Stay tuned!
In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude
Tuesday, February 07, 2023
Happy Holidays From The (Not) Republic of Bulgaria - An Analysis - Part Three
How do you differentiate a gypsy between his mother -- with all due respect to all the gypsies out there sticking to their families and mothers? Yavor Kolev is the answer.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Monday, February 06, 2023
A Peek Inside a Gallery of Fake Security Software Circa 2008 Screenshots - An Analysis
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
A Peek Inside the Internet Explorer Zero Day Exploits Serving Campaign Affecting Thousands of Legitimate Sites Circa 2008 - An Analysis
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
A Peek Inside a Google AdSense Rogue and Bogus Advertisement Campaign Impersonating Legitimate Software - An Analysis
Sample screenshots include:
Stay tuned!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
A Peek Inside a DIY iFrame Embedded DDoS Attack Script Targeting Iran-Based Web Sites - An Analysis
With basic iFrame injecting scripts making their rounds back in 2008 including their use and participation in actual crowd-sourced DDoS attack campaigns internationally I've decided to share with everyone a sample screenshot of a sample iFrame DDoS script that was actually known to have been involved in a successful DDoS attack against major Iran-based web sites back in 2008.
Stay tuned!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Comments (Atom)













































