Daniel Dimov

Dr. Daniel Dimov is the founder of Dimov Internet Law Consulting (www.dimov.pro), a legal consultancy based in Belgium. Daniel is a fellow of the Internet Corporation for Assigned Names and Numbers (ICANN) and the Internet Society (ISOC). He did traineeships with the European Commission (Brussels), European Digital Rights (Brussels), and the Institute for EU and International law “T.M.C. Asser Institute” (The Hague). Daniel received a Ph.D. in law from the Center for Law in the Information Society at Leiden University, the Netherlands. He has a Master's Degree in European law (The Netherlands), a Master's Degree in Bulgarian Law (Bulgaria), and a certificate in Public International Law from The Hague Academy of International law.
Daniel Dimov

Key findings from ESG’s Modern Application Development Security report

A deep dive into security issues In August 2020, the Enterprise Strategy Group (ESG) published its report, “Modern Application Development Security.” ESG is

Octopus Scanner malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction Octopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has been extensively disc

Tesla Model 3 vulnerability: What you need to know about the web browser bug

Introduction In 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Te

Analysis of ransomware used in recent cyberattacks on health care institutions

Introduction In recent years, there has been a steady increase in the number of ransomware attacks on healthcare institutions. The pressure such institution

Privacy concept: Painted multicolor text Malware on White Brick wall background

PonyFinal malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction to PonyFinal PonyFinal ransomware appeared for the first time in 2020. It is malware that relies on human-operated attacks, i.e., attacks that e

Lessons learned from the Fresenius ransomware cyberattack

Introduction to the Snake ransomware Fresenius is a German company that provides various health care services, including services for dialysis of people with

Handwriting text writing Malware Analysis. Concept meaning performs deep analysis of evasive and unknown threats.

Agent Tesla: What it is, how it works and why it’s targeting energy companies

Introduction to Agent Tesla Agent Tesla appeared for the first time in 2014, but it has been just recently used for attacks on energy companies operating in

Press enter button on the computer. business logistics Communication network World map send message Connect worldwide hand keyboard Communications network map of the world Blue map Dark blue background map world global logistics network

Dark web fraud: How-to guides make cybercrime too easy

Introduction to dark web fraud Dark web fraud constitutes a global information security problem. The widespread availability of how-to guides providing instr

malware detected alert on a laptop screen with a cup of tea

BazarBackdoor malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction to BazarBackdoor BazarBackdoor is a new malware with the ability to install various types of malicious programs on the infected computers. It is

Five key lessons from the 2020 U.S. Cyberspace Solarium Commission report

Introduction On March 11, 2020, the Cyberspace Solarium Commission (CSC), a governmental commission aiming to identify “a strategic approach to defending the

Handwriting text writing Malware Analysis. Concept meaning performs deep analysis of evasive and unknown threats.

Starslord 2.0 malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction The sLoad malware was discovered for the first time in 2018. It delivers various Trojans to the infected computers, including but not limited to

Malware sign yellow with stripes 3D rendering

Jackpotting malware

Introduction Jackpotting malware is not well known because it exclusively targets automated teller machines (ATMs). This means it usually doesn’t directly af