Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, July 29, 2008

Neosploit Team Leaving the IT Underground

›
The Neosploit Team are abandoning support for their Neosploit web exploitation malware kit , citing a negative return on investment as the m...

Over 80 percent of Storm Worm Spam Sent by Pharmaceutical Spam Kings

›
It used to be a case where a botnet would be used for a single purpose, spamming, phishing, or malware spreading. At a later stage, the stea...
Monday, July 28, 2008

Click Fraud, Botnets and Parked Domains - All Inclusive

›
It gets very ugly when someone owns both, the botnet, and the portfolio of parked domains actively participating in PPC (pay per click) adve...

Smells Like a Copycat SQL Injection In the Wild

›
In between the massive SQL injections , that as a matter of fact remain ongoing, copycats taking advantage of the very same SQL injection to...
Friday, July 25, 2008

Counting the Bullets on the (Malware) Front

›
How much malware is your antivirus solution detecting? A million, ten million, even "worse", less than a million? Does it really m...

Counting the Bullets on the (Malware) Front

›
How much malware is your antivirus solution detecting? A million, ten million, even "worse", less than a million? Does it really m...
Thursday, July 24, 2008

Vulnerabilities in Antivirus Software - Conflict of Interest

›
Vulnerabilities within security solutions -- antivirus software in this case -- are a natural event, however, the conflict of interests and ...

People's Information Warfare vs the U.S DoD Cyber Warfare Doctrine

›
Which doctrine would you choose if you had the mandate to? Dark room a We cannot discuss these if we don't compare their cyber warfare a...

Email Hacking Going Commercial

›
This email hacking as a service offering is the direct result of the public release of a DIY hacking kit consisting of each and every public...
Tuesday, July 22, 2008

Lazy Summer Days at UkrTeleGroup Ltd

›
The result of building extra confidence into your malicious hosting provider's ability to remain online , is a scammy ecosystem that...

Coding Spyware and Malware for Hire

›
What type of antivirus evasion do you want today? For the past several years, we have been witnessing the emerging customerization applied i...
Monday, July 21, 2008

Impersonating StopBadware.org to Serve Fake Security Warnings

›
Malware is known to have been hijacking search results, take for instance the rogue Antivirus XP 2008 as a recent example, but it's eve...

SQL Injecting Malicious Doorways to Serve Malware

›
Abusing legitimate sites as redirectors to malicious doorways serving malware is becoming increasing common, as is the use of SQL injections...
Friday, July 18, 2008

Money Mule Recruiters use ASProx's Fast Fluxing Services

›
Just consider this scheme for a second. A well known money mule recruitment site Cash Transfers is maintaining a fast-flux infrastructure o...

Money Mule Recruiters use ASProx's Fast Fluxing Services

›
Just consider this scheme for a second. A well known money mule recruitment site Cash Transfers is maintaining a fast-flux infrastructure o...

Money Mule Recruiters use ASProx's Fast Fluxing Services

›
Just consider this scheme for a second. A well known money mule recruitment site Cash Transfers is maintaining a fast-flux infrastructure o...

The Ayyildiz Turkish Hacking Group VS Everyone

›
Certain hacktivist groups often come and go by the time the momentum of their particular cause is long gone. Excluding the hardcore hacktivi...
Thursday, July 17, 2008

The Unbreakable CAPTCHA

›
In response to the continuing evidence of how spammers are efficiently breaking the CAPTCHAs of popular free email service providers in or...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.