SecurityCentric is your source for Blog Aggregation in the Security industry

Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

View This Blog Frequency: 0.4 posts / day

 

U.S Army Launches the Cyber Military Intelligence Group (CMIG)

 Mark As Read    

The U.S Army has recently announcedthe development and public launch of theCyber Military Intelligence Group (CMIG) which aims to use both proprietary sources including public sources on its way to build situational awareness in the world of cyber warfare and malicious and fraudulent adversaries.An excerpt:"The CMIGs function is to direct, synchron...

Israel Blocks Ukraine From Purchasing Pegasus Spyware

 Mark As Read    

According to the GuardianIsrael blocked Ukraine from purchasing the Pegasus spyware from the infamous NSO Group vendor of lawful surveillance hacking tools.Not surprisingly this is a bit over-exaggerated and self-serving statement that actually does more PR harm other than good despite the fact that the article is mentioning Israel's "2007 Defense ...

Assessing the U.S Intelligence Community's Annual Threat Report for 2022

 Mark As Read    

In the most recently released "U.S Intelligence Community's Annual Threat Report for 2022" the U.S Intelligence Community states that China remains the U.S's most sophisticated and relevant cyber adversary which possesses the necessary sophistication to target the country both using cyber espionage and attacks against U.S critical infrastructure.An...

Exposing the Trickbot Malware Gang - An OSINT Analysis

 Mark As Read    

Based on a yet another recently leaked batch of internal Trickbot malware gang's communication channels I've decided to come up with a proper OSINT analysis on the topic and actually enrich and actually enrich the original information data set including to elaborate more and provide actionable intelligence on the online whereabouts of the Trickbot ...

Exposing the Conti Ransomware Gang - An OSINT Analysis

 Mark As Read    

Awesome!Based on the recently leaked internal communication of the infamous Russia based Conti ransomware gang in this post I'll provide actionable intelligence on the Conti ransomware gang in-depth and discuss and offer practical actionable intelligence on their Internet connected infrastructure in terms of providing Dark Web onion Web sites perso...

Special 50% Discount for My 100GB "Cybercrime Forum Data Set for 2022" Today! Grab a Copy Today!

 Mark As Read    

Dear blog readers,Who wants to obtain direct download access to my 100GB "Cybercrime Forum Data Set for 2022" with a 50% discount which I'm offering only today for research data mining and enrichment purposes?Drop me a line at dancho.danchev@hush.comSample photos of the actual content:Stay tuned!

Courtesy of Republic of Bulgaria!

 Mark As Read    

This is me! And this is me! On the run. Awesome!Cool!Awesome!More cool stuff!Even more cool stuff!Including this!Including this!This is cool!Even more cool!- check out theIllegal Restraint section! Awesome!Quote:"The Mentally Ill or Disabled"With few exceptions, material conditions in psychiatric hospitals and social careinstitutions for children a...

Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses - Part Four

 Mark As Read    

Dear blog readers,Continuing the "Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses - Part Three" blog posts series I've decided to share yet another currently active portfolio of ransomware themed email address accounts currently involved in a variety of campaigns.Sample ransomware-th...

The Cyber War Between Russia and Ukraine - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to take a deeper look inside the currently ongoing cyber war between Russia and Ukraine and I've decided to provide actionable intelligence on the online whereabouts and actual campaign infrastructure behind the currently ongoing campaigns which appear to be several crowd-sourced campaigns which I profiled including v...

Dancho Danchev's Sample Personal Conference and Event Photos - A Compilation

 Mark As Read    

Dear blog readers,I've decided to share with everyone a set of personal conference and event photos.Enjoy!

How To Integrate or Query My Public STIX STIX2 TAXII Threat Actor Specific Threat Intelligence Feed In Your Firewall or Security Solution - An Analysis

 Mark As Read    

Dear blog readers,Did you already pull my public and free STIX STIX2 TAXII threat intelligence feed using your and your organization's Lifetime API Key?In this post I've decided to elaborate more and offer practical advice and links in terms of how you can pull and integrate my daily updated STIX STIX2 TAXII threat intelligence feed in your firewal...

