Azazel News
28.5K subscribers
99.3K photos
82.3K videos
303 files
104K links
Azazel: appears as a fallen angel responsible for introducing humanity to forbidden knowledge. This channel is dedicated to sharing actionable intelligence/knowledge regarding COVID19/Coronavirus/Protest/Riots. Azazel & Doomsday are Apolitical Org
Download Telegram
Forwarded from martian
Forwarded from martian
Take a close look at happy NPCs ⬆️
Forwarded from martian
This above is the current state of the change to be impelemented and imposed very soon.
Forwarded from martian
Forwarded from martian
Ok back to tv show ⬇️
Forwarded from martian
This media is not supported in your browser
VIEW IN TELEGRAM
Who owns the data, owns the world
👨‍💻2
Forwarded from Fireworks Daily Team 2.0 (Pirate Ballz NotADude)
NEW - EU’s top executive body confirms a cyberattack after hackers reportedly stole 350GB of data from cloud storage.

Read here: https://www.disclose.tv/id/l8xd52o1go/
Forwarded from Doomsday shortages
One AI data center needs ~50,000 tons of copper
• 527 new data centers are being built globally
• S&P Global sees a 10M ton supply gap by 2040
• New mines can take ~19 years to come online
• Ore grades have already dropped ~40% since 1991

Should see general uptrend in copper with a wave 3 peak at $8 per lb by 2028 or sooner.
Forwarded from martian
Over the course of next 10 years (2026-2036), AI will not replace human cybersecurity experts but will fundamentally transform their roles. The demand for human professionals will remain high due to an enduring talent shortage, with millions of positions unfilled globally (4.8 million cybersecurity jobs projected to remain unfilled in 2026; compared to 3.4 million in 2022; 4 million in 2023)
Forwarded from Azazel News (Tee⛳️)
This media is not supported in your browser
VIEW IN TELEGRAM
These are the 5 steps involved in OPSEC

1- Identify critical information

2- Analyze threats

3- Analyze vulnerabilities

4- Assess risks

5- Apply countermeasures
Forwarded from martian
Completed the exercise?
Anonymous Poll
80%
Yes
20%
No
Forwarded from martian
If no, get to work ⬇️
Forwarded from Thérèse
From the article, he is working for Asian companies rather than American.
Forwarded from Azazel News (Tee⛳️)
Step 1: Identify critical information: Understand what information is sensitive

The first step is to determine what data would be particularly harmful to the organization if an adversary obtained it.

This includes intellectual property, employees' or customers' personally identifiable information, financial statements, credit card data and product research.

Critical information is any information you have in your device that could be used against you, given you are toughened enough to keep those inside your head a secret even under torture or similar circumstances.
Forwarded from Azazel News (Tee⛳️)
Step 2: Threat assessment: Identify potential cybersecurity threats.

The next step is to identify who is a threat to the organization's critical information.

There may be numerous adversaries who target different information, and companies must consider any competitors or hackers who might target the data.

The goal of threat analysis is to understand how adversaries could target an organization and use information to their advantage.

The threat analysis includes identifying potential adversaries and their associated capabilities and intentions to collect, analyze, and exploit critical information and indicators.

Organizations should seek support from their security, intelligence, and counterintelligence experts
Forwarded from Azazel News (Tee⛳️)
Step 3: Vulnerability analysis: Identify weaknesses in security

In this stage, the organization examines potential weaknesses among the safeguards in place to protect critical information and identifies which ones leave it vulnerable.

This step includes finding any potential lapses in physical and electronic processes designed to protect against the predetermined threats or areas where a lack of security awareness training leaves information open to attack.

To perform vulnerability analysis, an OPSEC analyst must consider the adversary's perspective and try to identify any susceptibilities that could be exploited.

This includes:
• The types of activities an adversary could observe
•The types of information an adversary could collect
•Organizational weaknesses that an adversary could exploit
•Potential gaps in physical or electronic processes
•Areas where a lack of security awareness training could leave information vulnerable 
Forwarded from Azazel News (Tee⛳️)
Step 4: Assess risks

Risk assessment is a key step in the Operations Security (OPSEC) process, which is a strategy and process for managing risk and security. The goal of OPSEC is to protect sensitive information and prevent it from falling into the wrong hands

In a risk assessment, you compare threats and vulnerabilities to determine the potential risk of adversary intelligence collection activities.

This includes assessing How likely it is that you will be targeted, information exploited and the consequences of exploiting your information 
The level of risk you determine will help you decide if you need to assign a countermeasure to a vulnerability.

For example, if the vulnerability is high and the adversary threat is clear, you might expect adversary exploitation and assess the risk as high. In this case, you would need to implement countermeasures to mitigate the risk or reduce it to an acceptable level.

However, if the vulnerability is low and the adversary's collection ability is moderate or low, you might determine the risk as low and not require any protective measures
🫡2