ddanchev.blogspot.com
Open in
urlscan Pro
2a00:1450:4001:800::2001
Public Scan
URL:
https://ddanchev.blogspot.com/2022/06/a-compilation-of-known-conti-ransomware_19.html/
Submission: On August 30 via api from US — Scanned from DE
Submission: On August 30 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMhttps://ddanchev.blogspot.com/search
<form action="https://ddanchev.blogspot.com/search" class="gsc-search-box" target="_top">
<table cellpadding="0" cellspacing="0" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<input autocomplete="off" class="gsc-input" name="q" size="10" title="search" type="text" value="">
</td>
<td class="gsc-search-button">
<input class="gsc-search-button" title="search" type="submit" value="Search">
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Sorry, the page you were looking for in this blog does not exist. Sorry, the page you were looking for in this blog does not exist. Home Subscribe to: Posts (Atom) ABOUT ME Dancho Danchev Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com View my complete profile SEARCH DARK WEB ONION FEATURED POST DANCHO DANCHEV'S DISAPPEARANCE - 2010 - OFFICIAL COMPLAINT AGAINST REPUBLIC OF BULGARIA REGARDING DANCHO DANCHEV'S ILLEGAL LAW ENFORCEMENT ARREST HOME MOLESTATION AND KIDNAPPING ATTEMPT - A COMPILATION DANCHO DANCHEV'S ILLEGAL LAW ENFORCEMENT ARREST HOME MOLESTATION AND KIDNAPPING ATTEMPT CIRCA 2010 * A Profile of a Bulgarian Kidnapper – Pavlin Georgiev (Павлин Георгиев/Васил Моев Гачевски/Явор - Колев) – An Elaboration on Dancho Danchev’s Disappearance circa 2010 – An Analysis * An Update on My Disappearance and Kidnapping Attempt Courtesy of Bulgarian Law Enforcement Officers from the City of Troyan Bulgaria Circa 2010 - An Analysis * Courtesy of Republic of Bulgaria! * Courtesy of Republic of Bulgaria! - Part Five * Courtesy of Republic of Bulgaria! - Part Four * Courtesy of Republic of Bulgaria! - Part Three * Courtesy of Republic of Bulgaria! - Part Two * Dancho Danchev's Disappearance - 2010 - Official Complaint Against Republic of Bulgaria - Part Three * Dancho Danchev's Disappearance - 2010 - Official Complaint Against Republic of Bulgaria - Part Two * Dancho Danchev's Disappearance - An Elaboration - Part Two * Dancho Danchev's Disappearance 2010 - Official Complaint Against Republic of Bulgaria * Deep from the Trenches in Bulgaria - Part Three * Deep from the Trenches in Bulgaria - Part Two * How I Got Robbed and Beaten and Illegally Arrested by a Local Troyan Gang in Bulgaria * What You Get From "Peasant-aria Land" - A New Cyber Security Center - Behold Yourself To the Almighty Savior! - An Analysis SUBSCRIBE Posts Atom Posts All Comments Atom All Comments Join the Blue Ribbon Online Free Speech Campaign! BLOGS I FOLLOW * Adam Shoshtack * Anton Chuvakin * Astalavista.box.sk * Astalavista.com * Bruce Schneier * CERIAS Purdue * Cryptome.org * CSO Online * Dan Kaminsky * DarkReading * Electronic Frontier Foundation * Electronic Privacy Information Center * Google Security Blog * Graham Cluley * HelpNetSecurity * Information Security Magazine * KrebsOnSecurity * Lastwatchdog * Naked Security * SCMagazine * Securelist * SecurityWeekly * Talos Intelligence * Tao Security * ThreatPost * Virus Bulletin Blog * Webroot Threat Blog * WeLiveSecurity * ZDNet Zero Day Blog BLOG ARCHIVE * ▼ 2022 (128) * August (23) * July (17) * June (26) * April (3) * March (11) * February (14) * January (34) * ► 2021 (177) * December (14) * November (9) * October (27) * September (21) * August (2) * July (13) * June (13) * May (11) * April (20) * March (24) * February (14) * January (9) * ► 2020 (52) * December (29) * November (1) * October (1) * September (4) * August (3) * July (8) * June (1) * May (2) * February (1) * January (2) * ► 2019 (58) * December (9) * November (1) * October (1) * September (8) * August (2) * July (6) * May (13) * April (3) * March (1) * February (10) * January (4) * ► 2018 (34) * December (2) * October (26) * September (1) * July (2) * May (1) * January (2) * ► 2017 (16) * November (3) * July (1) * May (10) * January (2) * ► 2016 (46) * December (12) * September (4) * August (9) * June (3) * May (13) * April (5) * ► 2015 (3) * August (2) * July (1) * ► 2014 (11) * October (1) * March (3) * January (7) * ► 2013 (78) * December (5) * November (12) * October (3) * September (5) * August (14) * July (7) * June (7) * May (5) * April (5) * March (3) * February (6) * January (6) * ► 2012 (38) * December (2) * November (7) * October (3) * September (4) * August (2) * July (2) * June (2) * May (4) * April (2) * March (2) * February (2) * January (6) * ► 2011 (58) * December (1) * October (7) * September (4) * August (4) * July (3) * June (1) * May (10) * April (5) * March (12) * February (6) * January (5) * ► 2010 (89) * September (2) * August (3) * July (7) * June (7) * May (16) * April (15) * March (13) * February (17) * January (9) * ► 2009 (134) * December (9) * November (13) * October (9) * September (10) * August (12) * July (14) * June (11) * May (11) * April (11) * March (11) * February (12) * January (11) * ► 2008 (267) * December (10) * November (15) * October (25) * September (17) * August (26) * July (38) * June (19) * May (33) * April (30) * March (19) * February (21) * January (14) * ► 2007 (332) * December (20) * November (33) * October (32) * September (28) * August (25) * July (22) * June (20) * May (30) * April (20) * March (41) * February (32) * January (29) * ► 2006 (326) * December (20) * November (20) * October (28) * September (40) * August (27) * July (28) * June (29) * May (33) * April (20) * March (19) * February (23) * January (39) * ► 2005 (6) * December (6) LABEL * 29A * 29A Virus Coding Group * 419 Scam * AbdAllah * Abdallah Internet Hizmetleri * Able Danger * Abuse Department * Active Security Monitor * Advance Fee Scam * Advanced Persistent Threat * Advertising * Adware * Affiliate Network * Ahmad Al Agha * Al Qaeda * Aleksandr Zhukov * Allied Group Inc * Amazon AWS * ANA Spoofer Project * Android * Anonymity * Anonymizer * Anonymous * Anonymous Hacking Collective * Anti-Phishing Group * Antivirus * Antivirus Signatures * Anton Nikolaevich Korotchenko * AOL * API * Apple * APT * Aqua ZeuS Gang * Armadillo Phone * Ashiyane Digital Security Team * ASProx * Astalavista * Astalavista Security Group * Astalavista.box.sk * ATM Skimmer * ATS * Australia * Authentication * Avalance Botnet * Avast * Background Check * BadB * Bahama Botnet * BakaSoftware * Bantu * BBC * Bebo * Bed Time Reading * Behrooz Kamalian * Best Practices * BGP * Big Brother * Bill Gates Botnet * Biography * Biometrics * Bitcoin * Bjorn Andreasson * Black Energy * Blackhat SEO * Blood and Honor * Blood and Honor Bulgaria * Boeing * Bogus Account * bother * Botners * Botnet * Botnets * Box.sk * Brian Krebs * Brute-Forcing * Bulgaria * Bulgaria Law Enforcement * Bulgarian Cyber Army * Bulgarian Cyber Army Hacking Group * Bullet Proof Hosting * Bust * C4I * CALEA * Caller ID * Caller ID Spoofer * Candid Wuest * CAPTCHA * Career Enrichment * Cash Transfers * CCTV * CDT * Cell Phone Monitoring * Cell Phone Surveillance * CellDEK * Censorship * Center for Democracy and Technology * CERT * Cheyenne Mountain Operations Center * Child Pornography * China * China Eagle Union * CIA * CipherTrust * Classified Information * Client-Side Exploits * Client-Side Vulnerabilities * CNO * COCOM * Cold War * COMINT * Competitive Intelligence * Compliance * Computer Crime Survey * Computer Network Operation * Conficker * Confidential Connections * Conspiracy * Conspiracy Theory * Conti * Conti Ransomware * Conti Gang * Conti Ransomware * Conti Ransomware Gang * Cookies * CoolWebSearch * Corporate Risk Management * Counter Espionage * Counter Intelligence * Credit Cards * Crimeware * Critical Infrastructure * Crusade Affiliates * Crypters * Cryptography * Cryptome * Cryptoviral Extortion * CSIA * CVE * Cyber Attack * Cyber Espionage * Cyber Insurance * Cyber Jihad * Cyber Militia * Cyber Security Industry Alliance * Cyber Security Investment * Cyber Terrorism * Cyber Threat Actor Attribution Maltego Graphs * Cyber Warfare * Cyber Weapon * Cyber Weapons * CyberCamp 2016 * Cybercrime * Cybercrime Ecosystem * Cybercrime Forum * Cybercrime Forum Data Set * Cybercrime Incident Response * Cybercrime Incident Response