THEY state that advanced persistent threats will cease to exist this year only to be replaced with deeper attacks
RSS
Subscribe:
RSS feed
Lords of Cyber
I deliver you a fleet that is mistress of the seas
Interfaces
Posted on 18 September 2015
0
Lords of Mutexes
Share this:
Share
Twitter
LinkedIn
Facebook
Email
Like
Loading...
Related
Tagged:
Duqu 2.0
,
THEY
Posted in:
CyberWarfare Information Warfare
← Joint-XOR
No Samples →
Be the first to start a conversation
Leave a comment
Cancel reply
Δ
Knowledge is Power
4,072,532 hits
Abstract
DFIR
MiRai
(h)ashes
GZK Cutoff
Go4Nuke? B***
Uncover
Bleachbit B***
Guɔɔifɘr 2.0
Mighty Real
Vast Domain
EtheReal
Exfiltration
AbstruSe
The Creators
PBD
AragOrn
REMSEC
ProjectSauron
ANN
Gryphon X
UAS
TA3
Patchwork
First Sample
AI & Human
Delay ؟
Stealth Defence
ZDE
M.O.D.E.
28nm processor
Convergence
ReRAM
pheromonal markers
Elimination
PrivLib
Enticing Decoy
Storage Medium
The Longer, The More
Palida
Subtle Effectivity
Mis-attribution
Normal Workday (reminder)
By its nature
inherently indiscriminate
as though
strange attractors
Waiting 4 Wassenaar
Usual Mitm
GIDM Honeypots
Semiotic Mismorphism
Vuls
∼ Tyranus
Metasource Intelligence
Epistemologic KWar
Semantic Liaisons
Ornithologic Morpheme
Humming A.I.
Zendia Fragrancy
Biased Heuristics
Bloch Sphere
Apoptosis
PHMMs
Stochastic Strikes
Strict Initial Object
Measureless Reengineering
F ⊢ Tr(⌈A⌉) ↔ A
APT Arms Race
Salamander Aposematism
Taxonomy Subclass
Algorithmic Attacks
κυβερνητικός – skilled in steering or governing –
…if the bits never swerve so as to originate some new movement that will snap the bonds of fate…
Cyber Hegemony Seeds
Their Value in Their Scarcity.
Thesaurus
.lnk
0x86F186F1
0x8000
0xB31FB31F
A.I.
A.I.A.
Advanced targeted attacks
agent btz
air-gapped systems
algorithm
algorithmic attacks
algorithmic complexity attacks
alteration
Animal Farm
ANN
anti-apt prototype
apt
Apt Group
arp spoofing
Artificial Immune Systems
Attackers
Attack Tree
Attack Vectors
Attribution
axiom of choice
Babel
backdoor
Banana Glee
Bekenstein Bound
Bioinformatics
Bioinspired
biotemplate
Bleachbit
bloch sphere
Boltzmann
Breach
Bremermann's limit
browse32.ocx
bug
Bugs
C&C
Camellia
Castle of the Lake
certificates
CloudDuke
Cloudlook
code
Comment Crew
Computational Chemistry
contingency plans
Controllers
control systems
cosmicduke
countersigns
cozyduke
Critical Penetration Analysis
critical systems
cryptographic design
cryptology
crysys
Crytography
CVE-2014-6324
CVE-2015-2360
CVE-2015-7871
CVE®
Cyberattack
cyber bomb
Cyber Deception
Cyber Genome
cyber intelligence
Cyber Offense
CYBER OPERATIONS
cybersecurity
cybersleuthing
cyberspace
Cyberspies
cyber spying
cyberwar
cyber warfare
cyberwarfare
cyberweapon
Cyberweaponry
damage
dark tyrannus
data manipulation
decoy
Dempster Shafer theory
destruction
Deterrence
dew queue
DFIR
dhcp spoofing
digital ants
Dino
DNA
dna error correction
dns spoofing
