This is Dancho. I wanted to let everyone know that I've recently started running a proprietary MISP (Malware Information Sharing Platform) instance where I distribute and share most of my proprietary research with a variety of third-parties including connected instances or users who have API access to my research which is now also available in STIX/TAXII including MISP format where you or your organization can request API access to my proprietary threat intelligence feed for research or commercial purposes by approaching me at dancho.danchev@hush.com
Sample categories which I cover in my daily batch of proprietary threat intelligence research include:
- Targeted Malware Analysis - An Analysis
- In-the-Wild Malware Analysis - An Analysis
- Targeted Phishing Analysis - An Analysis
- Malicious URL Analysis - An Analysis
- Targeted Mobile Malware Analysis - An Analysis
- APT Coverage - New Campaign
- Fraudulent Infrastructure - An Analysis
- Online Fraud Campaign - An Analysis
- Historical OSINT Campaign - An Analysis
- Russian Business Network coverage
- Koobface Botnet coverage
- Kneber Botnet coverage
- Hundreds of IOCs (Indicators of Compromise)
- Tactics Techniques and Procedures In-Depth Coverage
- Malicious and fraudulent infrastructure mapped and exposed
- Malicious and fraudulent Blackhat SEO coverage
- Malicious spam and phishing campaigns
- Malicious and fraudulent scareware campaigns
- Malicious and fraudulent money mule recruitment scams
- Malicious and fraudulent reshipping mule recruitment scams
- Web based mass attack compromise fraudulent and malicious campaigns
- Malicious and fraudulent client-side exploits serving campaigns
Sample screenshots of the research posted at my proprietary MISP (Malware Information Sharing Platform) instance:
Stay tuned!
No comments:
Post a Comment