Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude

Monday, April 30, 2007

Cryptome Under Fire

›
John Young at Cryptome.org is reporting that its hosting provider decided to terminate their relationship on the basis of violating their ...

Video Demonstration of Vbootkit

›
Orignally introduced at this year's Blackhat con in Amsterdam, the Vbootkit is a kit showcasing the execution of unsigned code on Window...

Malicious Keywords Advertising

›
Blackhat SEO's been actively abused by spammers, phishers and malware authors, each of them contributing to the efficiency of the underg...
Thursday, April 26, 2007

Conventional Weaponry VS Cyber Terrorism

›
Insightful comment on how assymetric warfare and abusing the most versatile communication medium is something conventional weaponry cannot ...

Malware Infected Removable Media

›
In a previous post I discussed various thought to be outdated physical security threats such as leaving behind CDs and DVDs malware ready a...

Outsourcing The Spying on Your Wife

›
Targeted attacks and zero day malware have always been rubbing shoulders, and it's not just a fad despite that everyone's rememberin...
Wednesday, April 25, 2007

Shots from the Malicious Wild West - Sample Seven

›
The Webmoner is a malware family that's been targeting the WebMoney service for the last couple of years , a service which is mostly u...
Monday, April 23, 2007

OSINT Through Botnets

›
Open source intelligence gathering techniques from a government sponsored cyber espionage perspective have been an active doctrine for year...
Friday, April 20, 2007

Google in the Future

›
Great fake as a matter of fact. Don't blame the crawler while crawling the public Web, but the retention of clickstreams for indefinite ...

Shots from the Malicious Wild West - Sample Six

›
Continuing the "Malicious Wild West" series, the Blacksun RAT integration on the web is so modules-friendly it makes you wonder wh...

Shots from the Malicious Wild West - Sample Five

›
Open source malware with a MSQL based web command and control? It's not just Sdbot and Agobot being the most popular malware groups tha...

A Compilation of Web Backdoors

›
The other day I came across to a nice compilation of web backdoors only, and decided to verify how well are various AVs performing when det...
Thursday, April 12, 2007

Mujahideen Secrets Encryption Tool

›
Remember Mujahideen Secrets , the jihadist themed encryption tool released by the Global Islamic Media Front (GIMF) to aid cyber jihadists ...
Tuesday, April 10, 2007

Shots from the Malicious Wild West - Sample Four

›
My previous "shots" related to various pieces of malware, packers, or on the fly malicious URL analysis will continue to expand wi...

Month of Malware Bugs Coming

›
This will prove to be interesting as it's directly related with a previous discussion on hijacking or shutting down someone else's ...
Monday, April 09, 2007

Lie Detecting Software for Text Communications

›
The art of money wasting when there's a surplus of research grants and no one to pick them, or a product concept myopia ? $680,000 have ...
Wednesday, April 04, 2007

Hijacking Your Fear

›
Have no fear, the toxoplasma gondii parasite is here. Just like a decent piece of malware exploiting a zero day vulnerability in an anti vi...

Interacting with Spam Emails

›
Unbelievable, and you wonder why is spam on the verge of destroying email as the once so powerful communication medium. What I don't lik...

Taking Down Phishing Sites - A Business Model?

›
Processing orders for taking down malicious or fraudulent web sites is gaining grounds with not just RSA providing the service, but also, w...
Sunday, April 01, 2007

Cyberpunk is Dead!

›
Yeah sure, on the 1st of April only! Enjoy this marvelous cyberpunk compilation with Juno Reactor as a background music. A group whose wor...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.