Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Sunday, May 15, 2016

Mobile Malware Hits Google Play, Thousands of Users Affected

›
We've recently, intercepted, a currently, ongoing, malicious, campaign, that's utilizing, Google Play, for, the purpose, of, serving...
Saturday, May 07, 2016

Threat Intelligence - An Adaptive Approach to Information Security

›
This article will detail the basics of threat intelligence gathering discuss various threat intelligence gathering methodologies discuss the...
Tuesday, April 26, 2016

Malicious Client-Side Exploits Serving Campaign Intercepted, Thousands of Users Affected

›
We've recently intercepted, a currently, circulating, malicious campaign, utilizing, a variety, of compromised, Web sites, for, the purp...

Malware Campaign Using Google Docs Intercepted, Thousands of Users Affected

›
We've recently intercepted, a malicious campaign, utilizing, Google Docs, for, the purpose, of spreading, malicious software, potentiall...
Sunday, April 24, 2016

Analyzing the Bill Gates Botnet - An Analysis

›
We've, recently, intercepted, a high-profile, Linux-based, botnet-driven, type of, malicious, software, that's capable, of launching...

Cybercriminals Launch Malicious Malvertising Campaign, Thousands of Users Affected

›
We've recently intercepted, a currently ongoing malicious malvertising attack, affecting thousands of users globally, potentially exposi...

Hundreds of Google Play Apps Compromised, Lead to Mobile Malware

›
Malicious attackers, have, managed, to, infiltrate, and populate, Google Play, with, hundreds, of rogue, applications, exposing, users, to m...
Friday, August 28, 2015

Historical OSINT - How TROYAK-AS Utillized BGP-over-VPN to Serve the Avalance Botnet

›
Historical OSINT is a crucial part of an intelligence analyst's mindset, further positioning a growing or an emerging trend, as a critic...
Thursday, August 27, 2015

Historical OSINT: OPSEC-Aware Sprott Asset Management Money Mule Recruiters Recruit, Serve Crimeware, And Malvertisements

›
Cybercriminals continue multitasking, on their way to take advantage of well proven fraudulent revenue sources, further, positioning themsel...
Wednesday, July 29, 2015

Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran - Report

›
Dear blog readers, I would like to let you know, of my latest, publicly released report, on the topic of " Assessing The Computer Ne...
Tuesday, October 21, 2014

Rogue Android Apps Hosting Web Site Exposes Malicious Infrastructure

›
With cybercriminals continuing to populate the cybercrime ecosystem with automatically generated and monetized mobile malware variants, w...
Saturday, March 22, 2014

Win32.Nixofro Serving, Malicious Infrastructure, Exposes Fraudulent Facebook Social Media Service Provider

›
I've recently spotted a malicious, cybercrime-friendly SWF iframe/redirector injecting service, that also exposes a long-run Win32.Nixof...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.