Dooku
DRD4
dropper
Dukes
Duqu 2.0
duqu 3.0
dyü-kyü
détection
eavesdropping
electronic data
elliptic curve
encryption key
encryption keys
Entropy
epic turla
Equation
Equation Group
EquationLaser
Espistemology
Euler
Evilbunny
eЯsa
Fanny
Firewalls
Flame
Flamer
Forensic
FPGAs
Full Spectrum
fusion warfare
Game Theory
gauss
GeminiDuke
gen_random
GIDMs
gif
Grover
Gryphon X
gsmem
Guccifer 2.0
GZK Cutoff
hacking team
HACMS
Halting Problem
HammerDuke
hashva
hermeneutics
Heuristics
HI&RH
Hidden Markov Model
holistic artefact
Honeypots
humint
Hummingbird
icmp redirection
idaho lab
IEC 62443-2-4
In-Q-Tel
Information
Information Theory
Inherently indiscriminate cyber weapon
injectors
insiders
interoperability
Invocation
IOCs
IoT
is_authentic
Kernel Mode Hooking
KMS
KWar
Lateral attack
Lineage
Logging Function
Loop Quantum Gravity
Lord of the Rings
LQG
Magic Numbers
magic string
Mildec
militarized spyware
minidionis
MiniDuke
Mirai
misattribution
Mismorphism
mitm
Mitre
MTTD
MTTR
Multipattern String Matching
Mutexes
myrtus
mytrampoline
nanocube
nanokernels
nasa
Nash Equilibrium
Nopen
NS
NTFS
nuclear warfare
Number theory
Nyquist Plot
obfuscation
olympic games
OnionDuke
Ontologies
OO-C
Palida Narrow
Pass the Hash
Patchwork
patient zero
payload
payloads
PBD
Perimeter
persistence
PHMM
Phrasor Measurement Units
PinchDuke
pipe backdoor
Port Forwarding
port stealing
precommitment
predictability
Predictive Analysis
prkMtx
ProjectSauron
PROP
proxies
PSSE
quantum computing
Quantum Effect
Quantum Level
Quantum Paradox
qubits
Qwerty
R&D
Regin
Remsec
ReRAM
Retaliatory Responses
reverse engineering
Rhimes
ROP
rtus
scada
SeaDuke
seL4
Semantic Cyber Attack
Semiotics
SHA-1
Shoot Look Shoot
Shor
sifi
sigint
site
SLS
Source Code
Space Time
SPoF
Spyware
STATE SPONSORED
storage medium
stp mangling
strange attractors
streaming algorithm
Strict Initial Object
Strider
Strings
stuxnet
Sub-signals
subclass
sybil
taxonomy
Telcóntari
The Attackers
THEY
Thunderstrike 2.0
Tier VI
time stamp
Tirat Haagam
traceback
truth table
TTP
tttttttt
Tunneling
turla
uas
ugly.gorilla
undefinability theorem
Uroboros
Vectors
Viruses
Void Set
vulnerabilities
win32k.sys
Windows-1251
wiper
xor
xumuxu group
Yara Rules
zde
zendia
Zero Days
Zipf's law
~ DQ
Πυθία
Загрузчик
שרי הסייבר
द्यौष्पितृ
∅
True Intelligence is not Knowledge but Imagination.
Duqu 2015 JPEG
Where the wild thyme blows, Where 0x0001lips and the nodding violet grows, Quite over-canopied with luscious woodbine, With sweet musk-roses and with eglantine
Comment
Reblog
Subscribe
Subscribed
Lords of Cyber
Join 455 other subscribers
Sign me up
Already have a WordPress.com account?
Log in now.
Lords of Cyber
Customize
Subscribe
Subscribed
Sign up
Log in
Copy shortlink
Report this content
View post in Reader
Manage subscriptions
Collapse this bar
Loading Comments...
Write a Comment...
Email (Required)
Name (Required)
Website
%d
Posted on 18 September 2015
0