Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, July 26, 2006

Splitting a Botnet's Bandwidth Capacity

›
Metaphorically speaking, I always say that the masssess of end users' bandwidth is reaching that of a mid size ISP, while the lack of in...
Tuesday, July 25, 2006

Latest Report on Click Fraud

›
Google does have countless features, and it's not even considering to stop rolling new ones, but the secret to its huge market capitaliz...
Monday, July 24, 2006

An Intergalactic Security Statement

›
Hell of a comment on the Malware Search Engine . Hackers crack secret Google malware search codes : " Hidden malware search capabiliti...
Friday, July 21, 2006

Searching for Source Code Security Vulnerabilities

›
While Google was quick enough to censor the colourful Malware Search logo -- colourful branding -- here's another recently started ini...

Detailed Penetration Testing Framework

›
This framework is simply amazing, as it takes you through the entire process of penetration testing , step-by-step in between references to ...

Anti Virus Signatures Update - It Could Wait

›
It's a common myth that all AV vendors exchange the malware they come across in between themselves, whereas that's obviously not alw...

When Financial and Information Security Risks are Supposed to Intersect

›
Interesting security event at Morgan Stanley's NYC headquarters related to insider abuse, mostly interesting because the clients' l...

Budget Allocation Myopia and Prioritizing Your Expenditures

›
Top management's empowerment - the dream of every CSO, or IT manager responsible for allocating the infosec budget, and requesting futur...
Thursday, July 20, 2006

Open Source North Korean IMINT Reloaded

›
Continuing the latest coverage on North Korea , and the Travel Without Moving series , yesterday I came across to an ongoing initiative on...
Monday, July 17, 2006

Malware Search Engine

›
While it seems that it takes a publicly traded Internet filtering company to come up with quite some creativity, it's always coming bac...
Sunday, July 16, 2006

Weaponizing Space and the Emerging Space Warfare Arms Race

›
Satellites Jamming, Hijacking, Space SIGINT, Space Kill Vehicles are just the tip of the iceberg in the ongoing weaponization of Space. In p...

Scientifically Predicting Software Vulnerabilities

›
I recently came across to a research on " Modeling the Vulnerability Discovery Process " discussing : " A few models for the ...

North Korea's Cyber Warfare Unit 121

›
In a previous post, " Who's Who in Cyber Warfare " I commented on a very informative research on the topic, and pointed out t...
Friday, July 14, 2006

Spreading Psychological Imagination Streams

›
Wish I could reference all the copywriting materials I've ever written and got commissioned for, but I'd rather we play a "word...
Monday, July 10, 2006

India's Espionage Leaks

›
You may find this brief overview of Indian security's leaky past cases informative : - " Defence Research and Development Organisa...

South Korea's View on China's Media Control and Censorship

›
Got bored of China's Internet censorship efforts , and its interest to control mobile communications as well? I haven't, and I doub...
Sunday, July 09, 2006

Security Research Reference Coverage

›
I’ve recently started getting more requests on participating or guiding to a certain extend, student theses and various other research paper...
Saturday, July 08, 2006

Delicious Information Warfare - 27/07

›
Given the interest in the perspective, I'm continuing to share my daily reads for the last week and a half. Catch up with previous summ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.