[QILIN] - Ransomware Victim: Cacspmec - https://www.redpacketsecurity.com/qilin-ransomware-victim-cacspmec/
![[QILIN] – Ransomware Victim: Cacspmec [QILIN] – Ransomware Victim: Cacspmec](https://files.shakedown.social/cache/preview_cards/images/010/283/409/original/b6510f9f6a92e43a.png)
[QILIN] - Ransomware Victim: Cacspmec - https://www.redpacketsecurity.com/qilin-ransomware-victim-cacspmec/
[NIGHTSPIRE] - Ransomware Victim: TeamLease - https://www.redpacketsecurity.com/nightspire-ransomware-victim-teamlease/
@ip6li ich sag mal so: Das was @bsi für @Bundesregierung bis hinauf zu @bnd zertifiziert ist fahrlässig!
Besonders seitens gewisser "Dienstleister" und "Hersteller" angesichts derer internen #IT halte ich es für gemeingefährlich naiv zu glauben, dass diese sicher ist.
Ich meine, es wäre kriminell naiv anzunehmen dass jene #Govware die dort eingesetzt wird kein #Killswitch integriert hat, selbst wenn wir glauben dass weder #Russland noch die #USA oder sonstwer sich nicht bereits #Zugang verschafft oder #Personal angeworben hat, weil #TVöD-Bund ist halt ne Beleidigung im Vergleich zur (legalen!) Privatwirtschaft!
Je voulais choisir comme nom public de profil APTiger ‒ Chat FELINT24-27
mais je n'avais pas assez de place pour tout mettre et finalement j'ai seulement indiqué APTiger ‒ Chat FELINT27
Explication de la référence d'autodérision ironique humoristique :
APT = Advanced Persistent Threat (dans le cas de mon pseudo APTiger, "Advanced Persistent Tiger" et je rappelle une nouvelle fois pour les personnes qui ne sont pas équipées d'un processeur accélérateur du sens de l'humour, qu'il s'agit d'une plaisanterie d'autodérision ironique humoristique).
APT24 = Pretty Tiger, parmi d'autres noms connus. (https://www.hedgehogsecurity.co.uk/blog/apt24-the-strategic-spy)
APT27 = Iron Tiger, parmi d'autres nom connus dont Emissary Panda (https://attack.mitre.org/groups/G0027/)
Sachant que les tigres et les chats sont des félins, et que INT = Abréviation anglophone de Intelligence (traduit par "Renseignement" en français). ELINT = Electronic Intelligence ou en français "renseignement technique d'origine électromagnétique" ; donc FELINT est une plaisanterie de dérision humoristique qui signifie en français "Renseignement félin" ou "renseignement technique félin d'origine électromagnétique".
Okay fedipeeps, I need a favour. We're mobilizing against these events on the 24th of this month, which appear to be a well-funded, national far-right operation that's appeared out of nowhere in the UK.
Who are they, and where does their money come from? We can't afford to pay for your services, but we can promote you in many other ways, potentially in the media if you can dig up the dirt we need. We have the connections.
#infosec #OSINT #OSINTAnalysis
p r o p e r d e m o c r a c y . o r g
Legogpt Is Here To Make Your Blocky Dreams Come True - https://www.redpacketsecurity.com/legogpt-is-here-to-make-your-blocky-dreams-come-true/
Geolocation & GEOINT cheatsheet
- Google Maps Alternatives
- Aerial Imagery
- OSINT on the Ocean and in the air
- Open Streep Map and Overpass Turbo
- tips & tricks
and more.
https://cheatsheet.haax.fr/open-source-intelligence-osint/human-recon/geolocation/
nice watch?
if you're going to do crimes, do some prep regarding opsec
and don't post photos of it on the web, ffs
The Colonial Outcast podcast has a detailed report on drone strikes of the Gaza Aid vessel near the shores of Malta.
They also mentioned how similar this incident is to a previous one a decade ago that left 10 aid workers dead and caused significant political fallout at the time. For some reason Israel seems to think they can now do similar attacks with less cost now.
Alien's Eye: Hunt Down 570 Social Media Accounts Using AI #OSINT
https://darkwebinformer.com/aliens-eye-hunt-down-570-social-media-accounts-using-ai/
Focuses on hands-on tools such as TOR, i2p, Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, FOCA, EXIF, Metagoofil, MAT, and many more - Covers key technical topics such as metadata searching, advanced browsers and power searching, online anonymity, Darkweb / Deepweb, Social Network Analysis (SNA), and how to manage, analyze, and visualize the data you gather - Includes hands-on technical examples and case studies.
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques by Sudhanshu Chauhan & Nutan Kumar Panda, 2015
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online.
Responses to this meme/post are pretty polarized.
While it's very possibly to criticise a person I might reference, it sure seems as if for most posting that just looking for ANY reason on earth to not condemn the genocide in Gaza?
My next thought is, wow a random meme gets more "interaction" than my sober #OSINT posts.
Did some outdoor "#OSINT" today checking shop opening hours, vacancy status and other publicly available information in person, and even measured widths of streets and entrance gateways for #OpenStreetMap. It's a really fun pastime, you get to explore your neighborhood a bit more thoroughly, have a nice walk and casually contribute to a great project at the same time. Absolutely recommend it and the #StreetComplete app makes it super easy to become part of #OSM.
Oh man, I mean I am all for #OSINT, but you have to check things people:
#US Denies Picking #Bombing Targets From Random #Twitter Accounts
An anonymous OSINT sleuth mis-identified a quarry as an underground #Houthi base. Days later, the #Pentagon allegedly struck the site and killed eight people.
https://www.404media.co/u-s-denies-picking-bombing-targets-from-random-twitter-accounts/