Maltego Graphs * Cybercrime Search Engine * Cybercriminal * Cyberpunk * Cyberspace * Cybertronics * Daniel Brandt * Dark Vader * Dark Forum * Dark Web * Dark Web Onion * Dark Web Search Engine * DarkComet RAT * Darkode * Darkode Forum Community * Data Acquisition * Data Breach * Data Center * Data Leak * Data Mining * David Endler * DCLeaks * DDoS * DDoS For Hire * Defense Complex * Delicious Information Warfare * Denmark * Department of Defense * DHS * DIA * Digital Armaments * Digital Forensics * Digital Rights * Dilbert * Disinformation * Distributed Computing * Distributed Computing Project * Distributed Project * DNS * DNS Changer * DoD * DoJ * DotCom * DreamHost * Dropbox * Durzhavna Sigurnost * DVD of the Weekend * E-Banking * E-Business * E-Commerce * E-Shop * Eavesdropping * Ebay * ECHELON * ECOFIN Projects * Economics * eID * Electric Universe * Electromagnetic Pulse Weapons * Electronic Banking * ELINT * Emotet * Emotet Botnet * EMP * Encrochat * Encrochat Database Leak * Encrypted Communication * Encrypted Phone * Encryption * Enigma * ENISA * Enki Bilal * Enron * Erasmus Bridge * Eric Goldman * Espionage * Espionage Movie * Evgeniy Mikhaylovich Bogachev * Exmanoize * Exploit Broker * Exploit Kit * Exploits * Eyeball Series * F-Secure * Facebook * Fake Account * Fake Adobe Flash Player * Fake Certificate * Fake Chrome Extension * Fake Chrome Update * Fake Code Signing Certificate * Fake Confirmed Facebook Friend Request Email * Fake Documents * Fake Facebook Appeal * Fake Facebook Notification * Fake Facebook Profile Spy Application * Fake Firefox Update * Fake Hosting Provider * Fake ID * Fake Internet Explorer Update * Fake Passport * Fake Personal ID * Fake Safari Update * Fake Security Software * Fake Tech Support Scam * Fake Utility Bill * Fake Video Codec * Fake Visa * Fake Visa Application * Fake Web Site * Fake Who's Viewed Your Facebook Profile Extension * Fake YouTube Player * Fast-Flux * FBI * FBI Most Wanted * FCC * FDIC * Financial Management * Firas Nur Al Din Dardar * FireEye * Flashpoint Intel * Foreign Influence Operations * Forensics * Forwarderz * FoxNews * Fraud * Free Speech * FSB * FTLog * FTLog Worm * Gartner * Gavril Danilkin * GazTranzitStroyInfo * GCHQ * GDBOP * Generation I * George Bush * Georgi Markov * Georgia * Germany * Gift Cards * GiveMeDB * Global Security Challenge * Goa Trance * GoDaddy * Google * Google Firebase * Google Ads * Google Docs * Google Earth * Google Groups * Google Hacking * Google Maps * Google Play * Google Store * Greece * Growth Hacker * GRU * Guccifer 2.0 * GUI * Gumblar * Hacked Database * Hacked Web Site * Hacker * Hackers * Hacking * Hacking Book * Hacking Forum * Hacking Group * Hacking Groups * Hacking Tools * HackPhreak * HackPhreak Hacking Group * Hacktivism * Haiti * Hamas * Hezbollah * High Tech Brazil Hack Team * Hilary Kneber * HKLeaks * Home Molestation * Homebrew * Honeynet Project * Honker Union of China * HUMINT * ICBM * ID Theft * iDefense * Identity Theft * Illegal Arrest * Illegal Hosting * Illegal Restraint * IMINT * IMLogic * India * India Company * Indicator of Compromise * Information Operations * Information Security * Information Security Forum * Information Security Market * Information Warfare * Infrastructure Security * InFraud * InFraud Cybercrime Gang * InFraud Cybercrime Syndicate * InFraud Organization * Innovative Marketing * InqTana Mac OS X Malware * Insider * Insider Monitoring * Insider Threat * Instant Messaging * Intellectual Property * Intelligence * Intelligence Agency * Intelligence Community * Internal Revenue Service * International Exploit Shop * Internet * Internet Censorship * Internet Economy * Internet Relay Chat * Investment Banking * IoC * IP Cloaking * IP Hiding * IP Spoofing * iPowerWeb * IPSec * IPv4 * IPv6 * Iran * Iran Election * Iran Election 2009 * Iran Hacker Groups * Iran Hacking Groups * Iran Mabna Hackers * IRC * IRS * ISIS * Israel * Jabber * JabberZeuS * Javor Kolev * Jeffrey Carr * Joanna Rutkowska * Johannes Ullrich * John Young * K Rudolph * Kaseya * Kaseya Ransomware Attack * Katrina * Keylogger * KGB * Kidnapping * Koobface * Koobface Botnet * Korean