Enjoy!
In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude
Friday, September 04, 2020
Are you on Twitter?
Dear blog readers, I wanted to let everyone know that I will be shortly resuming my Twitter account therefore consider following me.
Meanwhile - you can also grab an offline copy of my old Twitter account circa 2010-2014 where I'm proud to have participated in a Top Secret GCHQ Program called "Lovely Horse" which monitors hackers and security experts for technical and technological "know-how".
Tags:
Botnet,
Cyber Warfare,
Cybercrime,
Hacking,
Information Security,
Information Warfare,
Malicious Software,
Security
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
