Dancho Danchev

Contributor

Dancho Danchev is an independent security consultant and cyber threats analyst, with extensive experience in open source intelligence gathering, and cybercrime incident response. He's been an active security blogger since 2007, and maintains a popular security blog sharing real-time threats intelligence data with the rest of the community on a daily basis.ggMore details on Dancho Danchev's current and past professional affiliations, can be found in his LinkedIn profile. You can also follow him on Twitter

More details on Dancho Danchev's current and past professional affiliations, can be found in his LinkedIn profile.

Latest from Dancho Danchev

Show search filters
Image Gallery: Avast! Antivirus office in Prague, Czech Republic

Image Gallery: Avast! Antivirus office in Prague, Czech Republic

With over 100 million users internationally, Avast! Antivirus reliance on the Freemium business model, has offered the company an unprecedented opportunity for a cost-effective worldwide market penetration. At a recent PR event in Prague, the Czech Republic, Avast! executives explained this business model, and offered insights into some of the current trends within the antivirus market.

July 28, 2010 by in Security

Coordinated Russia vs Georgia cyber attack in progress

Coordinated Russia vs Georgia cyber attack in progress

In the wake of the Russian-Georgian conflict, a week worth of speculations around Russian Internet forums have finally materialized into a coordinated cyber attack against Georgia's Internet infrastructure. The attacks have already managed to compromise several government web sites, with continuing DDoS attacks against numerous other Georgian government sites, prompting the government to switch to hosting locations to the U.

August 11, 2008 by in Security

Campaign Monitor hacked, accounts used for spamming

Campaign Monitor hacked, accounts used for spamming

E-mail marketing software developer Campaign Monitor warned users today of a server compromise that took place during the weekend.The compromise allowed the attackers to gain access to customer accounts, which they abused by importing their own lists of harvested emails in order to launch spam campaigns using the clean IP reputation of their servers.

August 11, 2009 by in Servers

DNS cache poisoning attacks exploited in the wild

DNS cache poisoning attacks exploited in the wild

UPDATE: Arbor Networks have provided more details in their "30 Days of DNS Attack Activity" analysis, SANS confirmed HD Moore's statement on DNS cache poisoned AT&T DNS servers. Numerous independent sources are starting to see evidence of DNS cache poisoning attempts on their local networks, in what appears to be an attempt to take advantage of the "recent" DNS cache poisoning vulnerability :" client 143.

July 28, 2008 by in Security

Mac OS X ransomware - hype or real threat?

Mac OS X ransomware - hype or real threat?

In need of a fresh example that cybercriminals are actively looking for ways to monetize infected Mac OS X hosts? Early-stage discussions at several web forums, including a PoC (proof of concept, source code included) as well as the following potential layouts speak for themselves.Read the article: Mac OS X SMS ransomware - hype or real threat?

March 17, 2010 by in Enterprise Software