Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, June 20, 2007

Massive Embedded Web Attack in Italy

›
This summary is not available. Please click here to view the post.
Monday, June 18, 2007

Israeli Reconnaissance Satellite C&C - Video

›
Catchy demo of a C&C center in Israel, via Cryptome . A violation of OPSEC? Not necessarily given that some of the synchonized displays...
Tuesday, June 12, 2007

DIY Malware Droppers in the Wild

›
The revenge of the script kiddies, or the master minds releasing DIY tools to let 'em generate enough noise as I've pointed out in m...

Homosexual Warfare

›
Applause for the non-lethal weapons R&D, but a Gay Bomb using aphrodisiacs to provoke sexual behaviour on the field courtesy of the Pen...

Censoring Flickr in China

›
Since I've been discussing China's Internet censorship practices, and I've been doing it pretty much since I've started bl...
Thursday, June 07, 2007

An Analysis of the Technical Mujahid - Issue Two

›
Good afternoon everyone, shall we enjoy some fried cyber jihadists for lunch? I'd say let's go for it. After analyzing issue one of ...
Wednesday, June 06, 2007

Security Cartoons

›
Despite that the main goal of the initiative is to build better awareness among the average Internet user through security cartoons , it...

CIA's "Upcoming" Black Ops Against Iran

›
Recent articles pointing out on a U.S President Bush's clearance for CIA black operations against Iran , make it sound like it's som...
Monday, June 04, 2007

g0t XSSed?

›
Following previous posts on XSSing The Planet and XSS Vulnerabilities in E-banking Sites , here's a full disclosure project that's...

Data Breach Sample Letters of Notification

›
Dear customer, to ensure your satisfaction with our quality services we're notifying you that our inability to protect your sensitive da...
Thursday, May 31, 2007

MSN Spamming Bot

›
An image is sometimes worth a thousand words. This is a screenshot of infected bots spreading spam messages at MSN via typical !spam IRC bas...
Wednesday, May 30, 2007

The WebAttacker in Action

›
Interesting to see that the WebAttacker kit can still be seen in the wild. Here are the redirectors in action : Input URL : _http://rulife....

The Revenge of the Waitress

›
Think your scrooge tips will achieve their effect? Think twice but don't put the emphasis on underpaid waitresses, rather on the overall...

Reverse Engineering the ANI Vulnerability

›
Informative video analyzing the ANI cursor vulnerability , part of the Google TechTalks series. " Alex Sotirov is a vulnerability engin...
Tuesday, May 29, 2007

Phrack Magazine's Latest Issue

›
Phrack is back believe it or not with its latest Issue 64 released two days ago. The style is still so old-school, so authentic it makes yo...

Google Hacking for Vulnerabilities

›
Tools like these are a clear indication in the interest of gathering targets through google hacking techniques and SQL injecting them using ...
Wednesday, May 23, 2007

Microsoft's Forefront Ad Campaign

›
The introduction of Microsoft's Forefront security solutions is already backed up by a huge ad campaign that can be seen on the majority...

Jihadists' Anonymous Internet Surfing Preferences

›
Jihadists are logically not just interested in encryption and steganography but also, in ways to anonymize their web surfing activities a...

Counter Espionage Tips from the Cold War

›
There's nothing old-fashioned in short films like these representing possible techniques used by intelligence services while recruiting ...
Tuesday, May 22, 2007

A Client Application for "Secure" E-banking?

›
This is perhaps the second product concept myopia right after the lie detection software for text comminations I come across to recently. ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.