Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Showing posts with label Hacking Group. Show all posts
Showing posts with label Hacking Group. Show all posts
Tuesday, September 07, 2021

Exposing Bulgarian Cyber Army Hacking Group - An OSINT Analysis

›
In this OSINT analysis I'll offer in-depth information and analysis of Bulgaria's Bulgarian Cyber Army including personally identifi...

Exposing Team Code Zero Hacking Group - An OSINT Analysis

›
In this post I'll provide personally identifiable information on some of the key members of the Team Code Zero hacking group with the id...

Exposing 29A Virus Coding Group - An OSINT Analysis

›
In this analysis I'll provide personally identifiable information on some of the key members of the infamous 29A Virus Coding Group for ...

Exposing HackPhreak Hacking Group - An OSINT Analysis

›
HackPhreak is a well known U.S based hacking group throughout the 90's which is known  to have been actively using IRC for the purpose o...
Tuesday, February 16, 2021

Exposing a Currently Active Portfolio of Emails Belonging to Iran-Based Lone Hackers and Iran-Based Hacking Teams and Groups - An OSINT Analysis

›
Dear blog readers, I wanted to take the time and effort and publicly share a currently active obtained using Technical Collection list of cu...
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.