Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 511 Vote(s) - 3.42 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[Unofficial] CyberOps | Cybersecurity Intelligence

#1
What is Cybersecurity Intelligence?
Cybersecurity Intelligence is a group of like-minded individuals that share an interest in many subdivisions of cybersecurity and posses knowledge up to and including but not limited to:
  • Security fundamentals on/across operating systems: TCP/IP & OSI model, how systems connect to one another;
  • Knowledge of each network layer and how they work, how to protect networks using layouts that make sense including how to setup enterprise networks, network architecture and limitations;
  • Network security devices: human and software, automated or manual implementation, embedded systems, firewalls, NAT, DMZs, DPI, etc.
  • Threat analysis, threat detection and heuristic/anomaly-based analysis, remediation and sandboxing, identification of C&C and steps to handle malware controllers, protocol analysis and web of trust;
  • Intricate knowledge of security concepts such as threats, vulnerabilities, exploits, CIA triad, risk analysis, PII and PI
  • Access controllers; processes, information security roles and responsibilities, IDS, IPS
  • Events and love and their respective systems and their architecture;
  • Interest in cryptologic systems not necessary but recommended;
  • network monitoring technologies both hardware and software not required but recommended;
  • Attack and evasion and when both are required and why;
  • MITRE ATT&CK, incident response should be commonly known already

...just things you should absolutely know before applying to be in the group.

How do I join?
You should already have knowledge of most of the topics above or at least show interest in 90% of them before applying. The group fundamentals involve interest in cybersecurity operations and threat management, but primarily focuses on expanding the sector using existing studies and through promoting a positive security architecture. You should know how to monitor networks and detect threats, not only malware. You should know malware is prevalent not dominant in this field. You should be able to answer basic and intermediate difficulty questions one might find need answering. There is a short quiz to be taken that will be designed by myself in the future as interest in the group arises. This is also not a group dedicated to hacking and cybercrime. It is dedicated to expanding knowledge not limiting it to one activity. Though certain aspects when delving into cyberops will inevitably involve those things, it is not condoned and is thus not required to join.

Rules:
- Must have a positive reputation
- Must have 200 posts
- Must pass a quiz of 50 multiple choice questions
- No open/unresolved scam reports
- Must remain professional to promote a positive group image
You can provide an application below if you're interested. Conversation will take place on Matrix/Element most likely, or other decentralized network and there is no benefit other than sharing knowledge and being among like-minded and sane individuals in the topic of cybersecurity. There will be fun projects at a later date.

You do not need to provide personal details or certification to join and this will never be required because we must respect each other's privacy and enforcement of the security of others is paramount.

I want to invite reputable members with or without them being IT certified. It wouldn't be fair to require that, let alone enforcement of that rule would be impossible without breaking anonymity and I'm all about that.


Reply

#2
@

[To see links please register here]

Can I please get this stickied? I will be making it official later, I just want to raise interest for the group.
Reply

#3
We had a great Christmas and a fun New Year. We enthusiastically got to work in our small but friendly company. Too bad that a cyber attack on our server put us in a bad mood. The company management decided to save on the

[To see links please register here]

. And we were left unprotected for the holidays. Of course, our it-specialists will deal with the problem and restore work. But the loss will affect not only management but also our finances. Hopefully, the bitter experience will teach those responsible for our cybersecurity.
Reply

#4
Quote:(01-19-2022, 04:15 PM)CheasterRobson Wrote:

[To see links please register here]

We enthusiastically got to work in our small but friendly company. Too bad that a cyber attack on our server put us in a bad mood.
Yay, another incoherent post from some spammer. Sweet.

./nullyourself
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through