Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, May 02, 2007

Anti-Censorship Lifestyle

›
Following a previous post on security lifestyle(s) , and in between the ongoing efforts to censor a 16 digit number I feel it's about t...

The Brandjacking Index

›
Picture a situation where a customer gets tricked into authenticating at the wrong site of company XXX. Would they do business with company ...
Monday, April 30, 2007

Cryptome Under Fire

›
John Young at Cryptome.org is reporting that its hosting provider decided to terminate their relationship on the basis of violating their ...

Video Demonstration of Vbootkit

›
Orignally introduced at this year's Blackhat con in Amsterdam, the Vbootkit is a kit showcasing the execution of unsigned code on Window...

Malicious Keywords Advertising

›
Blackhat SEO's been actively abused by spammers, phishers and malware authors, each of them contributing to the efficiency of the underg...
Thursday, April 26, 2007

Conventional Weaponry VS Cyber Terrorism

›
Insightful comment on how assymetric warfare and abusing the most versatile communication medium is something conventional weaponry cannot ...

Malware Infected Removable Media

›
In a previous post I discussed various thought to be outdated physical security threats such as leaving behind CDs and DVDs malware ready a...

Outsourcing The Spying on Your Wife

›
Targeted attacks and zero day malware have always been rubbing shoulders, and it's not just a fad despite that everyone's rememberin...
Wednesday, April 25, 2007

Shots from the Malicious Wild West - Sample Seven

›
The Webmoner is a malware family that's been targeting the WebMoney service for the last couple of years , a service which is mostly u...
Monday, April 23, 2007

OSINT Through Botnets

›
Open source intelligence gathering techniques from a government sponsored cyber espionage perspective have been an active doctrine for year...
Friday, April 20, 2007

Google in the Future

›
Great fake as a matter of fact. Don't blame the crawler while crawling the public Web, but the retention of clickstreams for indefinite ...

Shots from the Malicious Wild West - Sample Six

›
Continuing the "Malicious Wild West" series, the Blacksun RAT integration on the web is so modules-friendly it makes you wonder wh...

Shots from the Malicious Wild West - Sample Five

›
Open source malware with a MSQL based web command and control? It's not just Sdbot and Agobot being the most popular malware groups tha...

A Compilation of Web Backdoors

›
The other day I came across to a nice compilation of web backdoors only, and decided to verify how well are various AVs performing when det...
Thursday, April 12, 2007

Mujahideen Secrets Encryption Tool

›
Remember Mujahideen Secrets , the jihadist themed encryption tool released by the Global Islamic Media Front (GIMF) to aid cyber jihadists ...
Tuesday, April 10, 2007

Shots from the Malicious Wild West - Sample Four

›
My previous "shots" related to various pieces of malware, packers, or on the fly malicious URL analysis will continue to expand wi...

Month of Malware Bugs Coming

›
This will prove to be interesting as it's directly related with a previous discussion on hijacking or shutting down someone else's ...
Monday, April 09, 2007

Lie Detecting Software for Text Communications

›
The art of money wasting when there's a surplus of research grants and no one to pick them, or a product concept myopia ? $680,000 have ...
Wednesday, April 04, 2007

Hijacking Your Fear

›
Have no fear, the toxoplasma gondii parasite is here. Just like a decent piece of malware exploiting a zero day vulnerability in an anti vi...

Interacting with Spam Emails

›
Unbelievable, and you wonder why is spam on the verge of destroying email as the once so powerful communication medium. What I don't lik...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.