Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, September 16, 2008

EstDomains and Intercage VS Cybercrime

›
Surreal, especially when you get to read that EstDomains has " ruthlessly suspended over five thousand domains only for last week ...
Monday, September 15, 2008

Skype Spamming Tool in the Wild - Part Two

›
The less technologically sophisticated lone cybercriminals have always enjoyed the benefits of stand alone DIY applications. From DIY exploi...

Adult Network of 1448 Domains Compromised

›
With millions of malware infected PCs participating in a botnet, the probability that a high profile end user whose domain portfolio consist...
Wednesday, September 10, 2008

Summarizing August's Threatscape

›
Following the previous summaries of June's and July's threatscape based on all the research published during the month, it's t...
Thursday, September 04, 2008

Summarizing Zero Day's Posts for August

›
Here's a concise summary of all of my posts at Zero Day for August. If interested, consider going through July's summary , subscrib...
Wednesday, September 03, 2008

The Commoditization of Anti Debugging Features in RATs

›
Is it a Remote Administration Tool (RAT) or is it malware ? That's the rhetorical question , since RATs are not supposed to have built...

Copycat Web Malware Exploitation Kits are Faddish

›
For the cheap cybercriminals not wanting to invest a couple of thousand dollars into purchasing a cutting edge web malware exploitation kit ...
Tuesday, September 02, 2008

A Diverse Portfolio of Fake Security Software - Part Five

›
The "campaign managers" behind these fake security software propositions are not just starting to take park them at up to three d...
Friday, August 29, 2008

Exposing India’s CAPTCHA Solving Economy

›
"Are you a Human?" - once asked the CAPTCHA, and the question got answered by, well, a human, thousands of them to be precise. Spe...
Thursday, August 28, 2008

Fake Security Software Domains Serving Exploits

›
Psychological imagination, "think cybercriminals" mentality or scenario building intelligence, seem to always produce the results ...
Wednesday, August 27, 2008

Facebook Malware Campaigns Rotating Tactics

›
Trust is vital, and coming up with ways to multiply the trust factor is crucial for a successful malware campaign spreading across social ne...
Tuesday, August 26, 2008

Fake Porn Sites Serving Malware - Part Three

›
This summary is not available. Please click here to view the post.

Automatic Email Harvesting 2.0

›
Just when you think that email harvesting matured into user names harvesting in a true Web 2.0 style with the recently uncovered harvested...
Monday, August 25, 2008

A Diverse Portfolio of Fake Security Software - Part Four

›
Thanks to the affiliate based business model that's driving the increase of fake security software and rogue codecs serving domains, the...
Friday, August 22, 2008

Web Based Botnet Command and Control Kit 2.0

›
The average web based command and control kit for a botnet consisting of single user, single campaign functions only, has just lost its char...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.