Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Syndicate content Some Rights Reserved
In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude
Updated: 33 min 25 sec ago

Historical OSINT - A Diversified Portfolio of Fake Security Software

5 hours 42 min ago
Cybercriminals, continue, actively, launching, malicious, and, fraudulent, campaigns, further, spreading, malicious, software, potentially, exposing, the, confidentiality, availability, and, integrity, of, the, targeted, host, to, a, multi-tude, of, malicious, software. In, this, post, we'll, profile, a, currently, active, portfolio, of, fake, security, software, and, discuss, in-depth, the,
Categories: Security Posts

Historical OSINT - A Portfolio of Fake/Rogue Video Codecs

5 hours 54 min ago
Shall we expose a huge domains portfolio of fake/rogue video codecs dropping the same Zlob variant on each and every of the domains, thereby acting as a great example of what malicious economies of scale means? Currently active Zlob malware variants promoting sites: hxxp://pornqaz.com hxxp://uinsex.com hxxp://qazsex.com hxxp://sexwhite.net hxxp://lightporn.net hxxp://xeroporn.com hxxp://
Categories: Security Posts

Historical OSINT - A Portfolio of Exploits Serving Domains

6 hours 17 min ago
With, the, rise, of, Web, malware, exploitation, kits, continuing, to, proliferate, cybercriminals, are, poised, to, continue, earning, fraudulent, revenue, in, the, process, of, monetizing, access, to, malware-infected, hosts, largely, relying, on, the, active,y utilization, of, client-side, exploits, further, spreaing, malicious, software, potentially, compromising, the, confidentiality,
Categories: Security Posts

New Mobile Malware Spotted in the Wild, Hundreds of Users Affected

6 hours 52 min ago
We've, recently, intercepted, a, currently, circulating, malicious, mobile, malware, potentially, compromising, the, confidentiality, availability, and, integrity, of, the, compromised, devices, further, spreading, malicious, software, on, the, affected, devices, with, the, cybercriminals, behind, it, potentially, earning, fraudulent, revenue, in, the, process, of, monetizing, access, to,
Categories: Security Posts

Historical OSINT - Inside the 2007-2009 Series of Cyber Attacks Against Multiple International Embassies

6 hours 53 min ago
Remember, the, Russian, Business, Network, and, the, New, Media, Malware, Gang? It's, been, several, years, since, I, last, posted, an, update, regarding, the, group's, activities, including, the, direct, establishing, of, a, direct, connection, between, the, Russian, Business, Network, the, New, Media, Malware, gang, including, a, variety, of, high, profile, Web, site, compromise, campaigns.
Categories: Security Posts

Dancho Danchev's Mind Streams of Information Security Knowledge - The World's Most Comprehensive Threats Database

6 hours 53 min ago
Dear blog readers, it's been several years since I last posted a quality update, further sharing actionable intelligence with the security community. As, it's been several years since I last posted a quality update I feel it's about time that we take the stakes a little higher by successfully launching what can be best described as the industry's leading and most versatile JSON-capable threats
Categories: Security Posts

Threat Intelligence - An Adaptive Approach to Information Security - Free Consultation Available

6 hours 53 min ago
Dear, blog, readers, as, of, today, I'm, making, publicly, available, my, portfolio, of, services, including, active, threat, intelligence, gathering, and, processing, cybercriminals, and, network, assets, profiling, real, life, personalization, of, malicious, actors, OSINT, analyses, in-depth, understanding, and, processing, of, tactics, techniques, and, procedures (TTPs), including, the,
Categories: Security Posts

DDanchev is for Hire!

6 hours 54 min ago
Looking for a full time threat intelligence analyst, cybercrime researcher, or a security blogger? Send your proposition to: ddanchev@protonmail.ch
Categories: Security Posts

Book Proposal - Seeking Sponsorship - Publisher Contact

6 hours 54 min ago
Dear, blog, readers, as, I'm, currently, busy, writing, a, book, I'm looking for, a publisher, who's, interested, in, publishing, it, with, the, book, proposal, available, on, request. Send your proposal to: ddanchev@protonmail.ch
Categories: Security Posts

Project Proposal - Cybercrime Research - Seeking Investment

6 hours 54 min ago
Dear blog readers, I'm currently seeking an investment regarding a cybercrime research project, with, the, project, proposal, available, on request. Send your proposal at: ddanchev@protonmail.ch
Categories: Security Posts

Invitation to Join a Security Community

6 hours 55 min ago
Dear blog readers, as I'm currently busy launching a private security community, I decided, to publicly announce, its, existence. Topics of discussion: - cybercrime research - threat intelligence - malicious software Request an invite: ddanchev@protonmail.ch
Categories: Security Posts

Follow me on Twitter!

6 hours 55 min ago
Dear, blog readers, are, you, on Twitter? Feel, free, to, follow me. Enjoy!
Categories: Security Posts

Dancho Danchev's 2010 Disappearance - An Elaboration

6 hours 55 min ago
UPDATE: Prior, to, my, stay, in, another, town, I, was, contacted, by, Riva Richmond, (riva@rivarichmond.com), and, set, up, a, meeting, to, discuss, a, potential, New York Times, article. UPDATE: Prior, to, my, stay, at, this, particular, apartment, I, contacted, Nart Villeneuve, (n.villeneuve@secdev.ca), seeking, assistance, signaling, potential, trouble. UPDATE: Prior, to, my, stay, at, a,
Categories: Security Posts