Public STIX STIX2 TAXII Threat Actor Specific Threat Intelligence Feed - Your Lifetime API Key!

 Mark As Read    

Hi, everyone,This is Dancho. Big news! I've decided to make approximately 15 years of active and unique threat actor specific research publicly accessible online for free using the OpenCTI STIX STIX2 TAXII platform and not only convert all the cool and juicy and full of never-published and discussed before niche threat actors both internationally a...

Who Needs A Niche Threat Actor Specific IoC (Indicator of Compromise) STIX/STIX2/TAXII Feed?

 Mark As Read    

Dear blog readers,Who needs access to my STIX/STIX2/TAXII Threat Actor Specific IoC (Indicator of Compromise) feed? Drop me a line today at dancho.danchev@hush.comStay tuned!

Dancho Danchev's Second Edition of "Cybercrime Forum Data Set for 2022" Available - 113GB Direct Torrent Download Available! Grab a Free Copy Today!

 Mark As Read    

Here we go.https://academictorrents.com/details/131080b57d568ca3d05794cde5a3d7 774f890373 - Dancho Danchev's Research Compilation 2005-2022 - Direct Torrent Download Available!https://academictorrents.com/details/e1b755efb9cb7ec5d5bcea4 e60911e2a70a86201 - Dancho Danchev's Cybercrime Forum Data Set for 2022 - Second Edition - Direct Torrent Download ...

Who is Dancho Danchev?

 Mark As Read    

Folks,Do you remember who I am? Do you need to do a historical check on the security industry including me as an individual including my personal blog and all the socially-oriented work and contributors that I've made to the industry during the past ten years? If an image is worth a thousand words consider going through these images which I just fo...

Exposing the "InFraud Organization" - An OSINT Analysis - Maltego Technical Details Video Demonstration

 Mark As Read    

Amazing!Feel like it's 2007 -- check out the slides here including the technical details here which I produced for https://whoisxmlapi.com here including the following Maltego technical details video demonstration video:Enjoy!

Exposing A Portfolio of Shadow Crew Cybercrime-Friendly Forum Communities IM Screen Names - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone a currently active portfolio of IM screen names from the infamous Shadow Crew cybercrime-friendly forum community part of a currently ongoing Technical Collection campaign for the purpose of assisting everyone in their cyber attack and cyber threat actor profiling campaigns.Sample Shadow Crew cy...

Exposing A Portfolio of Shadow Crew Cybercrime-Friendly Forum Communities ICQ UINs - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone a currently active portfolio of IM screen names from the infamous Shadow Crew cybercrime-friendly forum community part of a currently ongoing Technical Collection campaign for the purpose of assisting everyone in their cyber attack and cyber threat actor profiling campaigns.Sample Shadow Crew cy...

Exposing A Portfolio of Shadow Crew Cybercrime-Friendly Forum Communities Personal Email Address Accounts - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone a currently active portfolio of IM screen names from the infamous Shadow Crew cybercrime-friendly forum community part of a currently ongoing Technical Collection campaign for the purpose of assisting everyone in their cyber attack and cyber threat actor profiling campaigns.Sample Shadow Crew cy...

Exposing A Portfolio of Shadow Crew Cybercrime-Friendly Forum Communities IP Addresses - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone a currently active portfolio of IM screen names from the infamous Shadow Crew cybercrime-friendly forum community part of a currently ongoing Technical Collection campaign for the purpose of assisting everyone in their cyber attack and cyber threat actor profiling campaigns.Sample Shadow Crew cy...

The Evolution of Encrypted IM Messenging Platforms - The Rise and Future of the OMEMO Protocol - An Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone an article that I've been recently working on namely the rise of the OMEMO real-time Jabber/XMPP encryption protocol and also discuss in-depth the security risks involved in OMEMO type of communications including to offer practical security and privacy recommendation advice which I originally wr...

