Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, August 08, 2008

Summarizing Zero Day's Posts for July

›
Different audience provokes different approach for communicating a particular event. In case you aren't reading ZDNet's Zero Day , w...

Email Hacking Going Commercial - Part Two

›
Malware authors seeking financial gains from releasing their trojans often promote them as Remote Access Tools , which if we exclude the bui...
Thursday, August 07, 2008

Phishers Backdooring Phishing Pages to Scam One Another

›
There seems to be no such thing as a free phishing page these days, with phishers scamming one another at an alarming rate according to a re...

Pinch Vulnerable to Remotely Exploitable Flaw

›
In the very same way a cybercrime analyst is reverse engineering and sandboxing a particular piece of malware in order to get a better under...
Tuesday, August 05, 2008

Compromised Web Servers Serving Fake Flash Players

›
The tactic of abusing web servers whose vulnerable web applications allow a malicious attacker to locally host a malicious campaign is nothi...

Twitter Malware Campaign Wants to Bank With You

›
In what appears to be a lone gunman malware campaign -- where the malware spreader even left his email address within the binary - the now...

The Twitter Malware Campaign Wants to Bank With You

›
In what appears to be a lone gunman malware campaign -- where the malware spreader even left his email address within the binary - the now...
Monday, August 04, 2008

McAfee's Site Advisor Blocking n.runs AG - "for starters"

›
Following the recent, and now fixed false positive blocking sans.org due to the already considered malicious dshield.org and giac.org it...
Friday, August 01, 2008

Summarizing July's Threatscape

›
July's threatscape -- consider going through June's summary as well -- once again demonstrated that nothing is impossible, the impo...
Thursday, July 31, 2008

Storm Worm's Lazy Summer Campaigns

›
The Storm Worm-ers seem to be lacking their usual creativity in respect to the usual social engineering attacks taking advantage of the mome...
Wednesday, July 30, 2008

Dissecting a Managed Spamming Service

›
With cybercrime getting easier to outsource these days, and with the overall underground economy's natural maturity from products to ser...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.