PinnedPublished inOSINT TeamOSINT: Proxy Warfare with Rocker Milieu, Discord & TelegramThis article is about criminal networks organized in Germany and how they abuse Discord or Telegram. It is only one example of how…5d ago5d ago
PinnedPublished inDetect FYISensor Mappings to ATT&CK (SMAP) — a concrete example of how to use the SMAP for a real world…Chinese State Sponsored Threat Actors ntds.dit & ntdsutilJan 21, 2024Jan 21, 2024
PinnedPublished inT3CHAnalyzing UAC‑0099 Tactics, Techniques, and Procedures (2023–2025)What we can learn from the CERT-UA Alerts between 2023–2025Aug 9Aug 9
PinnedPublished inOSINT TeamBlack Basta Playbook Chat LeakThe ultimate Testing-Threat Hunting-Detection-Engineering- Workflow-Playbook-Incidents-Response-PlanFeb 24A response icon1Feb 24A response icon1
PinnedPublished inDetect FYIPlaybook Hunting Chinese APTChinese APT TTPs and LOLBAS OperationsJan 1A response icon2Jan 1A response icon2
The Truth is something in between — Russia, Iran, Hezbollah, Rosneft & HamasHow Russia launched at least 4,000 Iranian‑designed drones against Ukrainian targets3d ago3d ago
Invisible Triggers: The Demographic Profile of Male Psychosis-Driven Knife AttackersOr Ethical Dilemma of Psychiatric Systems in the Age of Reflexive Control5d ago5d ago
Dignity as Method- A Practical Guide to Resisting Hybrid HarassmentThe Anti-Zersetzung Handbook: Lawful Tactics to Beat Modern IntimidationOct 12Oct 12
The War in Ukraine - costs, financing, and the risk posed by pro Kremlin political networks in…Since Russia attacked Ukraine in February 2022, aid to Kyiv has reached staggering levels. By mid‑2025 governments worldwide had committed…Oct 12Oct 12
Russia’s Role in Sudan’s Humanitarian Catastrophe — Mercenaries, Reflexive Control and the…The humanitarian catastrophe in Sudan, particularly the repeated famines and the targeting of Christian communities, did not arise only…Oct 11Oct 11