Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude

Thursday, February 02, 2012

Summarizing Webroot's Threat Blog Posts for January


The following is a brief summary of all of my posts at Webroot's Threat Blog for January, 2012. You can subscribe to my Webroot's Threat Blog RSS Feed or follow me on Twitter:

01. Millions of harvested emails offered for sale
02. Email hacking for hire going mainstream
03. Mass SQL injection attack affects over 200,000 URLs
04. A peek inside the PickPocket Botnet
05. A peek inside the Cythosia v2 DDoS Bot
06. Google announces new anti-malware features in Chrome
07. Adobe issues a patch for critical security holes in Reader and Acrobat
08. Inside a clickjacking/likejacking scam distribution platform for Facebook
09. Zappos.com hacked, 24 million users affected
10. Inside AnonJDB – a Java based malware distribution platforms for drive-by downloads
11. How malware authors evade antivirus detection
12. A peek inside the Umbra malware loader
13. How phishers launch phishing attacks
14. Researchers intercept a client-side exploits serving malware campaign
15. A peek inside the uBot malware bot
16. Cisco releases ‘Cisco Global Threat Report’ for 4Q11
17. Cybercriminals generate malicious Java applets using DIY tools

This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
- February 02, 2012 No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Wednesday, February 01, 2012

Summarizing ZDNet's Zero Day Posts for January


The following is a brief summary of all of my posts at ZDNet's Zero Day for January, 2012. You can subscribe to my personal RSS feed, Zero Day's main feed, or follow me on Twitter:


01. 'Most beautiful' scams proliferate on Facebook
02. Android users hit by scareware scam
03. 'Remove Facebook Timeline' themed scam circulating on Facebook
04. Fake Kim Jong-il video distributing malware
05. Researchers spot pharmaceutical spam campaign using QR Codes
06. Report: Conficker and AutoRun infections proliferating
07. Researchers spot scammers using fake browser plug-ins
08. New variants of premium rate SMS trojan 'RuFraud' detected in the wild
09. Research: Spammers actively harvesting emails from Twitter in real-time
10. DreamHost hacked, mass password-reset issued

This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
- February 01, 2012 No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Search This Blog

Translate

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me dancho.danchev@hush.com
View my complete profile

Featured Post

Cybercrime Forum Data Set - 2019 - Free Download!

