I’m Back!

Dear blog readers – it’s been a while since I’ve last posted a quality update following my disappearance and possible kidnapping attempt circa 2010 but as many of you have noticed I’ve recently published a variety of research and CYBERINT type of artic… Continue reading I’m Back!

Dancho Danchev’s Blog – Open Call for Blog Contributors and Guest Bloggers

UPDATE: Do you know which is one of the World’s most popular Security blogs and who’s running it? Guess what – you’ve been reading it all along. Ever since I started this blog in December, 2005 for the purpose of impressing my girlfriend and greatly in… Continue reading Dancho Danchev’s Blog – Open Call for Blog Contributors and Guest Bloggers

Historical OSINT – The Russian Business Network Says “Hi”

You know you’re popular when “they” say “hi”.

It’s 2009 and I’ve received a surprising personal email courtesy of guess who – The Russian Business Network showing off the actual ownership of the hxxp://rbnnetwork.com domain and basically saying “hi”. … Continue reading Historical OSINT – The Russian Business Network Says “Hi”

How can I know if the cyber-protection offered by my ISP is worth the extra cost?

My ISP offers a “cyber protection” service at an extra cost. They say it “identifies and blocks privacy attacks, credit-card scams, identity thefts and hacker attacks against computers connected to your home network”, but do … Continue reading How can I know if the cyber-protection offered by my ISP is worth the extra cost?

Assessing the Recently Leaked FSB Contractor Data – A Peek Inside Russia’s Understanding of Social Network Analysis and Tailored Access Operations

I’ve recently managed to obtain a copy of the recently leaked FSB contractor data courtesy of 0v1ru$ and “Digital Revolution” and I’ve decided to take a closer look including an in-depth overview and discussion of the leaked data in the context of toda… Continue reading Assessing the Recently Leaked FSB Contractor Data – A Peek Inside Russia’s Understanding of Social Network Analysis and Tailored Access Operations

Upcoming Offensive Warfare 2.0 Cyber Security and Hacking Community YouTube Livestream Broadcast – RSVP Today!

Dear blog readers,

I wanted to let everyone know that I’ll be doing a Live YouTube Broadcast – this Friday – 05/07/2019 20:30 P.M – Eastern European Summer Time (EEST), UTC +3 in terms of my newly launched Offensive Warfare 2.0 – Cyber Security and Ha… Continue reading Upcoming Offensive Warfare 2.0 Cyber Security and Hacking Community YouTube Livestream Broadcast – RSVP Today!

Cellular networks worldwide hit by hackers in espionage attempt

By Uzair Amir
Cybereason, an Israeli-US security firm based in Boston, has reported that certain nation-state hackers managed to compromise the systems of no less than ten cellular carriers across the globe to steal metadata of specific users. Without … Continue reading Cellular networks worldwide hit by hackers in espionage attempt

The US is reportedly seeding Russia’s power grid with malware

The US is alleged to have been quietly planting malware throughout Russia’s energy networks in response to years of Russian attacks on its own power grid. Continue reading The US is reportedly seeding Russia’s power grid with malware