Friday, November 08, 2019

Joining Team Armadillo Phone!


Dear blog readers,

It's a pleasure and an honor to let you know that I've recently joined forces with Team Armadillo Phone in the fight against sophisticated nation-state and rogue cyber threat actors for the position of Technical Security Support targeting mobile devices on their way to compromise sensitive and often classified personal information and that I'll be definitely looking forward to making impact with the company through the publication of high-quality security and cyber threat research including the active education and spreading of information and knowledge to the company's clients on their way to further protect their sensitive and often classified data from mobile threats courtesy of a multi-tude of malicious and fraudulent adversaries.

Among my responsibilities will include active cyber threat an nation and rogue cyber adversary research including actual client outreach in terms of Technical Security Support including the actual work and eventual implementation of new never-published and seen-before privacy and security features including the actual Security Audit of the device in terms of possible Threat Modelling flaws and actual practical solution and advice-oriented implementation of new privacy and security features next to the usual cyber nation-state and rogue cyber actor type of threat analysis and research that I've been doing throughout the past decade.

Perfect timing to say big thanks to COO Rob Chaboyer and CEO Kelaghn Noy for bringing me on board and for actually taking the time and effort to go through my proposal and actually initiate a video conversation with me for the purpose of working together.

My initial idea would be reach out to the company's client-base in terms of possible security threats outreach including the active production of high-quality security and cyber adversary research targeting mobile devices at the company's blog including the production of a Threat Modelling Scenario Research Analysis which I intend to publish at the company's blog including an actual practical and solution-oriented Security Audit of the device next to the actual introduction of new privacy and security features.

I will be definitely looking forward to making an impact with the company and I'll be definitely looking forward to continue publishing the high-quality and never-published before type of research analysis at my personal blog.

Saturday, November 02, 2019

New Commercial Security Research OSINT Cybercrime Research and Threat Intelligence Gathering Services Portfolio Available On Demand!

Dear blog readers,

I wanted to let everyone know of a currently active commercial portfolio of services that I'm publicly offering for the purpose of reaching out to colleagues and friends including companies vendors and organizations who might be interested in working with me for the purpose of obtaining access to never-published before Security Research analysis reports briefs podcasts and various other commercially obtainable virtual and cyber assets that you and your organization can take advantage of.

Approach me at - dancho.danchev@hush.com today to discuss!

Key Commercial Services that I'm currently offering include:
Including the following commercial services available on Patreon Community:
  • Real-Time Security Consultation
  • Security Newsletter
  • Cybercrime Blog Post
  • Security Podcast
  • Malware Analysis
  • Threat Intelligence Analysis
  • Security Workshop
  • OSINT Analysis
  • Geopolitical Analysis
  • Threat Actor Profiling
  • National Security Analysis
  • Cyber Jihad Analysis
  • Dark Web Intelligence and OSINT Analysis
  • Security Presentation
  • Cyber Security Business Development
  • Red Team Penetration Testing Assessment
  • Blue Team Penetration Testing Assessment
  • Target of Opportunity Targeting
  • Cybercrime Forum Monitoring
  • Underground Chatter Monitoring
  • Network Deception Consultation
  • Military Scenario Building
  • Cyber Warfare Scenario Building
  • OSINT Enrichment and Data Mining
  • Cyber Warfare Program Estimation
  • Weapons System Analysis
  • Cyber SIGINT and Cyber Assets Discovery
Stay tuned!