Followers

RSS Feed

Posts
Atom
Posts
All Comments
Atom
All Comments

Follow by Email

Blog Archive

  • January 2021 (9)
  • December 2020 (27)
  • November 2020 (1)
  • October 2020 (1)
  • September 2020 (4)
  • August 2020 (3)
  • July 2020 (8)
  • June 2020 (1)
  • May 2020 (2)
  • February 2020 (1)
  • January 2020 (2)
  • December 2019 (9)
  • November 2019 (1)
  • October 2019 (1)
  • September 2019 (8)
  • August 2019 (2)
  • July 2019 (6)
  • May 2019 (11)
  • April 2019 (3)
  • March 2019 (1)
  • February 2019 (9)
  • January 2019 (4)
  • December 2018 (1)
  • October 2018 (25)
  • September 2018 (1)
  • July 2018 (1)
  • November 2017 (1)
  • May 2017 (8)
  • January 2017 (2)
  • December 2016 (12)
  • August 2016 (7)
  • May 2016 (1)
  • April 2016 (4)
  • August 2015 (2)
  • July 2015 (1)
  • October 2014 (1)
  • March 2014 (3)
  • January 2014 (7)
  • December 2013 (5)
  • November 2013 (12)
  • October 2013 (3)
  • September 2013 (6)
  • August 2013 (14)
  • July 2013 (6)
  • June 2013 (8)
  • May 2013 (5)
  • April 2013 (5)
  • March 2013 (3)
  • February 2013 (6)
  • January 2013 (6)
  • December 2012 (2)
  • November 2012 (7)
  • October 2012 (3)
  • September 2012 (4)
  • August 2012 (2)
  • July 2012 (2)
  • June 2012 (2)
  • May 2012 (4)
  • April 2012 (2)
  • March 2012 (2)
  • February 2012 (2)
  • January 2012 (6)
  • December 2011 (1)
  • October 2011 (7)
  • September 2011 (4)
  • August 2011 (4)
  • July 2011 (3)
  • June 2011 (1)
  • May 2011 (10)
  • April 2011 (5)
  • March 2011 (12)
  • February 2011 (6)
  • January 2011 (5)
  • September 2010 (2)
  • August 2010 (3)
  • July 2010 (7)
  • June 2010 (7)
  • May 2010 (16)
  • April 2010 (15)
  • March 2010 (13)
  • February 2010 (17)
  • January 2010 (9)
  • December 2009 (9)
  • November 2009 (13)
  • October 2009 (9)
  • September 2009 (10)
  • August 2009 (12)
  • July 2009 (14)
  • June 2009 (11)
  • May 2009 (11)
  • April 2009 (11)
  • March 2009 (11)
  • February 2009 (13)
  • January 2009 (10)
  • December 2008 (10)
  • November 2008 (15)
  • October 2008 (25)
  • September 2008 (17)
  • August 2008 (26)
  • July 2008 (38)
  • June 2008 (19)
  • May 2008 (33)
  • April 2008 (30)
  • March 2008 (19)
  • February 2008 (21)
  • January 2008 (13)
  • December 2007 (21)
  • November 2007 (34)
  • October 2007 (32)
  • September 2007 (28)
  • August 2007 (25)
  • July 2007 (22)
  • June 2007 (20)
  • May 2007 (30)
  • April 2007 (20)
  • March 2007 (41)
  • February 2007 (32)
  • January 2007 (29)
  • December 2006 (20)
  • November 2006 (20)
  • October 2006 (28)
  • September 2006 (40)
  • August 2006 (27)
  • July 2006 (28)
  • June 2006 (29)
  • May 2006 (33)
  • April 2006 (20)
  • March 2006 (19)
  • February 2006 (23)
  • January 2006 (39)
  • December 2005 (6)

