ISIS

Terrorism WEEKLY DIGEST – THREAT INTELLIGENCE FEED Jul.03-Jul.10, 2016Terrorism WEEKLY DIGEST – THREAT INTELLIGENCE FEED Jul.03-Jul.10, 2016

Terrorism WEEKLY DIGEST – THREAT INTELLIGENCE FEED Jul.03-Jul.10, 2016

Terrorism - JIHADIST OPS - Jul.03-10, 2016 - This is merely an intel brief. Subscribe GII for a more comprehensive…

9 years ago
Hacker Interviews – s1egeHacker Interviews – s1ege

Hacker Interviews – s1ege

Today, thanks to the support of Aveek Sen, I have interviewed the hacker that goes online with the pseudonymous of…

9 years ago
Ghost Squad hackers dox United Cyber Caliphate including Mauritania AttackerGhost Squad hackers dox United Cyber Caliphate including Mauritania Attacker

Ghost Squad hackers dox United Cyber Caliphate including Mauritania Attacker

Hacktivists from Ghost Squad Hacker group made revealed the identities of hackers affiliated with the ISIS cyber army called United…

9 years ago
Government wiretaps – You can’t stop what you can’t seeGovernment wiretaps – You can’t stop what you can’t see

Government wiretaps – You can’t stop what you can’t see

Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true.…

9 years ago
Pro-ISIS Hackers Have Been Flexing Their Muscles – But Is There Any Real Cause For Concern?Pro-ISIS Hackers Have Been Flexing Their Muscles – But Is There Any Real Cause For Concern?

Pro-ISIS Hackers Have Been Flexing Their Muscles – But Is There Any Real Cause For Concern?

Lion Caliphate, of Caliphate Cyber Army (CCA) and United Cyber Caliphate (UCC) notoriety, briefly left Facebook last week but returned…

9 years ago
Phineas Fisher hacked a bank to support anti-capitalists in the Rojava regionPhineas Fisher hacked a bank to support anti-capitalists in the Rojava region

Phineas Fisher hacked a bank to support anti-capitalists in the Rojava region

Phineas Fisher, the notorious Hacking Team hacker, stole $10,000 from a bank and donated the equivalent in Bitcoin to Kurdish…

9 years ago
Covert Communication Techniques Used By Next Gen High Tech TerroristsCovert Communication Techniques Used By Next Gen High Tech Terrorists

Covert Communication Techniques Used By Next Gen High Tech Terrorists

With the advent of technology, terrorists have changed their strategies and converted themselves into high-tech & sophisticated groups. “While Osama…

9 years ago
Isis hackers claim to have infiltrated the UK Ministry of DefenceIsis hackers claim to have infiltrated the UK Ministry of Defence

Isis hackers claim to have infiltrated the UK Ministry of Defence

Pro-ISIS hackers belonging to the Islamic State Hacking Division group brag they have planted a mole at the heart of…

9 years ago
Governance rules give more cyber power to the EuropolGovernance rules give more cyber power to the Europol

Governance rules give more cyber power to the Europol

The European Parliament’s civil liberties committee has approved new governance rules that give Europol new cyber powers to tackle down…

9 years ago
Analyzing Cyber Capabilities of the ISISAnalyzing Cyber Capabilities of the ISIS

Analyzing Cyber Capabilities of the ISIS

The data intelligence firm Flashpoint has published an interesting report that explore the cyber capabilities of the ISIS radical group.…

9 years ago