Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Wednesday, April 07, 2021
Announcing Astalavista.box.sk's Flagship Dark Web Search Engine! Visit Us Today!

Recommended High-Profile Daily Military Technology Video!
Dear blog readers,
Continuing the "Travel Without Moving" blog post series where I used to feature a high-profile publicly accessible satellite imagery for a variety of high-profile locations throughout the years I've decided to share a highly recommended video which is basically a THAAD demonstration video which you should watch and enjoy in case you're interested in learning more about modern military technology.
Stay tuned!

Dancho Danchev's Blog - Proprietary MISP (Malware Information Sharing Platform) Instance Running - Request Access Today!
This is Dancho. I wanted to let everyone know that I've recently started running a proprietary MISP (Malware Information Sharing Platform) instance where I distribute and share most of my proprietary research with a variety of third-parties including connected instances or users who have API access to my research which is now also available in STIX/TAXII including MISP format where you or your organization can request API access to my proprietary threat intelligence feed for research or commercial purposes by approaching me at dancho.danchev@hush.com
Sample categories which I cover in my daily batch of proprietary threat intelligence research include:
- Targeted Malware Analysis - An Analysis
- In-the-Wild Malware Analysis - An Analysis
- Targeted Phishing Analysis - An Analysis
- Malicious URL Analysis - An Analysis
- Targeted Mobile Malware Analysis - An Analysis
- APT Coverage - New Campaign
- Fraudulent Infrastructure - An Analysis
- Online Fraud Campaign - An Analysis
- Historical OSINT Campaign - An Analysis
- Russian Business Network coverage
- Koobface Botnet coverage
- Kneber Botnet coverage
- Hundreds of IOCs (Indicators of Compromise)
- Tactics Techniques and Procedures In-Depth Coverage
- Malicious and fraudulent infrastructure mapped and exposed
- Malicious and fraudulent Blackhat SEO coverage
- Malicious spam and phishing campaigns
- Malicious and fraudulent scareware campaigns
- Malicious and fraudulent money mule recruitment scams
- Malicious and fraudulent reshipping mule recruitment scams
- Web based mass attack compromise fraudulent and malicious campaigns
- Malicious and fraudulent client-side exploits serving campaigns
Sample screenshots of the research posted at my proprietary MISP (Malware Information Sharing Platform) instance:
Stay tuned!
