Frenchie

2.5K posts

Frenchie banner
Frenchie

Frenchie

@dralexanders1

CCI, OSINT, Dark Web, Threat Intelligence; Got on my dead man's suit and my smilin' skull ring

Bordeaux, France Beigetreten Ocak 2020
1K Folgt674 Follower
Frenchie retweetet
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
STALKIE A tool for searching for social media accounts by username. Stalkie assigns a rating to pages based on a confidence score (the number of times the username is mentioned on the page and other parameters) github.com/ashendilantha/… Creator Ashen Dilantha #socmint
Cyber Detective💙💛 tweet media
English
8
46
256
12.7K
Frenchie retweetet
0x6rss
0x6rss@0x6rss·
My blog is now live: "The Close Relationship Between Telegram Bots and Threat Actors" new stealers, their log structures, telegram bot C2 infrastructure, and threat actors who hacked themselves while building their own 👉 cti.monster/blog/2026/03/2… happy hunting!
English
1
36
161
19K
Frenchie retweetet
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
🇨🇳🇨🇳🇨🇳Country specific #OSINT: The Chinese Internet Technological innovation Governance Understanding and using euphemisms Translation tools Typing in Simplified Chinese Where to search for content Key Takeaways osintcombine.com/post/osint-the… By Emerald Sage @osintcombine
Cyber Detective💙💛 tweet media
English
1
12
50
4.4K
Frenchie retweetet
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
WAR 3.0 REAL TIME HEAT MAP Another tool that includes a map and a news feed for keeping up with current events around the world. It also offers a lot of stats (7d/30d/90d/all time): top events types, events by region, most affected countries and other. warheatmap.app
Cyber Detective💙💛 tweet media
English
4
23
82
7.6K
Frenchie retweetet
Alfonso Muñoz, Phd
Alfonso Muñoz, Phd@mindcrypt·
Dear Infosec/AI and CTI community, We have released our new book, "Threat Intelligence: Chaos, Signals, and Attribution — AI Applied to Threat Intelligence," by Alfonso Muñoz and Jacobo Blancas - amazon.com/dp/B0GS3762DV I hope you can help us share it to reach as many people as possible who are interested in threat intelligence, AI applications, and cybersecurity. Here is a little bit of its description: We live in a paradox: never before have we had so much information about threats, yet we rarely have real intelligence. Reports, IOCs, feeds, malware samples, and indicators arrive constantly, often mixed with noise and inconsistent labels. For many teams, the result is an ocean of disconnected signals where urgency overwhelms what truly matters. Threat Intelligence: Chaos, Signals, and Attribution. AI Applied to Threat Intelligence addresses this challenge with a clear goal: transforming scattered data into useful, actionable, and defensible knowledge. The book argues that CTI is not simply a list of “bad things” to block but a discipline with its own cycle, methods, metrics, and cognitive biases, closely linked to business decisions and risk management. The first part establishes the foundations of CTI: its different levels (strategic, operational, tactical, and technical), the intelligence cycle, common myths, threat actors such as cybercriminal groups, APTs, and hacktivists, and the central role of modeling and attribution. The focus is on moving from repeating labels to performing real analytical work supported by structured reasoning. The second part explores the role of artificial intelligence in CTI. AI can accelerate analysis, helping classify and prioritize information at scale, summarize reports, extract TTPs from text and telemetry, correlate indicators through semantic similarity, and assist analysts through intelligent agents. At the same time, the book examines its risks, including hallucinations, adversarial manipulation, sensitive data exposure, and model supply-chain vulnerabilities. The approach is practical: it covers the collection and normalization of observables, enrichment and scoring, graph-based correlation, and intelligence sharing through standards such as TAXII. It also explores tools and platforms commonly used in CTI, including MISP, OpenCTI, and Yeti, as well as sources such as OSINT, the dark web, and messaging platforms, combined with defensive telemetry and workflows. Designed for CTI analysts, SOC teams, threat hunters, IR/DFIR practitioners, and cybersecurity professionals, the book also targets AI and ML specialists who want to apply AI to CTI with rigor, governance, and security. It provides a roadmap for turning signals into decisions and building CTI capabilities that remain robust as threats evolve.
Alfonso Muñoz, Phd tweet media
English
5
21
65
5.6K
Frenchie retweetet
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
IRAN MONITOR Dashboard for tracking events in Iran in real time. News from various sources, latest online petitions, protest schedules, information about victims. iranmonitor.org
Cyber Detective💙💛 tweet media
English
3
33
161
19.1K
Frenchie retweetet
Palgrave Macmillan
Palgrave Macmillan@Palgrave·
'Rethinking Remote Warfare' is the first book to analyze the legacies of Remote Warfare. This study is unique in its focus on the myriad ways in which Western-pioneered strategies of war are impacting our modern world. bit.ly/4crtliI @DrJamesRogers
Palgrave Macmillan tweet media
English
8
192
782
33.9K
Frenchie
Frenchie@dralexanders1·
@atticus_flinch Великая игра. Сколько часа убито
Русский
0
0
2
884
Икебана смыслов
Икебана смыслов@atticus_flinch·
хороший день, чтобы вспомнить, как на Митинском радиорынке в какие-то совсем дремучие 90-е я встретил диск с локализованной игрой Baldur‘s Gate. называлась «Ворота лысого Ура»
Русский
19
31
1.8K
42.2K
Икебана смыслов
Икебана смыслов@atticus_flinch·
как же хорош второй сезон «Ночного администратора»
Икебана смыслов tweet media
Русский
7
0
43
4.8K