Unskilled Pro-ISIS Hackers A Growing Threat
Pro-ISIS hackers promote violence and are making strides with new tools, tactics and procedures, establishing themselves as a growing threat. Continue reading Unskilled Pro-ISIS Hackers A Growing Threat
Collaborate Disseminate
Pro-ISIS hackers promote violence and are making strides with new tools, tactics and procedures, establishing themselves as a growing threat. Continue reading Unskilled Pro-ISIS Hackers A Growing Threat
Merger of ISIS-affiliated hacking teams an attempt to build credible threat. Continue reading As US drops “cyber bombs,” ISIS retools its own cyber army
By Agan Uzunovic
Pro-ISIS hackers from all over the world have joined hands
This is a post from HackRead.com Read the original post: United Cyber Caliphate (UCC), formation of a mega hacking group by ISIS
Continue reading United Cyber Caliphate (UCC), formation of a mega hacking group by ISIS
Cyber Command plans to mount hacking attacks that disrupt ISIS operations. Continue reading In a first, US military plans to drop “cyberbombs” on ISIS, NYT says
By Waqas
Richland County Websites including Sheriffs Department were Hacked by pro-ISIS
This is a post from HackRead.com Read the original post: Richland County Websites including Sheriffs Department Hacked
Continue reading Richland County Websites including Sheriffs Department Hacked
This works: Khan was arrested in mid-July 2015. Undercover police officers posing as company managers arrived at his workplace and asked to check his driver and work records, according to the source. When they disputed where he was on a particular day, he got out his iPhone and showed them the record of his work. The undercover officers asked to… Continue reading Bypassing Phone Security through Social Engineering
Tidbits from the New York Times: The final phase of Mr. Hame’s training took place at an Internet cafe in Raqqa, where an Islamic State computer specialist handed him a USB key. It contained CCleaner, a program used to erase a user’s online history on a given computer, as well as TrueCrypt, an encryption program that was widely available at… Continue reading ISIS Encryption Opsec
Interesting analysis from The Grugq: Bottom Line Up Front Intelligence agencies must cooperate more rapidly and proactively to counter ISIS’ rapid and haphazard operational tempo. Clandestine operatives must rely on support networks that include overt members of the public. These networks are easily mapped out based on metadata available to nation state level security forces. Fugitives should learn to cook… Continue reading Observations on the Surveillance that Resulted in the Capture of Salah Abdeslam
Looks like tens of thousands of ISIS documents have been leaked. Where did they come from? We don’t know: Documents listing the names of Islamic State fighters have been touted around the Middle East for months, dangled in front of media outlets for large sums of money. […] Ramsay said he met the source of the documents in Turkey, an… Continue reading Leaked ISIS Documents
The disillusioned ex-fighter brought with him a stolen USB drive containing names, addresses, and phone numbers of Islamic State jihadis. Continue reading IS defector steals USB stick revealing 22K members identities