Social Media: How to keep yourself safe

Social Media: How to Keep Yourself Safe

Human beings are social animals. We like to stay connected with friends, family and even workmates via social media. It […] ...
What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

Open-source intelligence, or OSINT, refers to the process of gathering information from public, legal data sources to serve a specific function. Some open sources might include social media, blogs, news, and the ...
What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

Open-source intelligence, or OSINT, refers to the process of gathering information from public, legal data sources to serve a specific function. Some open sources might include social media, blogs, news, and the ...
My First Three Years in the Social Engineering World

My First Three Years in the Social Engineering World

As I enter my fourth year in the social engineering world, I have been reflecting on what I’ve learned so […] ...

OSINT: The privacy risks of sharing too much information

In the past, I’ve written about digital privacy and how much data we leak through our day to day interactions. I think this is an important topic to consider and really focus ...
NetworkMiner 2.7.3

NetworkMiner 2.7.3 Released

NetworkMiner now extracts meterpreter payloads from reverse shells and performs offline lookups of JA3 hashes and TLS certificates. Our commercial tool, NetworkMiner Professional, additionally comes with a packet carver that extracts network ...
The Best Is Yet To Come (2008 Remastered)

Who is Dancho Danchev?

Folks,Do you remember who I am? Do you need to do a historical check on the security industry including me as an individual including my personal blog and all the socially-oriented work ...
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Three – An OSINT Analysis

Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Three – An OSINT Analysis

Dear blog readers,I've decided to share with everyone yet another batch of currently active rogue and malicious CoolWebSearch domains with the idea to assist everyone in their cyber attack attribution campaigns including ...
Profiling a Currently Active Personal Email Address Portfolio of Members of Iran's Ashiyane Digital Security Team - An OSINT Analysis

Profiling a Currently Active Personal Email Address Portfolio of Members of Iran’s Ashiyane Digital Security Team – An OSINT Analysis

Dear blog readers,I've decided to share with everyone a currently active personal email portfolio belonging to members of Iran's  Ashiyane Digital Security Team with the idea to assist everyone in their cyber ...
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio - Part Two – An OSINT Analysis

Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Two – An OSINT Analysis

Dear blog readers,I've decided to share with everyone yet another batch of currently active rogue and malicious CoolWebSearch domains with the idea to assist everyone in their cyber attack attribution campaigns including ...