Exposing a Currently Active Portfolio of Rogue and Fake Tech Support Scam Domains Portfolio - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone a currently active portfolio of fake and rogue fake tech support scam domains with the idea to assist everyone in their cyber attack attribution efforts.Sample rogue fraudulent and malicious tech support scam domains include:0120-hfjkahgfu-238[.]cf1-800-my-apple[.]org1serversupport[.]co m2servers...

Profiling FBI's Most Wanted Iran-based Cybercriminals - Mohammad Sagegh Ahmadzadegan - An OSINT Analysis

 Mark As Read    

In this post I've decided to expose and offer personally identifiable information on Iran's based cybercriminal known as Mohammad Sagegh Ahmadzadegan for the purpose of assisting U.S Law Enforcement on its way to track down and prosecute the cybercriminals behind these campaigns.Sample personally identifiable information on Mohammad Sagegh Ahmadzad...

Profing FBI's Most Wanted Cybercriminal Mujtaba Raza from Forwarderz and SecondEye Solution - An OSINT Analysis

 Mark As Read    

In this post I've decided to offer in-depth and practical and relevant OSINT analysis of FBI's Most Wanted Cybercriminal Mujtaba Raza from the Forwarderz and SecondEye Solution fake documents and IDs selling Pakistan-based rogue fraudulent and malicious online enterprise with the idea to assist U.S Law Enforcement on its way to track down and prose...

A Peek Inside Today's Modern RATs (Remote Access Tools) and Trojan Horses C&C (Command and Control) Communication Channels - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone a currently active portfolio of RATs (Remote Access Tools) and trojan horses C&C (Command and Control) communication channels including actual currently active names of RATs (Remote Access Tools) and trojan horses wit the idea to assist everyone in their cyber attack and cyber attribution ca...

Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio Part Three An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone yet another batch of currently active rogue and malicious CoolWebSearch domains with the idea to assist everyone in their cyber attack attribution campaigns including cyber threat actor attribution campaigns[.]Sample currently active rogue and malicious CoolWebSearch domains portfolio:smartupdat...

Profiling a Currently Active Personal Email Address Portfolio of Members of Iran's Ashiyane Digital Security Team - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone a currently active personal email portfolio belonging to members of Iran's Ashiyane Digital Security Team with the idea to assist everyone in their cyber attack or cyber threat actor attribution campaigns.Sample currently active personal emails known to belong to members of Iran's Ashiyane Digi...

Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio - Part Two An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone yet another batch of currently active rogue and malicious CoolWebSearch domains with the idea to assist everyone in their cyber attack attribution campaigns including cyber threat actor attribution campaigns.Sample currently active rogue and malicious CoolWebSearch domains portfolio:smartupdater...

Exposing a Currently Active CoolWebSearch Domains Portfolio - An OSINT Analysis

 Mark As Read    

Dear blog readers, I've decided to share with everyone a currently active portfolio of rogue and malicious CoolWebSearch IPs with the idea to help everyone in their cyber attack attribution campaign including cyber threat actor attribution campaigns.Sample currently active rogue and malicious CoolWebSearch domains portfolio:008i[.]com008k[.]com00hq...

Profiling Yaroslav Vasinskyi from the Kaseya Ransomware Attack Campaign - An OSINT Analysis

 Mark As Read    

It appears that the U.S Justice Department has recently made arrests in the Kaseya ransomware dropping campaign and I've decided to dig a little bit deeper and actually offer and provide the necessary actionable intelligence in the context of exposing the individuals behind these campaigns in the context of assisting U.S Law Enforcement on its way ...

Exposing FBI's Most Wanted Iran's Mabna Hackers - An OSINT Analysis

 Mark As Read    

Dear blog readers,In this post I've decided to share actionable intelligence on the online infrastructure of FBI's Most Wanted Iran's Mabna Hackers for the purpose of assisting everyone in their cyber attack and cyber threat actor attribution campaigns.mlibo[.]mlblibo[.]gaazll[.]cfazlll[.]cflzll[.]cfjlll[.]cfell l[.]cflllib[.]cftsll[.]cfulll[.]tktll...