Demilitarized Zone * KrotReal * Latest News Articles * Latvia * Law Enforcement * Lawful Interception * Leaks * Lenovo * Liberty Front Press Network * Lizamoon * Loads.cc * Localization * Location Tracking * Lockheed Martin * Logicube * Lone Gunmen * Lovely Horse * Lubyanka Square Headquarters * M4 Project * Mac OS X * Malicious Domain * Malicious Software * Maltego * Maltego Graphs * Malvertising * Malware * Malware Information Sharing Platform * Marketing * Mass Web Site Defacement * Mastercard * McAfee * MD5 * Media Methane * Memoir * Metrics * Microsoft * Microsoft Live * Military Communications * Ministry of Interior * MISP * Missile Base * Mobile * Mobile Application * Mobile Communication Censorship * Mobile Internet * Mobile Location Tracking * Mobile Malware * Mobile Security * Mohammad Sagegh Ahmadzadegan * Money Laundering * Money Mule * Money Mule Recruitment * Monoculture * Morgan Stanley * Moses Staff * Most Wanted Cybercriminals * MSN * MSRC * MSRC Researcher Recognition Program * Muhammad Cartoons * MVR * MyWebFace * NASA * National Cyber Security Centre * National Security * Native Intelligence * NBC * NCSC * NetAssist LLC * NetCraft * Network Centric Warfare * Network Solutions * New Media * Nikolay Nedyalkov * Nikopol Trilogy * Nintendo * Nintendo DS * NordVPN * Norman Sandbox * North Korea * North Korea Missile Launch Pad * NSA * NSO Group * NSO Group Spyware * Nuclear Weapons * Nyxem * OEM * Offensive Cyber Warfare * OMEMO * Omerta * One-Time Password * One-Time Passwords In Everything * OneCare * Online Advertising * Online Fraud * Online Marketing * Online Propaganda Campaign * Online Scam * Open Source Malware * Operation EQUALIZER * Operation Uncle George * OPIE * OPSEC * Osama Bin Laden * OSINT * OSINT Training * OTC * OTP * Over-The-Counter * Packers * Parked Domains * Passwords * Pavlin Georgiev * Pay Per Install * PayPal * Perplex City * Persistent Cookies * Personal Career * Personal Data * Pharmaceutical Scams * Phileas Crawler * Phishing * Phishing Campaign * Phishing Domain Farm * Phishing Toolbar * PhishTube * Phreedom * Physical Security * Pinterest * Piracy * PlushForums * Podcast * Point of Sale Terrminal * Politics * PornTube * POS * Potentially Unwanted Application * PR * Press Coverage * Privacy * Project RAHAB * Prolexic * Protonmail * Proxy Service * Psychedelic Trance * PSYOPS * Psytrance * Psytrance Song of the Day * Qassam Cyber Fighters * Radicati Group * Ransomware * RAT * Ray Kurzweil * RBN * Reconnaissance Satellite * Red Joan * Regulation * Remote Access Tool * Reporters Without Borders * Return On Investment * Return On Security Investment * REvil Ransomware Group * Revolution in Militvry Affairs * RIPA * Risk Management * Rogue Account * Rogue Chrome Extension * Rogue Facebook Appeal * Rogue Security Software * Rogue Video Codec * Rogue YouTube Player * Rogueware * ROI * Roman Polesek * Root Server * Rootkit * ROSI * RSA * RSA Conference * Russia * Russia Small Group * Russian * Russian Bomber * Russian Business Network * Russian Cyber War * Russian Submarine * Safe Harbor * Satellite Imagery * Satellite Jamming * Satellite SIGINT * Scam * Scams * Scandoo * ScanSafe * Scareware * Scientific Intelligence * Scribd * Search Engine * Search Engine Optimization * SEC * SecondEye Solutions * Secret Service * Secure Communication * SecureDrop * Securities and Exchange Commission * Security * Security Awareness * Security Book * Security Breach * Security Conference * Security Education * Security Event * Security Forum * Security Game * Security Industry * Security Interviews * Security Investment * Security Metrics * Security Podcast * Security Project * Security Research * Security Statistics * Security Training * Security Trends * Sensitive Information * SEO * Shadow Server * ShadowCrew * SIGINT * Silent Circle * Sipco Systems * SIPRNET * SITE Institute * SiteAdvisor * Skype * Sniffing * Social Engineering * Social Network Analysis * SocialMediaSystem * Software Piracy * Solarwinds * Song of the Day * Sophos * Soviet Union * Space Warfare * Space Weapons * Spam * Spam Campaign * Spam Operations * Spear Phishing * Spoofing * Sprott Asset Management * Spyware * SQL Injection * SSL * SSN * Stalkware * Starlight * Stealth Ideas Inc * Steganography * STIX * STIX2 * Stolen Credit Card * Stolen Credit Cards * Stolen Gift Cards * Strider Crawler * Sub7 * Suri Pluma * Surveillance * Swine Flu * Symantec * Symbian * Syria * Syrian Electronic Army * Syrian Embassy * Taia Global * TAN * TAXII * TDoS * Team Code Zero * Team Code Zero Hacking Group * Tech Support Scam * Technical Collection * Technical Mujahid * Telephony Denial of Service Attack * Terrorism * THAAD * The Bunker * The Immortals * The Lawnmower Man * The Outer Limits * Thought Leadership * Thousand Talents Program * Threat Intelligence * Threat Intelligence Feed * Threat Intelligence Report * TIA * Tipping Point * Top Secret Program * Tor * Tor Project * Torrent * TorrentReactor * Total Information Awareness * Travel Without Moving * TrendMicro * Trickbot * Trickbot Gang * Trickbot Malware * Trickbot Malware Gang * Trifinite Group * Trojan Horse * TROYAK-AS * Tutanota * Twitter * Two Factor Authentication * Two-Factor Authentication * Typosquatting * U.K National Cyber Security Centre * U.S Bureau of Engraving and Printing * U.S Cyber Command * U.S Driving License * U.S Elections * U.S Sanctions * U.S Secret Service * Ukraine * Ukraine Cyber War * Underground Search Engine * United Kingdom * University ID Card * Vasil Moev Gachevski * Vault 7 * VeriSign * Vertex Net Loader * Virtual Private Network * Virtual Reality * Virtual Reality Social Network * Virtual World * Virus * Virus for You * Virus Map * Virus Recovery Button * Viruses * VirusTotal * Visa * Visual Information System * Visualization * Void Balaur Malware Gang * VoIP * VPN * Vulnerabilities * Vulnerability Broker * War Driving * War Games * Weapon Systems * Web 2.0 * Web Application Worm * Web Crawler * Web Inject * Web Proxy Service * Web Shells * Web Site Defacement * Web Site Defacement Groups * Webroot * WHGDG * WhoisXML API * WhoisXML API Jabber ZeuS Gang * Wireless * Wireless Hacking * Wireless Internet * Wiretapping * WMF Vulnerability * World Hacker Global Domination Group * X-Files * X-Tunnel * XMPP * XSS * Yahoo * Yaroslav Vasinskyi * Yavor Kolev * YouTube * ZDNet * ZDNet Zero Day Blog * Zero Day Exploit * Zero Day Initiative * Zerodium * ZeuS * Zombie Alert * Zone-H * Zotob GIRL POWER! THE LAB - CIRCA 2006 DANCHO DANCHEV'S FAN CLUB! FORBES BULGARIA LOVELY HORSE DANCHO DANCHEV'S FAN CLUB! BLOG STATISTICS KOOBFACE BOTNET! E-BOOK COMPILATION ZDNET ARTICLES WEBROOT RESEARCH MEDIUM RESEARCH UNIT-123 RESEARCH IRAN RESEARCH REPORT IRAN RESEARCH REPORT CYBER INTELLIGENCE MEMOIR MOBILE APPLICATION TAGS 29A 29A Virus Coding Group 419 Scam AbdAllah Abdallah Internet Hizmetleri Able Danger Abuse Department Active Security Monitor Advance Fee Scam Advanced Persistent Threat Advertising Adware Affiliate Network Ahmad Al Agha Al Qaeda Aleksandr Zhukov Allied Group Inc Amazon AWS ANA Spoofer Project Android Anonymity Anonymizer Anonymous Anonymous Hacking Collective Anti-Phishing Group Antivirus Antivirus Signatures Anton Nikolaevich Korotchenko AOL API Apple APT Aqua ZeuS Gang Armadillo Phone Ashiyane Digital Security Team ASProx Astalavista Astalavista Security Group Astalavista.box.sk ATM Skimmer ATS Australia Authentication Avalance Botnet Avast Background Check BadB Bahama Botnet BakaSoftware Bantu BBC Bebo Bed Time Reading Behrooz Kamalian Best Practices BGP Big Brother Bill Gates Botnet Biography Biometrics Bitcoin Bjorn Andreasson Black Energy Blackhat SEO Blood and Honor Blood and Honor Bulgaria Boeing Bogus Account bother Botners Botnet Botnets Box.sk Brian Krebs Brute-Forcing Bulgaria Bulgaria Law Enforcement Bulgarian Cyber Army Bulgarian Cyber Army Hacking Group Bullet Proof Hosting Bust C4I CALEA Caller ID Caller ID Spoofer Candid Wuest CAPTCHA Career Enrichment Cash Transfers CCTV CDT Cell Phone Monitoring Cell Phone Surveillance CellDEK Censorship Center for Democracy and Technology CERT Cheyenne Mountain Operations Center Child Pornography China China Eagle Union CIA CipherTrust Classified Information Client-Side Exploits Client-Side Vulnerabilities CNO COCOM Cold War COMINT Competitive Intelligence Compliance Computer Crime Survey Computer Network Operation Conficker Confidential Connections Conspiracy Conspiracy Theory Conti Conti Ransomware Conti Gang Conti Ransomware Conti Ransomware Gang Cookies CoolWebSearch Corporate Risk Management Counter Espionage Counter Intelligence Credit Cards Crimeware Critical Infrastructure Crusade Affiliates Crypters Cryptography Cryptome Cryptoviral Extortion CSIA CVE Cyber Attack Cyber Espionage Cyber Insurance Cyber Jihad Cyber Militia Cyber Security Industry Alliance Cyber Security Investment Cyber Terrorism Cyber Threat Actor Attribution Maltego Graphs Cyber Warfare Cyber Weapon Cyber Weapons CyberCamp 2016 Cybercrime Cybercrime Ecosystem Cybercrime Forum Cybercrime Forum Data Set Cybercrime Incident Response Cybercrime Incident Response Maltego Graphs Cybercrime Search Engine Cybercriminal Cyberpunk Cyberspace Cybertronics Daniel Brandt Dark Vader Dark Forum Dark Web Dark Web Onion Dark Web Search Engine DarkComet RAT Darkode Darkode Forum Community Data Acquisition Data Breach Data Center Data Leak Data Mining David Endler DCLeaks DDoS DDoS For Hire Defense Complex Delicious Information Warfare Denmark Department of Defense DHS DIA Digital Armaments Digital Forensics Digital Rights Dilbert Disinformation Distributed Computing Distributed Computing Project Distributed Project DNS DNS Changer DoD DoJ DotCom DreamHost Dropbox Durzhavna Sigurnost DVD of the Weekend E-Banking E-Business E-Commerce E-Shop Eavesdropping Ebay ECHELON ECOFIN Projects Economics eID Electric Universe Electromagnetic Pulse Weapons Electronic Banking ELINT Emotet Emotet Botnet EMP Encrochat Encrochat Database Leak Encrypted Communication Encrypted Phone Encryption Enigma ENISA Enki Bilal Enron Erasmus Bridge Eric Goldman Espionage Espionage Movie Evgeniy Mikhaylovich Bogachev Exmanoize Exploit Broker Exploit Kit Exploits Eyeball Series F-Secure Facebook Fake Account Fake Adobe Flash Player Fake Certificate Fake Chrome Extension Fake Chrome Update Fake Code Signing Certificate Fake Confirmed Facebook Friend Request Email Fake Documents Fake Facebook Appeal Fake Facebook Notification Fake Facebook Profile Spy Application Fake Firefox Update Fake Hosting Provider Fake ID Fake Internet Explorer Update Fake Passport Fake Personal ID Fake Safari Update Fake Security Software Fake Tech Support Scam Fake Utility Bill Fake Video Codec Fake Visa Fake Visa Application Fake Web Site Fake Who's Viewed Your Facebook Profile Extension Fake YouTube Player Fast-Flux FBI FBI Most Wanted FCC FDIC Financial Management Firas Nur Al Din Dardar FireEye Flashpoint Intel Foreign Influence Operations Forensics Forwarderz FoxNews Fraud Free Speech FSB FTLog FTLog Worm Gartner Gavril Danilkin GazTranzitStroyInfo GCHQ GDBOP Generation I George Bush Georgi Markov Georgia Germany Gift Cards GiveMeDB Global Security Challenge Goa Trance GoDaddy Google Google Firebase Google Ads Google Docs Google Earth Google Groups Google Hacking Google Maps Google Play Google Store Greece Growth Hacker GRU Guccifer 2.0 GUI Gumblar Hacked Database Hacked Web Site Hacker Hackers Hacking Hacking Book Hacking Forum Hacking Group Hacking Groups Hacking Tools HackPhreak HackPhreak Hacking Group Hacktivism Haiti Hamas Hezbollah High Tech Brazil Hack Team Hilary Kneber HKLeaks Home Molestation Homebrew Honeynet Project Honker Union of China HUMINT ICBM ID Theft iDefense Identity Theft Illegal Arrest Illegal Hosting Illegal Restraint IMINT IMLogic India India Company Indicator of Compromise Information Operations Information Security Information Security Forum Information Security Market Information Warfare Infrastructure Security InFraud InFraud Cybercrime Gang InFraud Cybercrime Syndicate InFraud Organization Innovative Marketing InqTana Mac OS X Malware Insider Insider Monitoring Insider Threat Instant Messaging Intellectual Property Intelligence Intelligence Agency Intelligence Community Internal Revenue Service International Exploit Shop Internet Internet Censorship Internet Economy Internet Relay Chat Investment Banking IoC IP Cloaking IP Hiding IP Spoofing iPowerWeb IPSec IPv4 IPv6 Iran Iran Election Iran Election 2009 Iran Hacker Groups Iran Hacking Groups Iran Mabna Hackers IRC IRS ISIS Israel Jabber JabberZeuS Javor Kolev Jeffrey Carr Joanna Rutkowska Johannes Ullrich John Young K Rudolph Kaseya Kaseya Ransomware Attack Katrina Keylogger KGB Kidnapping Koobface Koobface Botnet Korean Demilitarized Zone KrotReal Latest News Articles Latvia Law Enforcement Lawful Interception Leaks Lenovo Liberty Front Press Network Lizamoon Loads.cc Localization Location Tracking Lockheed Martin Logicube Lone Gunmen Lovely Horse Lubyanka Square Headquarters M4 Project Mac OS X Malicious Domain Malicious Software Maltego Maltego Graphs Malvertising Malware Malware Information Sharing Platform Marketing Mass Web Site Defacement Mastercard McAfee MD5 Media Methane Memoir Metrics Microsoft Microsoft Live Military Communications Ministry of Interior MISP Missile Base Mobile Mobile Application Mobile Communication Censorship Mobile Internet Mobile Location Tracking Mobile Malware Mobile Security Mohammad Sagegh Ahmadzadegan Money Laundering Money Mule Money Mule Recruitment Monoculture Morgan Stanley Moses Staff Most Wanted Cybercriminals MSN MSRC MSRC Researcher Recognition Program Muhammad Cartoons MVR MyWebFace NASA National Cyber Security Centre National Security Native Intelligence NBC NCSC NetAssist LLC NetCraft Network Centric Warfare Network Solutions New Media Nikolay Nedyalkov Nikopol Trilogy Nintendo Nintendo DS NordVPN Norman Sandbox North Korea North Korea Missile Launch Pad NSA NSO Group NSO Group Spyware Nuclear Weapons Nyxem OEM Offensive Cyber Warfare OMEMO Omerta One-Time Password One-Time Passwords In Everything OneCare Online Advertising Online Fraud Online Marketing Online Propaganda Campaign Online Scam Open Source Malware Operation EQUALIZER Operation Uncle George OPIE OPSEC Osama Bin Laden OSINT OSINT Training OTC OTP Over-The-Counter Packers Parked Domains Passwords Pavlin Georgiev Pay Per Install PayPal Perplex City Persistent Cookies Personal Career Personal Data Pharmaceutical Scams Phileas Crawler Phishing Phishing Campaign Phishing Domain Farm Phishing Toolbar PhishTube Phreedom Physical Security Pinterest Piracy PlushForums Podcast Point of Sale Terrminal Politics PornTube POS Potentially Unwanted Application PR Press Coverage Privacy Project RAHAB Prolexic Protonmail Proxy Service Psychedelic Trance PSYOPS Psytrance Psytrance Song of the Day Qassam Cyber Fighters Radicati Group Ransomware RAT Ray Kurzweil RBN Reconnaissance Satellite Red Joan Regulation Remote Access Tool Reporters Without Borders Return On Investment Return On Security Investment REvil Ransomware Group Revolution in Militvry Affairs RIPA Risk Management Rogue Account Rogue Chrome Extension Rogue Facebook Appeal Rogue Security Software Rogue Video Codec Rogue YouTube Player Rogueware ROI Roman Polesek Root Server Rootkit ROSI RSA RSA Conference Russia Russia Small Group Russian Russian Bomber Russian Business Network Russian Cyber War Russian Submarine Safe Harbor Satellite Imagery Satellite Jamming Satellite SIGINT Scam Scams Scandoo ScanSafe Scareware Scientific Intelligence Scribd Search Engine Search Engine Optimization SEC SecondEye Solutions Secret Service Secure Communication SecureDrop Securities and Exchange Commission Security Security Awareness Security Book Security Breach Security Conference Security Education Security Event Security Forum Security Game Security Industry Security Interviews Security Investment Security Metrics Security Podcast Security Project Security Research Security Statistics Security Training Security Trends Sensitive Information SEO Shadow Server ShadowCrew SIGINT Silent Circle Sipco Systems SIPRNET SITE Institute SiteAdvisor Skype Sniffing Social Engineering Social Network Analysis SocialMediaSystem Software Piracy Solarwinds Song of the Day Sophos Soviet Union Space Warfare Space Weapons Spam Spam Campaign Spam Operations Spear Phishing Spoofing Sprott Asset Management Spyware SQL Injection SSL SSN Stalkware Starlight Stealth Ideas Inc Steganography STIX STIX2 Stolen Credit Card Stolen Credit Cards Stolen Gift Cards Strider Crawler Sub7 Suri Pluma Surveillance Swine Flu Symantec Symbian Syria Syrian Electronic Army Syrian Embassy Taia Global TAN TAXII TDoS Team Code Zero Team Code Zero Hacking Group Tech Support Scam Technical Collection Technical Mujahid Telephony Denial of Service Attack Terrorism THAAD The Bunker The Immortals The Lawnmower Man The Outer Limits Thought Leadership Thousand Talents Program Threat Intelligence Threat Intelligence Feed Threat Intelligence Report TIA Tipping Point Top Secret Program Tor Tor Project Torrent TorrentReactor Total Information Awareness Travel Without Moving TrendMicro Trickbot Trickbot Gang Trickbot Malware Trickbot Malware Gang Trifinite Group Trojan Horse TROYAK-AS Tutanota Twitter Two Factor Authentication Two-Factor Authentication Typosquatting U.K National Cyber Security Centre U.S Bureau of Engraving and Printing U.S Cyber Command U.S Driving License U.S Elections U.S Sanctions U.S Secret Service Ukraine Ukraine Cyber War Underground Search Engine United Kingdom University ID Card Vasil Moev Gachevski Vault 7 VeriSign Vertex Net Loader Virtual Private Network Virtual Reality Virtual Reality Social Network Virtual World Virus Virus for You Virus Map Virus Recovery Button Viruses VirusTotal Visa Visual Information System Visualization Void Balaur Malware Gang VoIP VPN Vulnerabilities Vulnerability Broker War Driving War Games Weapon Systems Web 2.0 Web Application Worm Web Crawler Web Inject Web Proxy Service Web Shells Web Site Defacement Web Site Defacement Groups Webroot WHGDG WhoisXML API WhoisXML API Jabber ZeuS Gang Wireless Wireless Hacking Wireless Internet Wiretapping WMF Vulnerability World Hacker Global Domination Group X-Files X-Tunnel XMPP XSS Yahoo Yaroslav Vasinskyi Yavor Kolev YouTube ZDNet ZDNet Zero Day Blog Zero Day Exploit Zero Day Initiative Zerodium ZeuS Zombie Alert Zone-H Zotob SAMPLE TEXT Dancho Danchev is an expert in the field of cybercrime fighting and threat intelligence gathering having actively pioneered his own methodology for processing threat intelligence leading to a successful set ofhundreds of high-quality analysis and research articles published at the industry's leading threat intelligence blog- ZDNet's Zero Day, Dancho Danchev's Mind Streams of Information Security Knowledge and Webroot's ThreatBlog with his research featured in Techmeme, ZDNet, CNN, PCWorld, SCMagazine, The Register, NYTimes,CNET, ComputerWorld, H+Magazine currently producing threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge which has received over 5.6M page views since December, 2005 and is currently considered one of the security industry's most popularsecurity publications. Key achievements include: - Presented at the GCHQ with the Honeynet Project - SCMagazine Who to Follow on Twitter for 2011 - Participated in a Top Secret GCHQ Program called "Lovely Horse" - Identified a major victim of the SolarWinds Attack - PaloAltoNetworks - Found malware on the Web Site of Flashpoint - Tracked monitored and profiled the Koobface Botnet and exposed one botnet operator - Made it to Slashdot two times - My Personal Blog got 5.6M Page Views Since December, 2005 - My old Twitter Account got 11,000 followers - I had an average of 7,000 RSS readers on my blog - I have my own vinyl "Blue Sabbath Black Cheer / Griefer – We Hate You Dancho Danchev" made by a Canadian artist - Currently running Astalavista.box.sk - I gave an interview to DW on the Koobface Botnet - I gave an interview to NYTimes on the Koobface botnet - I gave an interview to Russian OSINT - Listed as a major competitor by Jeffrey Carr's Taia Global - Presented at the GCHQ - Presented at Interpol - Presented at InfoSec - Presented at CyberCamp - Presented at RSA Europe Public Domain Work. All rights Reserved. Dancho Danchev - Email: dancho.danchev@hush.com. Powered by Blogger. Diese Website verwendet Cookies von Google, um Dienste anzubieten und Zugriffe zu analysieren. Deine IP-Adresse und dein User-Agent werden zusammen mit Messwerten zur Leistung und Sicherheit für Google freigegeben. So können Nutzungsstatistiken generiert, Missbrauchsfälle erkannt und behoben und die Qualität des Dienstes gewährleistet werden.Weitere InformationenOk