Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, April 23, 2008

The United Nations Serving Malware

›
Yet another massive SQL injection attack is making its rounds online, and this time without the SEO poisoning as an attack tactic , has mana...

The DDoS Attack Against CNN.com

›
The DDoS attack against CNN.com, whether successful or not in terms of the perspective of complete knock-out, which didn't happen, is a ...
Tuesday, April 22, 2008

Chinese Hacktivists Waging People's Information Warfare Against CNN

›
Empowering and coordinating script kiddies by releasing DIY DDoS tools (backdoored as well) during the DDoS attacks against Estonia for in...
Monday, April 21, 2008

Ten Signs It's a Slow News Week

›
You know it's a slow news week when you come across : 1. Articles starting that malware increased 450% during the last quarter - of cour...

Phishing Tactics Evolving

›
Malware authors, phishers and spammers have been actively consolidating for the past couple of years, and until they figure out to to verti...

The Rise of Kosovo Defacement Groups

›
There's no better way to assess the incident that still haven't made it into the mainstream media, but to violate defacement group...

China's CERT Annual Security Report - 2007

›
Every coin has two sides, and while China has long embraced unrestricted warfare and people's information warfare for conducting cyber...
Friday, April 18, 2008

Phishing Emails Generating Botnet Scaling

›
A bigger and much more detailed picture is starting to emerge, with yet another spammed malware campaign courtesy of the botnet that is so f...
Wednesday, April 16, 2008

Fake Yahoo Greetings Malware Campaign Circulating

›
The persistence of certain botnet masters cannot remain unnoticed even if you're used to going through over a dozen active malware campa...

Web Email Exploitation Kit in the Wild

›
XSS exploitation within the most popular Russian, and definitely international in the long-term, web email service providers is also embraci...
Tuesday, April 15, 2008

Malware and Exploits Serving Girls

›
Descriptive domains such as beautiful-and-lonely-girl dot com, amateur homepage looking sites, a modest photo archive of different girls, ap...
Monday, April 14, 2008

Localized Fake Security Software

›
Would you believe that in times when top tier antivirus vendors are feeling the heat from the malware authors' DoS attacks on their hone...

ICQ Messenger Controlled Malware

›
IM me a command, master - part two . Diversifying the command and control channels of malware is always in a permanent development phrase, w...
Tuesday, April 08, 2008

Romanian Script Kiddies and the Screensavers Botnet

›
Shall we turn into zombies, and peek into the modest botnet courtesy of Romanian script kiddies, that are currently spamming postcard.scr gr...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.