Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, July 24, 2008

Vulnerabilities in Antivirus Software - Conflict of Interest

›
Vulnerabilities within security solutions -- antivirus software in this case -- are a natural event, however, the conflict of interests and ...

People's Information Warfare vs the U.S DoD Cyber Warfare Doctrine

›
Which doctrine would you choose if you had the mandate to? Dark room a We cannot discuss these if we don't compare their cyber warfare a...

Email Hacking Going Commercial

›
This email hacking as a service offering is the direct result of the public release of a DIY hacking kit consisting of each and every public...
Tuesday, July 22, 2008

Lazy Summer Days at UkrTeleGroup Ltd

›
The result of building extra confidence into your malicious hosting provider's ability to remain online , is a scammy ecosystem that...

Coding Spyware and Malware for Hire

›
What type of antivirus evasion do you want today? For the past several years, we have been witnessing the emerging customerization applied i...
Monday, July 21, 2008

Impersonating StopBadware.org to Serve Fake Security Warnings

›
Malware is known to have been hijacking search results, take for instance the rogue Antivirus XP 2008 as a recent example, but it's eve...

SQL Injecting Malicious Doorways to Serve Malware

›
Abusing legitimate sites as redirectors to malicious doorways serving malware is becoming increasing common, as is the use of SQL injections...
Friday, July 18, 2008

Money Mule Recruiters use ASProx's Fast Fluxing Services

›
Just consider this scheme for a second. A well known money mule recruitment site Cash Transfers is maintaining a fast-flux infrastructure o...

Money Mule Recruiters use ASProx's Fast Fluxing Services

›
Just consider this scheme for a second. A well known money mule recruitment site Cash Transfers is maintaining a fast-flux infrastructure o...

Money Mule Recruiters use ASProx's Fast Fluxing Services

›
Just consider this scheme for a second. A well known money mule recruitment site Cash Transfers is maintaining a fast-flux infrastructure o...

The Ayyildiz Turkish Hacking Group VS Everyone

›
Certain hacktivist groups often come and go by the time the momentum of their particular cause is long gone. Excluding the hardcore hacktivi...
Thursday, July 17, 2008

The Unbreakable CAPTCHA

›
In response to the continuing evidence of how spammers are efficiently breaking the CAPTCHAs of popular free email service providers in or...

Obfuscating Fast-fluxed SQL Injected Domains

›
It's all a matter of how you put it, and putting it like represents a good example of tactical warfare, namely, combining different tact...
Tuesday, July 15, 2008

The Neosploit Malware Kit Updated with Snapshot ActiveX Exploit

›
Raising Symantec's ThreatCon based on a newly introduced exploit within a (random) copy of a popular web malware exploitation kit? Now ...

Are Stolen Credit Card Details Getting Cheaper?

›
What is shaping the prices of stolen credit card details? The investments the cybercriminals or real life scammers ( through credit card clo...
Monday, July 14, 2008

Malware and Office Documents Joining Forces

›
Common office files as documents, presentations, spreadsheets and PDF files, are the most widely abused ones in targeted attacks, which when...

Monetizing Compromised Web Sites

›
Despite that pure patriotic hacktivism is still alive and kicking, compromised sites are largely getting monetized these days, starting fro...
Friday, July 11, 2008

Violating OPSEC for Increasing the Probability of Malware Infection

›
Are malware authors and the rest of the participants in fact willing to violate their OPSEC (operational security) for the sake of increasin...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.