Dear blog readers,I just released a new personal biographical fiction Ebook called "Dancho Danchev 2026 Third Edition Memoir" in Bulgarian.I hope that you'll find it relevant and informative.Stay tuned.
Dancho Danchev's New Ebook - "Данчо Данчев: Сенките на Киберпространството" - In Bulgarian
Date inconnueDear blog readers,I just released a new personal biographical fiction Ebook called "Данчо Данчев: Сенките на Киберпространството" in Bulgarian.I hope that you'll find it relevant and informative.Stay tuned.
An image is worth a thousand words.Sample screenshots:Stay tuned.
Sample Malware Phone Back C&C (Command and Control) MD5s From Domains Belonging to XSS Forum Users - A Compilation
Date inconnueDear blog readers,In my most recent analysis I decided to take a deeper look inside some of the domains which belong to members of the XSS forum are known to have been used as malicious software phone back C&C (command and control) domains.Here's...
Dear blog readers,In my most recent analysis I decided to take a deeper look inside some of the domains which belong to members of the RAMP (Russian Anonymous Marketplace) are known to have been used as malicious software phone back C&C (command...
HTB: DarkZero
Date inconnueDarkZero is an assume breach Windows box with two forests connected by a bidirectional cross-forest trust. Starting with given credentials, I’ll enumerate MSSQL on DC01 and find a linked server to DC02 in the other forest where the mapped account...
Friday Squid Blogging: Jurassic Fish Chokes on Squid
Date inconnueHere’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum: the hard, internal shell of an extinct, squid-like animal. Original paper. As usual, you can also use this squid post to talk about the security stories...
This is the sixth update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026). Update 005 covered developments through April 1, including the first confirmed victim...
WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate link) the recordings. It doesn’t use the Zoom record feature, so Zoom can’t do anything about it.
ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)
Date inconnue(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
US Bans All Foreign-Made Consumer Routers
Date inconnueThis is for new routers; you don’t have to throw away your existing ones: The Executive Branch determination noted that foreign-produced routers (1) introduce “a supply chain vulnerability that could disrupt the U.S. economy, critical...
From its GitHub repo: "Vite (French word for "quick", pronounced /vi?t/, like "veet") is a new breed of frontend build tooling that significantly improves the frontend development experience" [https://github.com/vitejs/vite]. This environment...
Possible US Government iPhone Hacking Tool Leaked
Date inconnueWired writes (alternate source): Security researchers at Google on Tuesday released a report describing what they’re calling “Coruna,” a highly sophisticated iPhone hacking toolkit that includes five complete hacking techniques capable of...
ISC Stormcast For Thursday, April 2nd, 2026 https://isc.sans.edu/podcastdetail/9876, (Thu, Apr 2nd)
Date inconnue(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Overview of Content Published in March
Date inconnueHere is an overview of content I published in March: Blog posts: Update: base64dump.py Version 0.0.29 Update: emldump.py Version 0.0.16 Update: search-for-compression.py 0.0.6 Update: pecheck.py Version 0.7.20 Update: zipdump.py Version 0.0.34...
SightHouse: Automated function identification
Date inconnueIntroduction SightHouse's logo Whether you are new to reverse engineering or have years of experience, you have likely encountered a common challenge: distinguishing relevant software components from third-party libraries within firmware or...
Is “Hackback” Official US Cybersecurity Strategy?
Date inconnueThe 2026 US “Cyber Strategy for America” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more aggressive tone. But one sentence stood out: “We will unleash the private sector by creating...
This is the fifth update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026). Update 004 covered developments through March 30, including the Databricks...
Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)
Date inconnueToday, most malware are called “fileless” because they try to reduce their footprint on the infected computer filesystem to the bare minimum. But they need to write something… think about persistence. They can use the registry as an alternative...
A Taxonomy of Cognitive Security
Date inconnueLast week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are here, but—even better—Menton has a long essay laying out the basic concepts and ideas. The...
Aucun article de sécurité disponible