• THEY state that advanced persistent threats will cease to exist this year only to be replaced with deeper attacks
RSS  Subscribe:  RSS feed
Lords of Cyber
I deliver you a fleet that is mistress of the seas

Knowledge is Power

  • 4,066,464 hits

Abstract

  • DFIR
  • MiRai
  • (h)ashes
  • GZK Cutoff
  • Go4Nuke? B***
  • Uncover
  • Bleachbit B***
  • Guɔɔifɘr 2.0
  • Mighty Real
  • Vast Domain
  • EtheReal
  • Exfiltration
  • AbstruSe
  • The Creators
  • PBD
  • AragOrn
  • REMSEC
  • ProjectSauron
  • ANN
  • Gryphon X
  • UAS
  • TA3
  • Patchwork
  • First Sample
  • AI & Human
  • Delay ؟
  • Stealth Defence
  • ZDE
  • M.O.D.E.
  • 28nm processor
  • Convergence
  • ReRAM
  • pheromonal markers
  • Elimination
  • PrivLib
  • Enticing Decoy
  • Storage Medium
  • The Longer, The More
  • Palida
  • Subtle Effectivity
  • Mis-attribution
  • Normal Workday (reminder)
  • By its nature
  • inherently indiscriminate
  • as though
  • strange attractors
  • Waiting 4 Wassenaar
  • Usual Mitm
  • GIDM Honeypots
  • Semiotic Mismorphism
  • Vuls
  • ∼ Tyranus
  • Metasource Intelligence
  • Epistemologic KWar
  • Semantic Liaisons
  • Ornithologic Morpheme
  • Humming A.I.
  • Zendia Fragrancy
  • Biased Heuristics
  • Bloch Sphere
  • Apoptosis
  • PHMMs
  • Stochastic Strikes
  • Strict Initial Object
  • Measureless Reengineering
  • F ⊢ Tr(⌈A⌉) ↔ A
  • APT Arms Race
  • Salamander Aposematism
  • Taxonomy Subclass
  • Algorithmic Attacks

κυβερνητικός – skilled in steering or governing –

…if the bits never swerve so as to originate some new movement that will snap the bonds of fate…

Cyber Hegemony Seeds

Map

Their Value in Their Scarcity.

Thesaurus

.lnk 0x86F186F1 0x8000 0xB31FB31F A.I. A.I.A. Advanced targeted attacks agent btz air-gapped systems algorithm algorithmic attacks algorithmic complexity attacks alteration Animal Farm ANN anti-apt prototype apt Apt Group arp spoofing Artificial Immune Systems Attackers Attack Tree Attack Vectors Attribution axiom of choice Babel backdoor Banana Glee Bekenstein Bound Bioinformatics Bioinspired biotemplate Bleachbit bloch sphere Boltzmann Breach Bremermann's limit browse32.ocx bug Bugs C&C Camellia Castle of the Lake certificates CloudDuke Cloudlook code Comment Crew Computational Chemistry contingency plans Controllers control systems cosmicduke countersigns cozyduke Critical Penetration Analysis critical systems cryptographic design cryptology crysys Crytography CVE-2014-6324 CVE-2015-2360 CVE-2015-7871 CVE® Cyberattack cyber bomb Cyber Deception Cyber Genome cyber intelligence Cyber Offense CYBER OPERATIONS cybersecurity cybersleuthing cyberspace Cyberspies cyber spying cyberwar cyberwarfare cyber warfare cyberweapon Cyberweaponry damage dark tyrannus data manipulation decoy Dempster Shafer theory destruction Deterrence dew queue DFIR dhcp spoofing digital ants Dino DNA dna error correction dns spoofing Dooku DRD4 dropper Dukes Duqu 2.0 duqu 3.0 dyü-kyü détection eavesdropping electronic data elliptic curve encryption key encryption keys Entropy epic turla Equation Equation Group EquationLaser Espistemology Euler Evilbunny eЯsa Fanny Firewalls Flame Flamer Forensic FPGAs Full Spectrum fusion warfare Game Theory gauss GeminiDuke gen_random GIDMs gif Grover Gryphon X gsmem Guccifer 2.0 GZK Cutoff hacking team HACMS Halting Problem HammerDuke hashva hermeneutics Heuristics HI&RH Hidden Markov Model holistic artefact Honeypots humint Hummingbird icmp redirection idaho lab IEC 62443-2-4 In-Q-Tel Information Information Theory Inherently indiscriminate cyber weapon injectors insiders interoperability Invocation IOCs IoT is_authentic Kernel Mode Hooking KMS KWar Lateral attack Lineage Logging Function Loop Quantum Gravity Lord of the Rings LQG Magic Numbers magic string Mildec militarized spyware minidionis MiniDuke Mirai misattribution Mismorphism mitm Mitre MTTD MTTR Multipattern String Matching Mutexes myrtus mytrampoline nanocube nanokernels nasa Nash Equilibrium Nopen NS NTFS nuclear warfare Number theory Nyquist Plot obfuscation olympic games OnionDuke Ontologies OO-C Palida Narrow Pass the Hash Patchwork patient zero payload payloads PBD Perimeter persistence PHMM Phrasor Measurement Units PinchDuke pipe backdoor Port Forwarding port stealing precommitment predictability Predictive Analysis prkMtx ProjectSauron PROP proxies PSSE quantum computing Quantum Effect Quantum Level Quantum Paradox qubits Qwerty R&D Regin Remsec ReRAM Retaliatory Responses reverse engineering Rhimes ROP rtus scada SeaDuke seL4 Semantic Cyber Attack Semiotics SHA-1 Shoot Look Shoot Shor sifi sigint site SLS Source Code Space Time SPoF Spyware STATE SPONSORED storage medium stp mangling strange attractors streaming algorithm Strict Initial Object Strider Strings stuxnet Sub-signals subclass sybil taxonomy Telcóntari The Attackers THEY Thunderstrike 2.0 Tier VI time stamp Tirat Haagam traceback truth table TTP tttttttt Tunneling turla uas ugly.gorilla undefinability theorem Uroboros Vectors Viruses Void Set vulnerabilities win32k.sys Windows-1251 wiper xor xumuxu group Yara Rules zde zendia Zero Days Zipf's law ~ DQ Πυθία Загрузчик שרי הסייבר द्यौष्पितृ ∅

True Intelligence is not Knowledge but Imagination.

Duqu 2015 JPEG

Where the wild thyme blows, Where 0x0001lips and the nodding violet grows, Quite over-canopied with luscious woodbine, With sweet musk-roses and with eglantine

Advertisements
Blog at WordPress.com.