<div style='background-color: none transparent;'></div>

RSS Feed!

Advertising Opportunities

Follow me Today!

Join me on AngelList!

Join me on LinkedIn!

Follow me on Twitter!

Dark Web Onion - Virtual Reality for Hackers and Security Experts

Dancho Danchev's Blog - Tag Cloud

Join the Community Today!

Donate Today!

Unit-123.org - Cyber Threat Intelligence Portal

Voting Poll

Dancho Danchev - Underground Forum Chatter - Disappearance- 2010

Dancho Danchev - Underground Forum Chatter - Disappearance- 2010

Dancho Danchev - Underground Forum Chatter - Disappearance- 2010

Dancho Danchev - Underground Forum Chatter - Disappearance- 2010

Dancho Danchev - Underground Forum Chatter - Disappearance- 2010

Dancho Danchev - Underground Forum Chatter - Disappearance- 2010

Dancho Danchev - Underground Forum Chatter - Disappearance- 2010

Dancho Danchev - Underground Forum Chatter - Disappearance- 2010

g0t Bitcoin?

Monday, August 19, 2019

Dear blog readers, dare to take a moment of your precious time to check a venerable and recently proposed cyber security project investment including the opportunity to enter a Bold New World of Hacking and Information Security? Has the time come to set them straight? Keep reading.

Check out this Onion - http://dzxvmqrl3rjxbzuer6vv5ejahniz2nefqxfmwspfmvzjo4xxzm7n4xad.onion and donate today!

Stay tuned!
Continue Reading | comments

Assessing the Recently Leaked FSB Contractor Data - A Peek Inside Russia's Understanding of Social Network Analysis and Tailored Access Operations

Friday, August 02, 2019

I've recently managed to obtain a copy of the recently leaked FSB contractor data courtesy of 0v1ru$ and "Digital Revolution" and I've decided to take a closer look including an in-depth overview and discussion of the leaked data in the context of today's modern-driven AI-powered automated OSINT technologies in the broader context of the U.S Intelligence Community in particular the utilization of rogue TOR exit nodes for the purpose of intercepting and harvesting TOR exit node data within the Russian Federation including social-network analysis data-mining and possible "lawful surveillance" and "lawful interception" including possible data collection type of Tailored Access Operation campaigns launched by "0day Technologies" and "SyTech".

Sample Company Logo:

Sample Company Logo:

Sample personal photos of the individuals behind "0day Technologies" and "SyTech":










Sample Screenshots of the User-Interface behind the "Lawful Surveillance" and "Lawful Interception":



Sample Screenshots of the Rogue and Bogus Tor-Exit-Node Research Project:


Sample URLs involved in the campaign:
hxxp://0day.ru
hxxp://sytech.ru

Sample Telegram account involved in the campaign:
hxxp://t.me/D1G1R3V_DigitalRevolution

Sample Vkontakt account involved in the campaign:
hxxp://vk.com/d1g1r3v

Sample Twitter account involved in the campaign:
hxxp://twitter.com/d1g1r3v
hxxp://twitter.com/0v1ruS

Sample URL known to have participated in the campaign:
hxxp://d1g1r3v.net

Related URL of the currently leaked data:
https://mega.nz/#F!3c0lTaLI!jVUS_O7Q0opCHUPYgK1E_w
Continue Reading | comments
 
Copyright © 2011. Dancho Danchev's Blog - Mind Streams of Information Security Knowledge . All Rights Reserved
Company Info | Contact Us | Privacy policy | Term of use | Widget | Advertise with Us | Site map
Template Modify by Creating Website. Inpire by Darkmatter Rockettheme Proudly powered by Blogger