Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, July 24, 2006

An Intergalactic Security Statement

›
Hell of a comment on the Malware Search Engine . Hackers crack secret Google malware search codes : " Hidden malware search capabiliti...
Friday, July 21, 2006

Searching for Source Code Security Vulnerabilities

›
While Google was quick enough to censor the colourful Malware Search logo -- colourful branding -- here's another recently started ini...

Detailed Penetration Testing Framework

›
This framework is simply amazing, as it takes you through the entire process of penetration testing , step-by-step in between references to ...

Anti Virus Signatures Update - It Could Wait

›
It's a common myth that all AV vendors exchange the malware they come across in between themselves, whereas that's obviously not alw...

When Financial and Information Security Risks are Supposed to Intersect

›
Interesting security event at Morgan Stanley's NYC headquarters related to insider abuse, mostly interesting because the clients' l...

Budget Allocation Myopia and Prioritizing Your Expenditures

›
Top management's empowerment - the dream of every CSO, or IT manager responsible for allocating the infosec budget, and requesting futur...
Thursday, July 20, 2006

Open Source North Korean IMINT Reloaded

›
Continuing the latest coverage on North Korea , and the Travel Without Moving series , yesterday I came across to an ongoing initiative on...
Monday, July 17, 2006

Malware Search Engine

›
While it seems that it takes a publicly traded Internet filtering company to come up with quite some creativity, it's always coming bac...
Sunday, July 16, 2006

Weaponizing Space and the Emerging Space Warfare Arms Race

›
Satellites Jamming, Hijacking, Space SIGINT, Space Kill Vehicles are just the tip of the iceberg in the ongoing weaponization of Space. In p...

Scientifically Predicting Software Vulnerabilities

›
I recently came across to a research on " Modeling the Vulnerability Discovery Process " discussing : " A few models for the ...

North Korea's Cyber Warfare Unit 121

›
In a previous post, " Who's Who in Cyber Warfare " I commented on a very informative research on the topic, and pointed out t...
Friday, July 14, 2006

Spreading Psychological Imagination Streams

›
Wish I could reference all the copywriting materials I've ever written and got commissioned for, but I'd rather we play a "word...
Monday, July 10, 2006

India's Espionage Leaks

›
You may find this brief overview of Indian security's leaky past cases informative : - " Defence Research and Development Organisa...

South Korea's View on China's Media Control and Censorship

›
Got bored of China's Internet censorship efforts , and its interest to control mobile communications as well? I haven't, and I doub...
Sunday, July 09, 2006

Security Research Reference Coverage

›
I’ve recently started getting more requests on participating or guiding to a certain extend, student theses and various other research paper...
Saturday, July 08, 2006

Delicious Information Warfare - 27/07

›
Given the interest in the perspective, I'm continuing to share my daily reads for the last week and a half. Catch up with previous summ...
Thursday, July 06, 2006

$960M and the FBI's Art of Branding Insecurity

›
In previous posts " Are cyber criminals or bureaucrats the industry's top performer? ", and " Insiders - insights, trends...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.