#SecurityOperations

2025-05-17

It's one of those rare moments in time when exposing the Yekaterinburg's based Plastika Recording Studio which is the primary advertising and marketing creative supplier for the Conti #Ransomware Gang is the right thing to do. Is it Никита Жаринов, Евгений Самсонов, Ice Costa or W8D8digital? We have it all named researched and properly sorted out.

So here it goes. This is my EXIF and attribution reproduction analysis based on their originally leaked and publicly accessible internal communication - archive.org/download/rewards-f [PDF] here's more - dn721806.ca.archive.org/0/item [PDF] here's more - here's more - dn721806.ca.archive.org/0/item [PDF] here's more - dn721806.ca.archive.org/0/item [PDF] here's most - dn721806.ca.archive.org/0/item [PDF] here's more - dn721806.ca.archive.org/0/item [PDF] and here's even more - dn721806.ca.archive.org/0/item [PDF].

Here's the actual connection.

Conti -> Plastika -> +7 (992) 004-54-45 -> Yekaterinburg, Kirova Street, 9 -> yandex.eu/maps/org/plastika/22 -> vk.com/plastika.space -> plastika.space/ -> W8D8digital -> vk.com/id452512822 -> icecostabeats.connect@gmail.com -> t.me/icecostabeats -> instagram.com/icecosta/ -> vk.com/kidsocial -> vk.com/eugene_creative_power -> vk.com/icecosta -> vk.com/lungo999 -> vk.com/icecostabeats

and here's my YouTube video reproduction analysis - youtube.com/watch?v=ILgaZfcRww4 and here's the full research - archive.org/details/rewards-fo

#security #cybercrime #malware #CyberSecurity #cybersécurité #DataProtection #SecurityOperations #securitySystems #security_compliance #security_research #securitynews #securitybreach #cyberattack #CyberFraud #threatintel #threatintelligence #threathunting

Marco Ciappelli🎙️✨:verified: :donor:Marcociappelli@infosec.exchange
2025-05-08

As you know — well, now you do 😬 — Marco Ciappelli and Sean Martin, CISSP, are now hosting webinars on ITSPmagazine!

Yes, webinars are everywhere — but these are different:
ITSPmagazine #Webinars are More Than Just a Presentation.
They’re Real Conversations That Matter.

🎙️ Join us live on May 8 (or catch it On Demand) for an incredible conversation with Fred Wilmot.

You already know it’s going to be an awesome one — don’t miss it! ✨

Rethink, Don’t Just Optimize: A New Philosophy For Intelligent Detection And Response — An ITSPmagazine Webinar With Detecteam

Traditional detection and response is overdue for a rethink. This webinar explores the limits of optimization, the danger of misleading metrics, and a new approach focused on adaptability, behavior-driven signals, and speed. See how Detecteam’s REFLEX Platform helps teams turn weak signals into fast, actionable detections—before attackers have time to move.

REGISTER: crowdcast.io/c/rethink-dont-ju

#cybersecurity, #detectionandresponse, #threatdetection, #incidentresponse, #securityoperations, #infosec, #cyberdefense, #securitystrategy, #threatintel, #detecteam #infosecurity

Marco Ciappelli🎙️✨:verified: :donor:Marcociappelli@infosec.exchange
2025-04-22

Here we go, with another pre-RSAC 2025 Conference Coverage Brand Story!

#QuantumSecurity, Real Problems, and the Unifying Layer Behind It All
A Brand Story with Marc Manzano, General Manager, Cybersecurity Group at SandboxAQ

As we get ready for RSAC 2025, we’re kicking things off with some Brand Story conversation that sets the tone for what’s coming.

In this pre-event episode, SandboxAQ shares how their flagship platform, Active Guard, is reshaping #cybersecurity at the intersection of #AI and #quantum. From cryptographic asset management to non-human identity oversight and automated compliance, it’s all about solving real challenges and building a more secure, interoperable future.

ITSPmagazine's Co-founders Marco Ciappelli and Sean Martin, CISSP sat down with Marc Manzano for a first look at the #technology and thinking behind it — and what you can expect from their presence at RSA Conference 2025.

