Dancho Danchev’s Sample Personal Conference and Event Photos – A Compilation
Dear blog readers, I’ve decided to share with everyone a set of personal conference and event photos. Enjoy!
Where Intelligence Analysts and Intelligence Community Clients Meet Their Needs on a Daily Basis!
Dear blog readers, I’ve decided to share with everyone a set of personal conference and event photos. Enjoy!
Here we go. https://academictorrents.com/details/131080b57d568ca3d05794cde5a3d7774f890373 – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/details/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201 – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – Second Edition – Direct Torrent Download Available! https://academictorrents.com/download/131080b57d568ca3d05794cde5a3d7774f890373.torrent – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/download/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201.torrent – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – SecondRead More
Here we go. https://academictorrents.com/details/131080b57d568ca3d05794cde5a3d7774f890373 – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/details/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201 – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – Second Edition – Direct Torrent Download Available! https://academictorrents.com/download/131080b57d568ca3d05794cde5a3d7774f890373.torrent – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/download/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201.torrent – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – SecondRead More
Folks, Do you remember who I am? Do you need to do a historical check on the security industry including me as an individual including my personal blog and all the socially-oriented work and contributors that I’ve made to the industry during the past ten years? If an image is worth a thousand words considerRead More
Google is your best friend! Here’s the original analysis. Check out the actual Maltego technical details video demonstration here: Enjoy!
Dear blog readers, I’ve decided to share with everyone a currently active personal email portfolio belonging to members of Iran’s Ashiyane Digital Security Team with the idea to assist everyone in their cyber attack or cyber threat actor attribution campaigns. Sample currently active personal emails known to belong to members of Iran’s Ashiyane Digital SecurityRead More
Dear blog readers, I’ve decided to share with everyone a currently active personal email portfolio belonging to members of Iran’s Ashiyane Digital Security Team with the idea to assist everyone in their cyber attack or cyber threat actor attribution campaigns. Sample currently active personal emails known to belong to members of Iran’s Ashiyane Digital SecurityRead More
Dear blog readers, I’ve decided to share with everyone some practical and actionable threat intelligence information regarding members of the Ashiyane Digital Security Team also known as Behrooz Kamalian’s Ashiyane ICT Company for the purpose of assisting everyone in their cyber attack and cyber attack attribution campaigns. Name: Behrooz Kamalian Postal address: Tajrish Sq, FanaRead More
Note: This OSINT analysis has been originally published at my current employer’s Web site – https://whoisxmlapi.com where I’m currently acting as a DNS Threat Researcher since January, 2021. We’ve decided to take a closer look at the Internet-connected infrastructure of the Liberty Front Press Network part of a recent takedown and domain seizure part of an ongoing lawRead More
Dear blog readers, I’ve decided to share with everyone a currently active list of Iran-based hacker and hacker team’s handles which could greatly assist in possible cyber attack attribution campaigns including cyber threat actor attribution campaigns. Sample currently active Iran-based hacker and hacker team’s handles currently used in massive or targeted Web site defacement campaigns:Read More