 71 at osint AT treadstone71 DOT com All who sign up must agree to the Course EULA. Signing up for the course indicates click-through consent. Three-day course https://reg.planetreg.com/COLLECTIONMANAGER Non-inclusive Course Outline: Treadstone 71 Cyber Intelligence Collection Manager’s Course Collection Planning Interpretation of Stakeholder Needs PIRs / SIRs Mission and Requirements Management Convert RFI’s to…

Read More

Coincidences Take A Lot of Planning – RSA Conference 2018 – San Francisco

The RSA Conference is soon upon us! The expectation to see old friends and make new acquaintances. The show will once again be great with new technologies displayed, new ideas bantered about, and phrases around AI used inappropriately and about 5-10 years too soon. The parties will crank at night and many will suffer the cocktail flu come the next morning. 40,000 strong is the estimated number for this event! Huge! کنفرانس RSA 2018  rsa-конференция…

Read More

Active Defense – Strike, CounterStrike, Mercenary or Vigilante?

The opponent lands combination after combination to the head, ribs, and kidneys. This barrage continues until the defender boxer is knocked out, dragged off the mat to hopefully fight another day. The fighter cannot continue. (Bardin, 2011) This picture is much like our cyber defenses today. Culturally trained to block every punch, cyber defenses attempt to detect where the next punch will hit. Standing toe-to-toe with an adversary that is much more devious, much more…

Read More