Labels

  • 419 Scam
  • AbdAllah
  • Abdallah Internet Hizmetleri
  • Able Danger
  • Abuse Department
  • Active Security Monitor
  • Advance Fee Scam
  • Advanced Persistent Threat
  • Advertising
  • Adware
  • Affiliate Network
  • Ahmad Al Agha
  • Al Qaeda
  • Allied Group Inc
  • Amazon AWS
  • ANA Spoofer Project
  • Anonymity
  • Anonymizer
  • Anti-Phishing Group
  • Antivirus
  • Antivirus Signatures
  • Anton Nikolaevich Korotchenko
  • AOL
  • Apple
  • APT
  • Armadillo Phone
  • Ashiyane Digital Security Team
  • ASProx
  • Astalavista
  • Astalavista Security Group
  • Astalavista.box.sk
  • ATM Skimmer
  • ATS
  • Authentication
  • Avalance Botnet
  • Background Check
  • BadB
  • Bahama Botnet
  • BakaSoftware
  • Bantu
  • BBC
  • Bebo
  • Bed Time Reading
  • Best Practices
  • BGP
  • Big Brother
  • Bill Gates Botnet
  • Biography
  • Biometrics
  • Bitcoin
  • Bjorn Andreasson
  • Blackhat SEO
  • Boeing
  • Bogus Account
  • Botners
  • Botnet
  • Botnets
  • Box.sk
  • Brute-Forcing
  • Bulgaria
  • Bulgaria Law Enforcement
  • Bullet Proof Hosting
  • C4I
  • CALEA
  • Candid Wuest
  • CAPTCHA
  • Career Enrichment
  • Cash Transfers
  • CCTV
  • CDT
  • Cell Phone Monitoring
  • Cell Phone Surveillance
  • CellDEK
  • Censorship
  • Center for Democracy and Technology
  • CERT
  • Cheyenne Mountain Operations Center
  • Child Pornography
  • China
  • China Eagle Union
  • CIA
  • CipherTrust
  • Classified Information
  • Client-Side Exploits
  • Client-Side Vulnerabilities
  • CNO
  • COCOM
  • Cold War
  • COMINT
  • Competitive Intelligence
  • Compliance
  • Computer Crime Survey
  • Computer Network Operation
  • Conficker
  • Confidential Connections
  • Conspiracy
  • Conspiracy Theory
  • Cookies
  • CoolWebSearch
  • Corporate Risk Management
  • Credit Cards
  • Crimeware
  • Critical Infrastructure
  • Crusade Affiliates
  • Crypters
  • Cryptography
  • Cryptome
  • Cryptoviral Extortion
  • CSIA
  • Cyber Attack
  • Cyber Espionage
  • Cyber Insurance
  • Cyber Jihad
  • Cyber Militia
  • Cyber Security Industry Alliance
  • Cyber Security Investment
  • Cyber Terrorism
  • Cyber Warfare
  • Cyber Weapon
  • Cyber Weapons
  • Cybercrime
  • Cybercrime Ecosystem
  • Cybercrime Forum
  • Cybercrime Forum Data Set
  • Cybercrime Search Engine
  • Cybercriminal
  • Cyberpunk
  • Cyberspace
  • Cybertronics
  • Daniel Brandt
  • Dark Forum
  • Dark Web
  • Dark Web Onion
  • Dark Web Search Engine
  • DarkComet RAT
  • Data Acquisition
  • Data Breach
  • Data Center
  • Data Leak
  • Data Mining
  • David Endler
  • DDoS
  • Defense Complex
  • Delicious Information Warfare
  • Denmark
  • DHS
  • DIA
  • Digital Armaments
  • Digital Forensics
  • Digital Rights
  • Dilbert
  • Distributed Computing
  • Distributed Computing Project
  • Distributed Project
  • DNS
  • DNS Changer
  • DoD
  • DoJ
  • DotCom
  • DreamHost
  • Dropbox
  • Durzhavna Sigurnost
  • DVD of the Weekend
  • E-Banking
  • E-Business
  • E-Commerce
  • Eavesdropping
  • Ebay
  • ECHELON
  • ECOFIN Projects
  • Economics
  • eID
  • Electromagnetic Pulse Weapons
  • Electronic Banking
  • ELINT
  • Emotet
  • EMP
  • Encrochat
  • Encrochat Database Leak
  • Encrypted Communication
  • Encrypted Phone
  • Encryption
  • Enigma
  • ENISA
  • Enki Bilal
  • Enron
  • Erasmus Bridge
  • Eric Goldman
  • Espionage
  • Evgeniy Mikhaylovich Bogachev
  • Exmanoize
  • Exploit Broker
  • Exploit Kit
  • Exploits
  • Eyeball Series
  • F-Secure
  • Facebook
  • Fake Account
  • Fake Adobe Flash Player
  • Fake Certificate
  • Fake Chrome Extension
  • Fake Chrome Update
  • Fake Code Signing Certificate
  • Fake Confirmed Facebook Friend Request Email
  • Fake Documents
  • Fake Facebook Notification
