PinnedPublished inOSINT TeamAnnual Threat Assessment of the US IC — Countering Chinese Cyber Operations & DisinformationA multi-layered Cyber Strategy to counter Chinese Disinformation and Cyber OperationsMar 30A response icon1Mar 30A response icon1
PinnedPublished inOSINT TeamUAC-0133 (Sandworm) plans for cyber sabotage at almost 20 critical infrastructure facilities in…Translation of the latest UA-CERT alert published today & Technical Analysis of QUEUESEED which is the KAPEKA Backdoor used in June 2022 in…Apr 19, 2024Apr 19, 2024
PinnedPublished inT3CHUnderstanding Russian Cognitive WarfareIrregular Warfare a Strategic Estimate and COAApr 2Apr 2
PinnedPublished inOSINT TeamBlack Basta Playbook Chat LeakThe ultimate Testing-Threat Hunting-Detection-Engineering- Workflow-Playbook-Incidents-Response-PlanFeb 24A response icon1Feb 24A response icon1
PinnedPublished inDetect FYIPlaybook Hunting Chinese APTChinese APT TTPs and LOLBAS OperationsJan 1A response icon1Jan 1A response icon1
Countering Cognitive Warfare: The Need for a Defense Ontology MatrixHow to use D3FEND and MITRE ATT&CK to develope a COGNITIV3 matrix1d ago1d ago
From Alerts to Armistice: Why Cybersecurity Without Geopolitics Is a Losing GameDetection Alone Isn’t Defense, Winning the Cyber War Requires Strategic Minds, Not Just Technical Eyes3d ago3d ago
Gangstalking Networks Have Mutated into Transnational Threats — Irregular Warfare Is the Only…History of Gangstalking and how we lost the control4d ago4d ago
Silent Invasion: How STASI Gangstalking Fuels Germany’s Migration and Drug CrisisA covert system of psychological warfare rooted in Stasi tactics and modernized by digital networks, crimes against humanity4d ago4d ago
Published inT3CHProject FREIHEIT: The Cultural Resistance Index“In a world full of algorithms, be a damn Brezel.”May 6May 6