Unlike the Nikola Tesla defensive weapon called Teleforce, the conceptualization of electrostatic repulsion of a fired energy beam at intended targets has many applications. The potential to utilize fundamental theoretical concepts can be applied in energy, network communications, and propulsion. An exploration of Nikola Tesla’s inventions from the alternating-current (AC) electric system, Tesla coil, and …

TeleforceRead More »

List of Available Attack Detection API Correlation Rules (49): Name Description Technique(s) Subtechnique(s) AttackDetection – Execution with AT – Rule In order to gain persistence, privilege escalation, or remote execution, an adversary may use the Windows built-in command AT (at.exe) to schedule a command to be run at a specified time, date, and even host. …

Cyber Threat Intelligence (CTI) Attack TaxonomyRead More »

Public Datasets for Cybersecurity Research from Universities and Institutions KDD Cup 1999 Data – This is the data set used for The Third International Knowledge Discovery and Data Mining Tools Competition, which was held in conjunction with KDD-99 The Fifth International Conference on Knowledge Discovery and Data Mining. The competition task was to build a …

Voracity Cyber DatasetsRead More »

NASA researchers sponsored by Dryden’s Small Business Innovation Research program introduced airborne science networking capabilities, such as telepresence and over-the-horizon, on an aircraft bearing a payload of instrumentation with a combined gross weight of less than three pounds. The battery-powered NightHawk micro air vehicle, built by Applied Research Associates Inc. of Randolph, Vt., communicated with …

CubeSat Drone ApplicationsRead More »

The word “common” in the term “common operational picture” does not mean that all participants have the same display picture; rather, it means that all participants have access to common sources of data, which could be displayed in different ways depending on the needs and equipment of the particular user. Command, control, communications, computers, intelligence, …

C4iSR CubeSatRead More »

Hack Sites Search Sites Daily Summary Sites AntiOnline Astalavista Group (currently down for rehab) Bugtraq CarnalOwnage Research CGI Security CORE Security Dan Kaminsky’s Blog New DocDroppers eEye Research Updated Exploit Database Foundstone Updated Full Disclosure List Gray World Hackbase (in chinese) ha.ckers Hackers for Charity (do something nice…help out!) HSC Consulting iDefense I-Hacked (real hacking) …

Red Team ToolsRead More »