  • Fake Facebook Profile Spy Application
  • Fake Firefox Update
  • Fake Hosting Provider
  • Fake ID
  • Fake Internet Explorer Update
  • Fake Passport
  • Fake Safari Update
  • Fake Security Software
  • Fake Utility Bill
  • Fake Video Codec
  • Fake Visa
  • Fake Visa Application
  • Fake Web Site
  • Fake Who's Viewed Your Facebook Profile Extension
  • Fake YouTube Player
  • Fast-Flux
  • FBI
  • FBI Most Wanted
  • FCC
  • FDIC
  • Financial Management
  • Firas Nur Al Din Dardar
  • FireEye
  • Flashpoint Intel
  • Forensics
  • FoxNews
  • Fraud
  • Free Speech
  • FSB
  • FTLog
  • FTLog Worm
  • Gartner
  • Gavril Danilkin
  • GazTranzitStroyInfo
  • GCHQ
  • Generation I
  • George Bush
  • Georgi Markov
  • Georgia
  • GiveMeDB
  • Global Security Challenge
  • GoDaddy
  • Google
  • Google Ads
  • Google Docs
  • Google Earth
  • Google Groups
  • Google Hacking
  • Google Maps
  • Google Store
  • Greece
  • Growth Hacker
  • GUI
  • Gumblar
  • Hacked Database
  • Hacked Web Site
  • Hacker
  • Hackers
  • Hacking
  • Hacking Book
  • Hacking Forum
  • Hacking Tools
  • Hacktivism
  • Haiti
  • Hamas
  • Hezbollah
  • High Tech Brazil Hack Team
  • Hilary Kneber
  • Homebrew
  • Honeynet Project
  • Honker Union of China
  • HUMINT
  • ICBM
  • ID Theft
  • iDefense
  • Identity Theft
  • Illegal Arrest
  • Illegal Hosting
  • IMINT
  • IMLogic
  • Information Security
  • Information Security Forum
  • Information Security Market
  • Information Warfare
  • Infrastructure Security
  • InqTana Mac OS X Malware
  • Insider
  • Insider Monitoring
  • Insider Threat
  • Instant Messaging
  • Intellectual Property
  • Intelligence
  • Intelligence Agency
  • Intelligence Community
  • Internal Revenue Service
  • International Exploit Shop
  • Internet
  • Internet Censorship
  • Internet Economy
  • Internet Relay Chat
  • Investment Banking
  • IP Cloaking
  • IP Hiding
  • IP Spoofing
  • iPowerWeb
  • IPSec
  • IPv4
  • IPv6
  • Iran
  • Iran Hacker Groups
  • Iran Hacking Groups
  • IRC
  • IRS
  • Jabber
  • Jeffrey Carr
  • Joanna Rutkowska
  • Johannes Ullrich
  • John Young
  • K Rudolph
  • Katrina
  • Keylogger
  • KGB
  • Kidnapping
  • Koobface
  • Koobface Botnet
  • Korean Demilitarized Zone
  • KrotReal
  • Latvia
  • Law Enforcement
  • Lawful Interception
  • Lenovo
  • Lizamoon
  • Loads.cc
  • Localization
  • Location Tracking
  • Lockheed Martin
  • Logicube
  • Lone Gunmen
  • Lovely Horse
  • Lubyanka Square Headquarters
  • M4 Project
  • Mac OS X
  • Malicious Software
  • Maltego
  • Malvertising
  • Malware
  • Marketing
  • Mass Web Site Defacement
  • Mastercard
  • McAfee
  • Metrics
  • Microsoft
  • Microsoft Live
  • Military Communications
  • Missile Base
  • Mobile
  • Mobile Communication Censorship
  • Mobile Internet
  • Mobile Location Tracking
  • Mobile Malware
  • Mobile Security
  • Money Laundering
  • Money Mule
  • Money Mule Recruitment
  • Monoculture
  • Morgan Stanley
  • MSN
  • Muhammad Cartoons
  • MyWebFace
  • NASA
  • National Security
  • Native Intelligence
  • NBC
  • NetAssist LLC
  • NetCraft
  • Network Solutions
  • New Media
  • Nikolay Nedyalkov
  • Nikopol Trilogy
  • Nintendo
  • Nintendo DS
  • NordVPN
  • Norman Sandbox
  • North Korea
  • North Korea Missile Launch Pad
  • NSA
  • Nuclear Weapons
  • Nyxem
  • OEM
  • Offensive Cyber Warfare
  • One-Time Passwords In Everything
  • OneCare
  • Online Advertising
  • Online Fraud
  • Online Marketing
  • Open Source Malware
  • Operation Uncle George
  • OPIE
  • OPSEC
  • Osama Bin Laden
  • OSINT
  • OTC
  • OTP
  • Over-The-Counter
  • Packers
  • Parked Domains
  • Passwords
  • Pay Per Install
  • PayPal
  • Perplex City
  • Persistent Cookies
  • Personal Career
  • Personal Data