We’ll reconnect and record with SandboxAQ on location at #RSAC2025 for a deeper dive into this critical conversation.

A special thank you to SandboxAQ for sponsoring our RSAC 2025 coverage and supporting this exploration into the future of cybersecurity.

Watch, listen, and learn more below:

Video Teaser: youtu.be/eCT8qNhp4nc

Full Video Episode: youtu.be/aD34MD5IRnc

Full Audio Podcast: brand-stories-podcast.simpleca

Explore our full RSAC 2025 Coverage: itspmagazine.com/events/rsac

#sandboxaq #rsac2025 #brandstory #cybersecurity #quantumsecurity #aiops #cryptographicmanagement #securityautomation #digitaltransformation #activeguard #rsa #infosec #devsecops #identitysecurity #securityoperations #interoperability #itspmagazine #rsaconference #cybersecurityinnovation #infosecurity

RainSMediaRadiorainsmediaradio
2025-03-22

ICYMI: Nigerian Air Force Conducts Successful Airstrikes Against Terrorist Hideouts in Borno and Katsina States rainsmediaradio.com/2025/03/ni Follow, Like & Share

Sean Martin 🎙️✨:verified_paw: :donor:seanmartin@infosec.exchange
2025-03-17

Security tools generate thousands of alerts—but are they really helping? In this episode, we break down the latest @mitreattack Evaluations, how alert volume impacts cost and analyst burnout, and why detection engineering is the key to smarter security.

Watch and Listen now with @hackerxbella: youtu.be/tE1SFwo_jEw

#Cybersecurity #MITREATTACK #SecurityOperations #ThreatDetection

mansi18mans18
2025-03-12

The Cyber Highway: Navigating & Securing Data Flow in a Digital World

Join CISSP Training course - infosectrain.com/courses/cissp

BlackSquirrelz 👾aptwi@infosec.exchange
2024-12-10

Personally I think more security folks (especially pentesters and defenders) should have a basic understanding of DevSecOps. How does a development process look like, what security tools the developers have at their disposal (if any) and what are the limitations of these tools. Then you can figure out how to work with what you’ve got. #devsecops #SecurityOperations #pentesting #development

2024-11-29

Just over 1 week to go!

Join @ciauk and @sansemea for the #CyberThreat24 event on the 9th-10th December 24.

View the full agenda:
sans.org/cyber-security-traini

#CyberThreat24 #cti #blueteam #SecOps #SecurityOperations

Tedi Heriyantotedi@infosec.exchange
2024-09-05

Elastic released the Detection Engineering Behavior Maturity Model (DEBMM): elastic.co/security-labs/elast

#detectionengineering #SecurityOperations

mansi18mans18
2024-09-05

𝐌𝐚𝐧𝐚𝐠𝐞𝐝 𝐒𝐎𝐂 𝐕𝐒 𝐈𝐍 𝐇𝐎𝐔𝐒𝐄 𝐒𝐎𝐂

Managed Security Operations Centers (SOCs) and In-House SOCs are two primary models for organizations to manage their cybersecurity operations. Each approach offers distinct advantages and drawbacks, depending on specific needs and resources.

Register here for SOC Course -infosectrain.com/courses/soc-s

2024-09-03

Professional Refinement - Bug Bounty Hunter Certification Roadmap (2023)

youtube.com/watch?v=ONVF-3jjlO

As a Web Application Bug Bounty Hunter it may be helpful to consider the placement of one's work on a map of possibilities. Working at a company is not the same as working freelance in this field and the positions differ greatly. Organizations primarily hire juniors on the defensive side, while it is easier for freelancers to start themselves on the junior offensive side. This in turn depends on the civilization one is from and the various existing cultures! The global knowledge base and certifications can be indicators of the quality and depth of insight which is needed in order to understand the nature of a successful Web Application Security Tester's daily life. There are many open source approaches one may take, from entry-level general quick courses to very specialized long term deeper studies.

