Dancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently stumbled upon yet another diverse portfolio of blackhat SEO domains this time serving rogue security software also known as scareware to unsuspecting users with the...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently intercepted a currently active malicious and fraudulent blakchat SEO campaign successfully enticing users into interacting with rogue and fraudulent scareware-serving...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently came across to a currently active malicious and fraudulent blackhat SEO campaign successfully enticing users into interacting with rogue and fraudulent scareware-serving...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently came across to a currently active diverse portfolio of Swine Flu related domains further enticing users into interacting with rogue and malicious content. In this post I'll...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2008 and I've recently stumbled upon a currently active malicious and fraudulent blackhat SEO campaign successfully enticing users into falling victim into fake security software also known as...
View ArticleDidier Stevens: New tool: decompress_rtf.py
A reader over at the Internet Storm Center asked how to analyze a particular email file (.msg) with my oledump.py tool. MSG files are ole files, and can be analyzed with oledump. In this particular...
View ArticleSANS Internet Storm Center, InfoCON: green: Infocon: green
ISC Stormcast For Friday, April 6th 2018 https://isc.sans.edu/podcastdetail.html?id=5943
View ArticleWired: Security: How Russian Facebook Ads Divided and Targeted US Voters...
New research shows just how prevalent political advertising was from suspicious groups in 2016—including Russian trolls.
View ArticleWired: Security: An Elaborate Hack Shows How Much Damage IoT Bugs Can Do
Rube-Goldbergesque IoT hacks are surprisingly simple to pull off—and can do a ton of damage.
View ArticleUn informático en el lado del mal: Evadiendo el AV/IDS con Powershell: Fun...
He podido disfrutar de unas pequeñas vacaciones y mientras uno tiene horas de avión puede aprovechar para pensar en cosas. En ocasiones las cosas en las que se piensan son la parte de hobby de la que...
View Article...And you will know me by the trail of bits: A Guide to Post-Quantum...
For many high-assurance applications such as TLS traffic, medical databases, and blockchains, forward secrecy is absolutely essential. It is not sufficient to prevent an attacker from immediately...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently stumbled upon a currently active and circulating malicious and fraudulent porfolio of fake security software also known as scareware potentially enticing hundreds of...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently stumbled upon yet another malicious and fraudulent domain portfolio serving a variety of fake security software also known as scareware potentially exposing hundreds of...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently stumbled upon a currently active and circulating malicious and fraudulent blackhat SEO campaign successfully enticing hundreds of thousands globally into interacting with a...
View ArticleAlienVault Blogs: How to Defend Your IoT Devices from IoT Botnets
The Internet of Things (IoT) is changing how the world works. Machine to machine (M2M) communication simply makes for faster, more timely, and transparent connections, thereby saving us a lot of time...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
UPDATE: It appears that someone managed to open my eye and therefore I'm currently experiencing a pressure behind a wall with random people attempting to communicate with me. UPDATE: It appears that...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers it's been several years since I last posted a quality update following my 2010 disappearance. As it's been quite a significant period of time since I last posted a quality update I...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
As ZERODIUM starts paying premium rewards to security researchers to acquire their previously unreported zero-day exploits affecting multiple operating systems software and/or devices a logical...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers I wanted to let everyone know that I will be shortly joining Team Astalavista - The World's Most Popular Information Security Portal acting a Managing Director following a successful...
View ArticleDidier Stevens: Update: pdf-parser.py Version 0.6.9
This new version of pdf-parser.py brings 2 new features; the idea came to me during private & public trainings I gave on malicious documents (if you are interested in a training, please get in...
View Article