Exposing Behrooz Kamalian's Ashiyane ICT Company - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone some practical and actionable threat intelligence information regarding members of the Ashiyane Digital Security Team also known as Behrooz Kamalian's Ashiyane ICT Company for the purpose of assisting everyone in their cyber attack and cyber attack attribution campaigns.Name: Behrooz KamalianPos...

Profiling the Emotet Botnet C&C Infrastructure - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share a recently obtained Emotet botnet C&C server IPs for the purpose of empowering everyone with the necessary technical information on their way to track down and monitor the botnet including to possibly assist and help where necessary in terms of cyber attack campaign attribution including cyber threat acto...

Exposing a Currently Active "Jabber ZeuS" also known as "Aqua ZeuS" Gang Personal Email Portfolio - An OSINT Analysis

 Mark As Read    

Note: This OSINT analysis has been originally published at my current employer's Web site - https://whoisxmlapi.com where I'm currently acting as a DNS Threat Researcher since January, 2021.Dear blog readers,I've decided to share a recently obtained portfolio of personal emails belonging to the "Jabber ZeuS" also known as "Aqua ZeuS" gang members w...

Profiling the Liberty Front Press Network Online - An OSINT Analysis

 Mark As Read    

Note: This OSINT analysis has been originally published at my current employer's Web site - https://whoisxmlapi.com where I'm currently acting as a DNS Threat Researcher since January, 2021.Weve decided to take a closer look at the Internet-connected infrastructure of the Liberty Front Press Network part of a recent takedown and domain seizure part...

Profiling Russia's U.S Election Interference 2016 - An OSINT Analysis

 Mark As Read    

Note: This OSINT analysis has been originally published at my current employer's Web site - https://whoisxmlapi.com where I'm currently acting as a DNS Threat Researcher since January, 2021. Weve decided to take a closer look at the U.S Elecetion 2016 interference provoked by several spear phishing and malicious campaigns courtesy of Russia for the...

Exposing a Currently Active Domain Portfolio Managed and Operated by Members of the Ashiyane Digital Security Team - An OSINT Analysis

 Mark As Read    

Note: This OSINT analysis has been originally published at my current employer's Web site - https://whoisxmlapi.com where I'm currently acting as a DNS Threat Researcher since January, 2021.Weve decided to take a closer look at the current and historical domain portfolio managed and operated by members of Irans Ashiyane Digital Security Team using ...

Exposing a Currently Active Free Rogue VPN Domains Portfolio Courtesy of the NSA - An OSINT Analysis

 Mark As Read    

Note: This OSINT analysis has been originally published at my current employer's Web site - https://whoisxmlapi.com where I'm currently acting as a DNS Threat Researcher since January, 2021.Weve recently came across to a currently active free VPN domains portfolio which based on ourn research and publicly accessible sources appears to be run and op...

Exposing a Currently Active List of Iran-Based Hacker and Hacker Team's Handles - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone a currently active list of Iran-based hacker and hacker team's handles which could greatly assist in possible cyber attack attribution campaigns including cyber threat actor attribution campaigns.Sample currently active Iran-based hacker and hacker team's handles currently used in massive or tar...

Who Wants to Support My Work Commercially?

 Mark As Read    

Folks,Who wants to dive deep into some of my latest commercially available research and stay on the top of their OSINT/cybercrime research and threat intelligence gathering game that also includes their team and organization?Check out my latest project here where I'm currently doing my best to guarantee and deliver approximately 12 unique articles ...

Exposing a Portfolio of Pay Per Install Rogue and Fraudulent and Malicious Affiliate Network Domains - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone an in-depth historical OSINT analysis on some of the primary pay per install rogue fraudulent and malicious affiliate network based rogue and fraudulent revenue sharing scheme operating malicious software gangs that are known to have been active back in 2008 with the idea to assist everyone in t...

Exposing the Internet-Connected Infrastructure of the REvil Ransomware Gang - An In-Depth OSINT Analysis

 Mark As Read    

Dear blog readers,In this post I've decided to do an in-depth OSINT analysis on the recently busted REvil ransomware gang and decided to elaborate more and emphasize on the key fact in specific how come that a single ransomware group with several publicly accessible and easy to shut down C&C (command and control) server domains including severa...

Inquire About One-on-One or One-to-Many Virtual OSINT Training Today!

 Mark As Read    

Folks,Who's been following my work on this blog since December, 2005? Are you interested in OSINT training? One-on-one or one-to-many sessions? Drop me a line today at dancho.danchev@hush.com on behalf of you or your organization or team and let's help you take your team and organization to the next level.Sample portfolio of services which I'm curr...

My Participation in GCHQ's Top Secret "Lovely Horse" Program to Monitor Hackers Online - An Elaboration

 Mark As Read    

Dear blog readers,Did you know that you can actually find me in Snowden's archive by simply searching for my name where it will eventually lead you to a GCHQ Top Secret lawful surveillance program to monitor hackers online in specific their Twitter accounts?Check out the following Medium article where I do my best to elaborate on my participation i...

Profiling the Blood and Honor Online Hate Group - An OSINT Analysis

 Mark As Read    

As it's been a while since I've last posted a quality update I wanted to take the time and effort and elaborate more on a current project of mine which is the "International OSINT Journal Compilation on Online Terrorism Hate and Militarized Social Movements" which aims to expose and offer a massive information on currently active online terrorism h...

An Update on My Disappearance and Kidnapping Attempt Courtesy of Bulgarian Law Enforcement Officers from the City of Troyan Bulgaria Circa 2010 - An Analysis

 Mark As Read    

Folks,Check this out! An image is worth a thousand words.Related Facebook profile IDs known to have been involved in the case:https://www.facebook.com/profile.php?id=100005932519460 - Birthdate -1976 -July 12https://www.facebook.com/profile.php?id=100030506870037 - Birthdate -1964 -August 21Related posts:What You Get From "Peasant-aria Land" - A Ne...

Exposing the Pay Per Install (PPI) Underground Market Fraudulent and Rogue Business Model - A Photos Compilation

 Mark As Read    

Dear blog readers,I've decided to share with everyone a photos compilation which I obtained and actually collected back in 2008 using Technical Collection for the purtpose of demonstrating the basics of the pay per install fraudulent anda rogue underground market business model with the idea to improve's situational awareness in the field of resear...

Sample Portfolio of Dancho Danchev's Personal and Conference Event Photos - A Compilation

 Mark As Read    

Dear blog readers,I've decided to share with everyone a personal conference and event photos compilation with the idea to assist everyone and assist everyone in catching up in terms of what I've been up to in terms of conference and event presentations.Sample Dancho Danchev Personal Conference and Event Photos Compilation:Stay tuned!

Exposing the Internet-Connected Infrastructure of the Infamous "Innovative Marketing" Rogue Scareware Provider - An OSINT Analysis

 Mark As Read    

Dear blog readers,I've decided to share with everyone a currently active domain portfolio of rogue scareware domains including payment processing gateways courtesy of the infamous "Innovative Marketing" rogue scareware provider.Sample domain portfolio part of the Internet-connected infrastructure of "Innovative Marketing" currently includes:...

Security
Welcome!
SecurityCentric aggregates blogs for the Security industry.
Custom Feeds
Add any RSS feed to the information you read daily.
Blocked Feeds
Block feeds to remove blogs you’re not interested in.
Account Settings
Customize the site by adding or removing feeds.

About Us

SecurityCentric is your source for all your Security news.

Have a Suggestion for Us?
Know of a Security blog that we're missing? Let us know!

Share SecurityCentric.com