#BitcoinSecurityMaps #meshcode #BSM #MattyK #cyberpowertelenoia #theskyishigh #civilianintelligence #MindMaps #Security #CyberSecurity #culture #intelligence #civilian #certification #professional

#InfoSec #WebAppSec #Testing #EthicalHacking #Offensive #SecurityOperations #BugBounty #Hunter #roadmap

#aspie #attune

2024-09-03

Professional Refinement - Passing CompTIA Security+ (2023)

youtube.com/watch?v=BRQ-uILXAg

This episode is about the author's study process for passing the foundational Cyber Security "CompTIA Security+" exam in 2023. It's all about the timeframe, study materials and the live testing approach. One book has the knowledge. Another book has the tests. An online course compliments this. Answering a couple thousand quizz questions helps. Making mind maps assists in weaving sense from the realm of computing machines which themselves are interconnected as part of their existence, so in a way this helps make the theory real, because it is founded on what is known about reality through physics.

#BitcoinSecurityMaps #meshcode #BSM #MattyK #cyberpowertelenoia #theskyishigh #civilianintelligence #MindMaps #Security #CyberSecurity #culture #intelligence #civilian #certification #professional

#InfoSec #Information #Technology #Computing #Software #Digital #DigitalLiteracy #cypherpunk #appsec #WebAppSec #Testing #EthicalHacking #BugBounty #DevSecOps #SSDLC #SecurityOperations #CompTIA

#aspie #asperger #autism #neuro #neurodiverse #nontypical #neuronontypical #neurotuypical #atypical #neuroatypical #ET #elf #lightworker #magic #wizard

#attune #state #consciousness #subconscious #realm #sphere #dimension #layer #level #point #attention #beinghuman #time #freedom #privacy #anonymity #peace #justice #value #clarity #safety #alignment #coordination #disclosure #harmony #holistic #ecosystem #ecology #thriving #sacred #sustainability

2024-09-03

Web App Security Testing Series: RECON Foundations - INTRO

youtube.com/watch?v=T5NLyAC2XG

ARTICLE:
medium.com/cyberpower-telenoia

AUDIO:
serve.podhome.fm/episodepage/b
youtube.com/watch?v=T5NLyAC2XG

This introductory episode to Recon covers foundational theory including tactics, techniques and actual command-line procedures. From manual passive indirect information gathering to automated scans and into stealth packet manipulation. Examples are given of this particular first stage of a Vulnerability Assessment in a sequential manner in order to enhance the effectiveness of mapping the attack surface of the target web application.

The amount of times my eyebrow reacts to my voice is remarkable within the first minute. Recording myself helps me continue to work on this.

#BitcoinSecurityMaps #meshcode #BSM #MattyK #cyberpowertelenoia #theskyishigh #civilianintelligence #MindMaps
#Security #CyberSecurity #WebAppSec #AppSec #Recon #Vulnerability #Risk #Assessment #Analysis #Advisory #Bitcoin #BTC #culture #intelligence #civilian

#InfoSec #Information #Technology #Computing #Software #Digital #DigitalLiteracy #System #P2P #cypherpunk #appsec #WebAppSec #Recon #Reconnaissance #Testing #EthicalHacking #BugBounty #DevSecOps #SSDLC #Pentest #SecurityOperations

#aspie #asperger #autism #neuro #neurodiverse #nontypical #neuronontypical #neurotuypical #atypical #neuroatypical #ET #elf #lightworker #magic #wizard

#attune #state #consciousness #subconscious #realm #sphere #dimension #layer #level #point #attention #beinghuman #time #freedom #privacy #anonymity #peace #justice #value #clarity #safety #alignment #coordination #disclosure #harmony #holistic #ecosystem #ecology #thriving #sacred #sustainability

I'm excited to be on a panel at the Defcon Blue Team Village on hot topics in security operations with Carson Zimmerman, Enoch Long, and Eric Lippart at 3:00pm Pacific on Saturday in room W310. See you there! #Defcon #BlueTeamVillage #SecurityOperations Hope to see you there!

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst