Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, May 17, 2007

Yet Another Malware Cryptor In the Wild

›
Just stumbled upon a newly released cryptor in the wild, and as I pointed out in a previous post related to yet another cryptor , they'r...
Wednesday, May 16, 2007

Corporate Espionage Through Botnets

›
Following my previous post on OSINT Through Botnets , here's a company that's categorizing Fortune 500 companies whose networks are...

Visual Script Obfuscation

›
We often talk and deobfuscate scripts aiming to hide their real and often malicious intentions . But what if malicious attackers have become...

The Jihadist Security Encyclopedia

›
A month ago, the Media Jihad Battalion started distributing a 118 pages long encyclopedia on anything starting from secure communications to...

Sampling Jihadists' IPs

›
Great idea as a matter of fact : " The following is based on an analysis of 4,593 IP addresses (1,452 unique IP addresses). The IPs we...
Monday, May 14, 2007

Mind Mapping Web 2.0 Threats

›
An informative, and for sure to be expanded mind map presenting various Web 2.0 threats courtesy of Mike Daw who by the way neatly integrat...

XSS The Planet

›
Yet another initiative proving that major sites indeed suffer from XSS vulnerabilities in exactly the same fashion E-banking sites do. Per...
Friday, May 11, 2007

Big Brother Awards 2007

›
I always liked the idea of emphasizing on the big picture when it comes to the worst privacy invadors on a worldwide basis compared to that ...
Thursday, May 10, 2007

Defeating Virtual Keyboards

›
To deal with the threat of keyloggers -- or to win time during te process of implementing two factor authentication and one-time-passwords-i...

International Cryptography Regulations Map

›
Regulations on importing, exporting and using encryption greatly vary across the world. Bert-Jaap Koops came up with some informative maps h...

Disintermediating the Major Defense Contractors

›
Innovative and cost-effective altogether? Think SpaceShipOne , a commercial space ship that didn't come from a major defense contractor,...
Tuesday, May 08, 2007

DDoS on Demand VS DDoS Extortion

›
There were recent speculations on the decline of DDoS attacks , in respect to the lack of companies actually paying to extortion attacks and...
Friday, May 04, 2007

A Chronology of a Bomb Plot

›
A very detailed overview of a bomb plot , especially the lines related to anything digital such as : - " An e-mail sent from Mr. Khawa...

Winamp PoC Backdoor and a Zero Day

›
Listen to your infection? Not necessarily as this backdoor binds cmd.exe on port 24501, but needs to be socially engineered in the form of ...
Wednesday, May 02, 2007

Anti-Censorship Lifestyle

›
Following a previous post on security lifestyle(s) , and in between the ongoing efforts to censor a 16 digit number I feel it's about t...

The Brandjacking Index

›
Picture a situation where a customer gets tricked into authenticating at the wrong site of company XXX. Would they do business with company ...
Monday, April 30, 2007

Cryptome Under Fire

›
John Young at Cryptome.org is reporting that its hosting provider decided to terminate their relationship on the basis of violating their ...

Video Demonstration of Vbootkit

›
Orignally introduced at this year's Blackhat con in Amsterdam, the Vbootkit is a kit showcasing the execution of unsigned code on Window...

Malicious Keywords Advertising

›
Blackhat SEO's been actively abused by spammers, phishers and malware authors, each of them contributing to the efficiency of the underg...
Thursday, April 26, 2007

Conventional Weaponry VS Cyber Terrorism

›
Insightful comment on how assymetric warfare and abusing the most versatile communication medium is something conventional weaponry cannot ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.