Skype for Business - Thotcon notes

Notes from thotcon 0x8. "It's just Skype for Business" by Karl Fosaaen

Intel: tips from Herbert E. Meyer, A recipient of the U.S. National Intelligence Distinguished Service Medal

Intelligence, like radar, is "the instrument that paints a picture of their environment, enabling them to see what’s going on around them and what lies ahead so they can chart a safe course. Radar doesn’t tell the captain and his crew what to do, but it gives them the accurate information they’ll need to make good decisions."

Cyber intel should provide decision support to security operations, security engineers, and security analysts. It should provide "accurate information they’ll need to make good decisions."

Andriod App Malware in Artillary Warfare

AI - Artificial Intelligence

"AI researchers grasping for grants and start-ups bounding after venture capital... engage in a bit of self-promoting hyperbole." (1)


1. "Robert Marks: What Computers Will Never Do" Brendan Dixon December 14, 2016 12:02 PM

Security coding blog tech55i - John Galbraith | A byte into Information Security

regular expression generator

Michigan, Muskegon County

NOAA Weather 162.475

151.14500 | Norton Shores Police | KTM982 RM 025 DPL NSPD Car-car Police Car-car
154.34000 | Norton Shores Fire | KTM982 RM 155 DPL NSFire Ch 2 NSFire Ch 2 / 7

155.49000 | KQA918 BM 107.2 PL MKG Co Disp County Police - Dispatch
155.70000 WNBK854 BM 151.4 PL MKG Co Car County Police - Car-to-Car FMN Law Talk
155.47500 WNQD336 BM 107.2 PL MKG Co Tac County Police - Tactical


"This antenna evolved during my search for a beam with a really great front-to-back ratio to use in hidden transmitter hunts. This design exhibits a very clean pattern and is perfect for RDF use."

Information Security Threat Detection: Applying SPACE Analysis

** work in progress **

Whether on the threat hunting team, or the monitoring and detection team, the SPACE opsec analysis tool may help. Let's see how it can apply to Information Security.

SPACE is an acronym that every good analyst should use, especially where it concerns community security. Its roots are in our operational security (OPSEC) manual, and when the adversary doesn’t care enough to implement SPACE into his security considerations, it’s our job as collectors and analyzers of information to exploit their mistakes. (1)

On the CSIRT team we are collectors and analyzers of information regarding our information systems and we need to look for, exploit, the mistakes of our adversary.


Subscribe to CyberMick's Blog RSS