Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, January 27, 2022

Profiling Yaroslav Vasinskyi from the Kaseya Ransomware Attack Campaign - An OSINT Analysis

›
It appears that the U.S Justice Department has recently made arrests in the Kaseya ransomware dropping campaign and I've decided to dig...

Exposing FBI's Most Wanted Iran's Mabna Hackers - An OSINT Analysis

›
Dear blog readers, In this post I've decided to share actionable intelligence on the online infrastructure of FBI's Most Wanted Iran...

Exposing Behrooz Kamalian's Ashiyane ICT Company - An OSINT Analysis

›
Dear blog readers, I've decided to share with everyone some practical and actionable threat intelligence information regarding members o...

Profiling the Emotet Botnet C&C Infrastructure - An OSINT Analysis

›
Dear blog readers, I've decided to share a recently obtained Emotet botnet C&C server IPs for the purpose of empowering everyone wit...

Exposing a Currently Active "Jabber ZeuS" also known as "Aqua ZeuS" Gang Personal Email Portfolio - An OSINT Analysis

›
Note:  This OSINT analysis has been originally published at my current employer's Web site -  https://whoisxmlapi.com  where I'm cur...

Profiling the Liberty Front Press Network Online - An OSINT Analysis

›
Note:  This OSINT analysis has been originally published at my current employer's Web site -  https://whoisxmlapi.com  where I'm cur...

Profiling Russia's U.S Election Interference 2016 - An OSINT Analysis

›
Note:  This OSINT analysis has been originally published at my current employer's Web site -  https://whoisxmlapi.com  where I'm cur...

Exposing a Currently Active Domain Portfolio Managed and Operated by Members of the Ashiyane Digital Security Team - An OSINT Analysis

›
Note:  This OSINT analysis has been originally published at my current employer's Web site -  https://whoisxmlapi.com  where I'm cur...

Exposing a Currently Active Free Rogue VPN Domains Portfolio Courtesy of the NSA - An OSINT Analysis

›
Note: This OSINT analysis has been originally published at my current employer's Web site - https://whoisxmlapi.com  where I'm curr...

Exposing a Currently Active List of Iran-Based Hacker and Hacker Team's Handles - An OSINT Analysis

›
Dear blog readers, I've decided to share with everyone a currently active list of Iran-based hacker and hacker team's handles which ...
Wednesday, January 26, 2022

Exposing a Currently Active List of Iran-Based Hacker and Hacker Team's Handles - An OSINT Analysis - Part Two

›
Tuesday, January 25, 2022

Who Wants to Support My Work Commercially?

›
Folks, Who wants to dive deep into some of my latest commercially available research and stay on the top of their OSINT/cybercrime research ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.