AlienVault Blogs: Things I Hearted this Week, 18th May 2018
You know the BBC have got their priorities really wrong they pitch Meghan Markle saying her father snubbing the Royal wedding as "Breaking news". What is surprising though is that I haven't seen all...
View ArticleDarknet - The Darkside: CloudFrunt – Identify Misconfigured CloudFront Domains
CloudFrunt is a Python-based tool for identifying misconfigured CloudFront domains, it uses DNS and looks for CNAMEs which may be allowed to be associated with CloudFront distributions. This...
View ArticleUn informático en el lado del mal: Nuestras conferencias esta semana en...
Aprovechando el fin de semana os dejo la lista de las conferencias en las que vamos a participar desde ElevenPaths, LUCA Data-Driven Decisions y 0xWord. Además, aprovecho para recordaros que hoy mismo...
View Article/dev/random: [SANS ISC] Malicious Powershell Targeting UK Bank Customers
I published the following diary on isc.sans.org: “Malicious Powershell Targeting UK Bank Customers”:I found a very interesting sample thanks to my hunting rules… It is a PowerShell script that was...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge: Book...
Dear blog readers, as I'm currently busy writing a book, I'm currently seeking a publisher contact, with the book proposal available on request. Approach me at dancho.danchev@hush.com
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, I'm currently seeking an investment regarding a cybercrime research project with the project proposal available on request. Approach me at dancho.danchev@hush.com
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Looking for a full time threat intelligence analyst, cybercrime researcher, or a security blogger? Approach me at dancho.danchev@hush.com
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, as I'm currently busy launching a private security community, I decided, to publicly announce, its, existence. Topics of discussion: - cybercrime research - threat intelligence -...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear, blog, readers, as, of, today, I'm, making, publicly, available, my, portfolio, of, services, including, active, threat, intelligence, gathering, and, processing, cybercriminals, and, network,...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers it's been quite some time since I last posted a quality update following my dissapearance in 2010. I wanted to express my gratitude to everyone who participated in the search...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, it's been several years since I last posted a quality update, further sharing actionable intelligence with the security community. As, it's been several years since I last posted a...
View ArticleSANS Internet Storm Center, InfoCON: green: 
Threat Hunting &...
Ladies and gentlemen, for our main attraction, I give you...The HELK vs APTSimulator, in a Death Battle! The late, great Randy "Macho Man" Savage said many things in his day, in his own special way,...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, April...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: Infocon: green
ISC Stormcast For Friday, April 6th 2018 https://isc.sans.edu/podcastdetail.html?id=5943
View ArticleUn informático en el lado del mal: Mi conferencia en X1Red+Segura en vídeo:...
Ayer sábado tuve la oportunidad de participar una vez en las jornadas de X1Red+Segura que se organizaron en las instalaciones de la Universidad Politécnica de Madrid en la Ciudad Universitaria y...
View Article/dev/random: Rendering Suspicious EML Files
Sometimes, a security incident starts with an email. A suspicious email can be provided to a security analyst for further investigation. Most of the time, the mail is provided in EML or “Electronic...
View ArticleDidier Stevens: Video: SpiderMonkey Output Options
I created a video to illustrate the new features of my modified SpiderMonkey version:
View ArticleAlienVault Blogs: The Security Policy to Development Procedure Gap
Usually when we talk about DevOps, there's an emphasis on development and operational activities. Often, a key focus is neglected: how we inject security into the DevOps context.If we examine the...
View ArticleUn informático en el lado del mal: Huntpad: El notepad para los cazadores de...
Hace un tiempo que me topé con una herramienta distinta. Estamos acostumbrados a hablar de herramientas que hacemos nosotros con un objetivo concreto, o que utilizamos de forma frecuente para llevar a...
View Article