Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, June 27, 2007

Exploits Serving Domains

›
More cyber leads from the previous analysis of Mpack embedded dekalab.info with a particular malicious domains farm emphasis as follows. ...
Tuesday, June 26, 2007

Early Warning Security Event Systems

›
Years ago, early warning systems for security events used to be a proprietary service available to a vendor's customers only, or even wo...
Monday, June 25, 2007

Security Comic Strips

›
If all rest is a commodity but attitude, let me introduce you to the first two additions from my new Unstripped Security comic strips serie...

Cell Phone Stalking

›
Six year olds install hardware keyloggers at the U.K's Parliament , and now as you can listen to the sweet sixteen's voice in this ...
Friday, June 22, 2007

The MPack Kit Attack on Video

›
Video demonstration of MPack courtesy of Symantec, goes through various infected sites and showcases the consequences of visiting them : ...

A Blacklist of Chinese Spammers

›
With China no longer feeling pround of its position in the top 3 main sources of spam on a worldwide basis, the coutry is going a step beyon...
Thursday, June 21, 2007

A List of Terrorists' Blogs

›
Following previous posts " Full List of Hezbollah's Internet Sites ", and " Hezbollah's DNS Service Providers from 19...

MANPADS and Terrorism

›
Can terrorist entities easily obtain shoulder-launched surface-to-air missiles and how are they achieving it? How is sensitive military tech...
Wednesday, June 20, 2007

Massive Embedded Web Attack in Italy

›
This summary is not available. Please click here to view the post.
Monday, June 18, 2007

Israeli Reconnaissance Satellite C&C - Video

›
Catchy demo of a C&C center in Israel, via Cryptome . A violation of OPSEC? Not necessarily given that some of the synchonized displays...
Tuesday, June 12, 2007

DIY Malware Droppers in the Wild

›
The revenge of the script kiddies, or the master minds releasing DIY tools to let 'em generate enough noise as I've pointed out in m...

Homosexual Warfare

›
Applause for the non-lethal weapons R&D, but a Gay Bomb using aphrodisiacs to provoke sexual behaviour on the field courtesy of the Pen...

Censoring Flickr in China

›
Since I've been discussing China's Internet censorship practices, and I've been doing it pretty much since I've started bl...
Thursday, June 07, 2007

An Analysis of the Technical Mujahid - Issue Two

›
Good afternoon everyone, shall we enjoy some fried cyber jihadists for lunch? I'd say let's go for it. After analyzing issue one of ...
Wednesday, June 06, 2007

Security Cartoons

›
Despite that the main goal of the initiative is to build better awareness among the average Internet user through security cartoons , it...

CIA's "Upcoming" Black Ops Against Iran

›
Recent articles pointing out on a U.S President Bush's clearance for CIA black operations against Iran , make it sound like it's som...
Monday, June 04, 2007

g0t XSSed?

›
Following previous posts on XSSing The Planet and XSS Vulnerabilities in E-banking Sites , here's a full disclosure project that's...

Data Breach Sample Letters of Notification

›
Dear customer, to ensure your satisfaction with our quality services we're notifying you that our inability to protect your sensitive da...
Thursday, May 31, 2007

MSN Spamming Bot

›
An image is sometimes worth a thousand words. This is a screenshot of infected bots spreading spam messages at MSN via typical !spam IRC bas...
Wednesday, May 30, 2007

The WebAttacker in Action

›
Interesting to see that the WebAttacker kit can still be seen in the wild. Here are the redirectors in action : Input URL : _http://rulife....
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.