Check out this interview with me in Russian!
Stay tuned!
In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Dear blog readers,
I've decided to continue posting and recommended relevant and high-profile songs of the day with the idea to empower you to stay on the top of your game and to empower and offer a new listening experience for your work.
Stay tuned!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Dear blog readers,
Continuing the "Travel Without Moving" blog post series where I used to feature a high-profile publicly accessible satellite imagery for a variety of high-profile locations throughout the years I've decided to share a highly recommended video which is basically a THAAD demonstration video which you should watch and enjoy in case you're interested in learning more about modern military technology.
Stay tuned!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
This is Dancho. I wanted to let everyone know that I've recently started running a proprietary MISP (Malware Information Sharing Platform) instance where I distribute and share most of my proprietary research with a variety of third-parties including connected instances or users who have API access to my research which is now also available in STIX/TAXII including MISP format where you or your organization can request API access to my proprietary threat intelligence feed for research or commercial purposes by approaching me at dancho.danchev@hush.com
Sample categories which I cover in my daily batch of proprietary threat intelligence research include:
Sample screenshots of the research posted at my proprietary MISP (Malware Information Sharing Platform) instance:
Stay tuned!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Dear blog readers,
This is Dancho. I wanted to take and effort and present a newly launched series of blog posts called "Psytrance Song of the Day" where I intend to share with you some of the high-profile and currently circulating psytrance songs with the idea to help you reach out to a new set of music including to empower you with a new set of music choice for your listening and enrichment experience.
Stay tuned!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
With more cybercriminals continue to look for ways to monetize access to malware-infected hosts by actively launching malware spam and phishing fraud campaigns online more users continue getting exposed and potentially falling victim into these type of scams with the cybercriminals behind these campaigns successfully compromising home-based and corporate networks while earning fraudulently obtained or generated revenue from the access to the malware-infected hosts.
In the following free threat intelligence report we will offer an in-depth actionable intelligence on modern cyber threats facing U.K’s infrastructure with the idea to raise awareness on the degree of sophistication and persistence on behalf of Russian an international-based cybercriminals who seek to obtain access to home and corporate-based networks possibly seeking financial gain. We will also provide a sample threat data to showcase our modern threat intelligence platform in action which works by intercepting and reponding to modern cyber attack threats which include Client-Side Exploits, Web Site Defacements, Radical Propaganda, Scareware, Rogueware, Phishing, Spam, Malicious Software, Botnets, Command and Control Infrastructure, Compromised Web Sites, oney Mule Recruitment facing U.K’s infrastructure and actually notifies the affected party in an automated fashion.
Users who are interested in gaining more insight into their network’s susceptibility to modern cyber attack threats including their home and corporate network including their ISP (Internet Service Provider) should approach us at - dancho.danchev@hush.com

Stay tuned!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com