  • Pharmaceutical Scams
  • Phileas Crawler
  • Phishing
  • Phishing Campaign
  • Phishing Toolbar
  • PhishTube
  • Phreedom
  • Physical Security
  • Pinterest
  • Piracy
  • PlushForums
  • Podcast
  • Point of Sale Terrminal
  • Politics
  • PornTube
  • POS
  • Potentially Unwanted Application
  • PR
  • Press Coverage
  • Privacy
  • Prolexic
  • Protonmail
  • Proxy Service
  • PSYOPS
  • Qassam Cyber Fighters
  • Radicati Group
  • Ransomware
  • RAT
  • Ray Kurzweil
  • RBN
  • Reconnaissance Satellite
  • Regulation
  • Remote Access Tool
  • Reporters Without Borders
  • Return On Investment
  • Return On Security Investment
  • Revolution in Militvry Affairs
  • RIPA
  • Risk Management
  • Rogue Account
  • Rogue Chrome Extension
  • Rogue Video Codec
  • Rogue YouTube Player
  • Rogueware
  • ROI
  • Roman Polesek
  • Root Server
  • Rootkit
  • ROSI
  • Russia
  • Russian Bomber
  • Russian Business Network
  • Russian Submarine
  • Safe Harbor
  • Satellite Imagery
  • Satellite Jamming
  • Satellite SIGINT
  • Scams
  • Scandoo
  • ScanSafe
  • Scareware
  • Scribd
  • Search Engine
  • Search Engine Optimization
  • SEC
  • Secure Communication
  • Securities and Exchange Commission
  • Security
  • Security Awareness
  • Security Book
  • Security Breach
  • Security Education
  • Security Forum
  • Security Game
  • Security Industry
  • Security Interviews
  • Security Investment
  • Security Metrics
  • Security Podcast
  • Security Project
  • Security Research
  • Security Statistics
  • Security Training
  • Security Trends
  • Sensitive Information
  • SEO
  • Shadow Server
  • ShadowCrew
  • SIGINT
  • SIPRNET
  • SITE Institute
  • SiteAdvisor
  • Skype
  • Sniffing
  • Social Engineering
  • Social Network Analysis
  • SocialMediaSystem
  • Software Piracy
  • Solarwinds
  • Sophos
  • Space Warfare
  • Space Weapons
  • Spam
  • Spam Campaign
  • Spam Operations
  • Spoofing
  • Sprott Asset Management
  • Spyware
  • SQL Injection
  • SSL
  • SSN
  • Starlight
  • Stealth Ideas Inc
  • Steganography
  • Stolen Credit Card
  • Strider Crawler
  • Sub7
  • Suri Pluma
  • Surveillance
  • Swine Flu
  • Symantec
  • Symbian
  • Syria
  • Syrian Electronic Army
  • Syrian Embassy
  • Taia Global
  • TAN
  • Tech Support Scam
  • Technical Collection
  • Technical Mujahid
  • Terrorism
  • The Bunker
  • The Immortals
  • The Lawnmower Man
  • The Outer Limits
  • Thought Leadership
  • Threat Intelligence
  • Threat Intelligence Report
  • TIA
  • Tipping Point
  • Tor
  • TorrentReactor
  • Total Information Awareness
  • Travel Without Moving
  • TrendMicro
  • Trifinite Group
  • Trojan Horse
  • TROYAK-AS
  • Twitter
  • Two-Factor Authentication
  • Typosquatting
  • U.S Bureau of Engraving and Printing
  • U.S Driving License
  • U.S Elections
  • Underground Search Engine
  • University ID Card
  • Vault 7
  • VeriSign
  • Vertex Net Loader
  • Virtual Private Network
  • Virtual Reality
  • Virtual Reality Social Network
  • Virtual World
  • Virus for You
  • Virus Map
  • Virus Recovery Button
  • Viruses
  • VirusTotal
  • Visa
  • Visual Information System
  • Visualization
  • VoIP
  • VPN
  • Vulnerabilities
  • Vulnerability Broker
  • War Driving
  • War Games
  • Weapon Systems
  • Web 2.0
  • Web Application Worm
  • Web Crawler
  • Web Inject
  • Web Proxy Service
  • Web Shells
  • Web Site Defacement
  • Webroot
  • WHGDG
  • Wireless
  • Wireless Hacking
  • Wireless Internet
  • Wiretapping
  • WMF Vulnerability
  • World Hacker Global Domination Group
  • X-Files
  • XMPP
  • XSS
  • Yahoo
  • YouTube
  • ZDNet
  • ZDNet Zero Day Blog
  • Zero Day Exploit
  • Zero Day Initiative
  • Zerodium
  • ZeuS
  • Zombie Alert
  • Zone-H
  • Zotob
Powered by Blogger.