Advertisement · 728 × 90

Posts by Kamil Bojarski

CyCon Agenda - CyCon 2026: Securing Tomorrow

A collaborative deep dive into clustering & attributing modern threat ecosystems, featuring a case study on APT41.

Learn more here: web.cvent.com/event/3854aa...

2 weeks ago 4 2 0 0

We’re proud Synapse is playing a part in the hands-on workshop at @ccdcoe #CyCon2026 with @lawsecnet.counterintelligence.pl, @euben.bsky.social, and Jiro Minier:

“Threat Actors Can Do Public-Private Partnership Too”

2 weeks ago 8 6 1 0

>13-year-old who wears a jr size kevlar vest while using the free weights so he can blatantly stare at the women on treadmills
That is... very oddly specific mate

3 weeks ago 2 0 1 0
CyCon Agenda - CyCon 2026: Securing Tomorrow

All the details and timing are available of course in the CyCon agenda web.cvent.com/event/3854aa... 4/4
See you in Tallinn! 🇪🇪

3 weeks ago 0 0 0 0

Please join us for pivoting through technical and corporate data, considering how to best model relationships, and planning for what you can expect when digging into details of how activities overlap. 3/4

3 weeks ago 0 0 1 0

This is a project I've been thinking about for quite some time and I truly believe that the issue we will be discussing is one of the key areas threat intelligence teams will need to tackle to maintain visibility into the groups they are tracking. 2/4

3 weeks ago 0 0 1 0
Post image

Now that things are becoming serious and official I'm very happy, super excited, and most of all proud to announce a workshop that I will be hosting together with @euben.bsky.social and Jiro Minier during the NATO CCDCOE #CyCon2026 conference! 1/4

3 weeks ago 0 0 1 0
Post image

Już 8 kwietnia zapraszam serdecznie na SECURE 2026 organizowany przez NASK i CERT.PL, a w szczególności moją prezentację "Śledzenie i analiza infrastruktury typu ORB w praktyce threat intelligence". Do zobaczenia!
Link do rejestracji: www.secure.edu.pl/register

1 month ago 0 0 0 0
Advertisement
Senior Threat Researcher, Ransomware Affiliates (US Remote, selected states) Senior Threat Researcher, Ransomware Affiliates (US Remote, selected states)

Link to the offer 4/4 jobs.standardchartered.com/job/Senior-T...

1 month ago 1 1 0 0

Sorry for everyone outside of those, we however need to have operations and a banking license in a given state. In case of any questions feel free to spam me or
@corpen.secman.pl 3/4

1 month ago 1 0 1 0

Top tier access to data and working with Synapse included. This is my team of course so we will be working together, I recuse myself from deciding if that goes in the pros or cons column. The role is open for remote work NY, NJ, PA, CT, DC, TX, CA, FL. 2/4

1 month ago 2 0 1 0

At Standard Chartered Cyber Intelligence Centre once again we are hiring, as we are looking for a colleague in US to support intelligence ops focused on ransomware affiliates. Join us for discovery and tracking of emerging groups, and translating intelligence to operational outcomes.1/4

1 month ago 3 2 1 0

Thanks for this post. I'm really tired of basic-ass analyses that go like "well based on historical patterns we expect retaliatory attacks". If you are doing an actual analysis perhaps there are few more factors that impact the Iranian capabilities currently and you might want to consider those.

1 month ago 1 0 0 0

What was the post?

1 month ago 0 0 0 0
Post image

Report available here: www.valisluureamet.ee/en.html 6/6

2 months ago 0 0 0 0
Advertisement

Not overhyping scenarios and providing cool-headed analysis is a testament to how professional and capable EFIS is. Many private and public sector intel/analysis organisation should take notes.

PS Cover of this year's edition goes really hard ;) 5/6

2 months ago 0 0 1 0

Estonia is the very definition of NATO's eastern flank and perhaps country that is most exposed to any potential Russian aggression against NATO, and hence could have many political reasons to drum up the threat. 4/6

2 months ago 0 0 1 0

...We are likely to reach a similar assessment next year because Estonia and Europe have taken steps that compel the Kremlin to calculate very carefully what, if anything, it can risk attempting. " 3/6

2 months ago 0 0 1 0

"There is, however, no cause for panic. In the Estonian Foreign Intelligence Service’s assessment, Russia has no intention of militarily attacking Estonia or any other NATO member state in the coming year. ... 2/6

2 months ago 0 0 1 0
Post image

Annual report by the Välisluureamet / Estonian Foreign Intelligence Service is always a must read, but what struck me most in this edition was this passage right in the foreword: 1/6

2 months ago 1 0 1 0
Preview
a man in a suit and tie says welcome to the nerd zone ALT: a man in a suit and tie says welcome to the nerd zone

I can only aspire to reach your levels of intel nerdiness some day.

2 months ago 1 0 1 0

10/10 no notes selection for supply chain breach.

2 months ago 1 0 0 0
Advertisement
Preview
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom.

For folks looking for Notepad++ IoCs, @rapid7.com just dropped a write-up. www.rapid7.com/blog/post/tr...

2 months ago 7 5 1 0
Preview
Raport z incydentu w sektorze energii z 29 grudnia 2025 roku Zespół CERT Polska przedstawia raport z analizy incydentu w sektorze energii, do którego doszło 29 grudnia 2025 roku. Ataki miały charakter destrukcyjny i były wymierzone w farmy wiatrowe i fotowoltai...

Np dlatego, że doprowadzi do śmierci obywateli lub zniszczenia infrastruktury krytycznej.
PS Ponownie, raport jest super i duże brawa dla CERT PL, lektura obowiązkowa. 12/12 cert.pl/posts/2026/0...

2 months ago 0 0 0 0

Paradoksalnie jednak w dłuższej perspektywie podejście to może poskutkować koniecznością eskalacji, gdy atakujący zachęcony powtarzającym się brakiem reakcji przeprowadzi w końcu atak, którego państwo nie będzie mogło zignorować. 11/12

2 months ago 0 0 1 0

Ostatecznie reakcja na atak (lub jej brak) będzie wyznacznikiem tego czy cyber cały czas jest traktowane ulgowo, z wyraźną niechęcią do eskalacji czy nawet częściowo symetrycznych odpowiedzi. 10/12

2 months ago 0 0 1 0

W tym zakresie zaangażowanie Rosji w inwazję Ukrainy tylko zwiększa podatność na ataki np. : na infrastrukturę, która zapewnia logistykę dla inwazji. 9/12

2 months ago 0 0 1 0

W mojej ocenie, i zgodnie ze zrównaniem do celowych podpaleń, atak powinien spowodować przynajmniej wniosek o konsultacje w ramach Artykułu 4 Traktatu Północnoatlantyckiego. Na końcowym spektrum odpowiedzi potencjalnie może być rozważana symetryczna operacja ofensywna. 8/12

2 months ago 0 0 1 0

Jednak charakter ataku (infrastruktura krytyczna, atak w zimę, destrukcyjny charakter) sprawia, że ograniczona odpowiedź jest obarczona ryzykiem przyzwolenia na kolejne operacje. 7/12

2 months ago 0 0 1 0
AUL LibGuides: DIMEFIL: Instruments of Power January 2024

Państwo ma do dyspozycji cały szereg środków, określany czasem skrótem DIMEFIL. Odpowiedź nie mus być symetryczna. Najczęstszym i ‘najprostszym’ środkiem są np. : sankcje lub reakcja dyplomatyczna. 6/12 fairchild-mil.libguides.com/dimefil

2 months ago 0 0 1 0