🜄🜄X7

@VV_X_7

Adversary Emulation & Cyber Threat Intelligence

Montreal, Canada
Vrijeme pridruživanja: ožujak 2019.

Tweetovi

Blokirali ste korisnika/cu @VV_X_7

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @VV_X_7

  1. proslijedio/la je Tweet
    prije 10 sati

    Over the past three years, the DFRLab has published extensively on political disinformation online. Today, we are happy to announce the “Dichotomies of Disinformation,” a project made possible by to codify the many campaigns we have reported on.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 15 sati

    Amazing work by team for making a useful resource for disinfo researchers (major thanks to , , & ) Our team along with made a disinformation interactive platform. Link in the next tweet.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    28. sij

    It’s with great pleasure I'm (finally) releasing my docker images. Images are optimised for home and enterprise use. Some cleanup work to do (see issues), but its been in prod for months now. Github: DockerHub:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. velj

    What if you could mount TheHive as a remote filesystem? What if you could very simply access all files added to a case, as observables or attached to tasks from your investigation machine? TheHive 4.0-RC1. End of February 2020.…

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    HydraNFC v2 AutoTuning with latest modifications provide amazing results reading ISO14443A Tags at more than 12cm and Reading ISO15693/Vicinity Tags at more than 16cm with default Antenna (Credit Card Size) Note: Small Batch shall be available in March 2020 stay tuned

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. velj

    Cyber twitter - any recommendations on readings that wrestle with assessing threat actor / operation sophistication akin to 's the legend of sophistication in cyber operations / 's useful fundamental metrics for cyber power? Thanks in advance!

    Poništi
  7. proslijedio/la je Tweet

    If anyone is into OSINT, and wants to work with me over the next year on information operations and disinformation, please get in touch! Likewise, mightily obliged if you could pass on to anyone who might be interested

    Prikaži ovu nit
    Poništi
  8. 1. velj

    Verifying myself: I am vvx7 on . kUaO-n_-q7uzNsFFBUXfQeSaNfrUleqt8xvd /

    Poništi
  9. proslijedio/la je Tweet
    29. sij

    CanSecWest is offering a free training and conference admission to the top 4 talk submissions from someone 25 or younger! All qualifying submissions also get a 10% discount on conference ticket. That’s basically a $5000 USD grant to the top 4 submissions. Please share!

    Poništi
  10. 29. sij

    Added some new misp-objects to to better describe influence operations. More on their way.

    Poništi
  11. proslijedio/la je Tweet
    28. sij
    Poništi
  12. proslijedio/la je Tweet
    27. sij

    pocorgtfo20.pdf, "Grab gifts from the genizah, reading every last page! And write in their margins! And give them all again!"

    Poništi
  13. proslijedio/la je Tweet
    27. sij
    Poništi
  14. proslijedio/la je Tweet
    26. sij

    Want to watch 6 disinfo operations unfold in 6 minutes? Thanks to a Open Source Support grant, I’ve done just that with network visualization and documented some interesting patterns on Medium 1/

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    27. sij

    If you are a new ISAC and want to start a sharing community, don't forget we have a document made with X-ISAC "Guidelines to setting up an information sharing community such as an ISAC or ISAO"

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    26. sij

    Let’s be frank! Cyber Attack Models via ... nice seeing AMITT framework recognized... Misinfosec Working Group

    Poništi
  17. proslijedio/la je Tweet
    25. sij

    Threat Bus: a real-time pub/sub broker to get intelligence/indicators from and feed your in real-time & get sightings from your NIDS to MISP. A clever way to connect efficiently open source security tools. Thanks to

    Poništi
  18. 24. sij

    integration with is really interesting. This is such a great project.

    Poništi
  19. proslijedio/la je Tweet
    21. sij

    Tickets are live for 2020!

    Poništi
  20. proslijedio/la je Tweet
    21. sij

    Caldera 2.5.1 just released, details on GitHub. Big features: 1) C2 over Gist now an option, 2) potential links allow you to add TTPs to an active operation, 3) Operations will track the detection probability of TTPs

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·