A collaborative deep dive into clustering & attributing modern threat ecosystems, featuring a case study on APT41.
Learn more here: web.cvent.com/event/3854aa...
Posts by Kamil Bojarski
We’re proud Synapse is playing a part in the hands-on workshop at @ccdcoe #CyCon2026 with @lawsecnet.counterintelligence.pl, @euben.bsky.social, and Jiro Minier:
“Threat Actors Can Do Public-Private Partnership Too”
>13-year-old who wears a jr size kevlar vest while using the free weights so he can blatantly stare at the women on treadmills
That is... very oddly specific mate
All the details and timing are available of course in the CyCon agenda web.cvent.com/event/3854aa... 4/4
See you in Tallinn! 🇪🇪
Please join us for pivoting through technical and corporate data, considering how to best model relationships, and planning for what you can expect when digging into details of how activities overlap. 3/4
This is a project I've been thinking about for quite some time and I truly believe that the issue we will be discussing is one of the key areas threat intelligence teams will need to tackle to maintain visibility into the groups they are tracking. 2/4
Now that things are becoming serious and official I'm very happy, super excited, and most of all proud to announce a workshop that I will be hosting together with @euben.bsky.social and Jiro Minier during the NATO CCDCOE #CyCon2026 conference! 1/4
Już 8 kwietnia zapraszam serdecznie na SECURE 2026 organizowany przez NASK i CERT.PL, a w szczególności moją prezentację "Śledzenie i analiza infrastruktury typu ORB w praktyce threat intelligence". Do zobaczenia!
Link do rejestracji: www.secure.edu.pl/register
Sorry for everyone outside of those, we however need to have operations and a banking license in a given state. In case of any questions feel free to spam me or
@corpen.secman.pl 3/4
Top tier access to data and working with Synapse included. This is my team of course so we will be working together, I recuse myself from deciding if that goes in the pros or cons column. The role is open for remote work NY, NJ, PA, CT, DC, TX, CA, FL. 2/4
At Standard Chartered Cyber Intelligence Centre once again we are hiring, as we are looking for a colleague in US to support intelligence ops focused on ransomware affiliates. Join us for discovery and tracking of emerging groups, and translating intelligence to operational outcomes.1/4
Thanks for this post. I'm really tired of basic-ass analyses that go like "well based on historical patterns we expect retaliatory attacks". If you are doing an actual analysis perhaps there are few more factors that impact the Iranian capabilities currently and you might want to consider those.
What was the post?
Report available here: www.valisluureamet.ee/en.html 6/6
Not overhyping scenarios and providing cool-headed analysis is a testament to how professional and capable EFIS is. Many private and public sector intel/analysis organisation should take notes.
PS Cover of this year's edition goes really hard ;) 5/6
Estonia is the very definition of NATO's eastern flank and perhaps country that is most exposed to any potential Russian aggression against NATO, and hence could have many political reasons to drum up the threat. 4/6
...We are likely to reach a similar assessment next year because Estonia and Europe have taken steps that compel the Kremlin to calculate very carefully what, if anything, it can risk attempting. " 3/6
"There is, however, no cause for panic. In the Estonian Foreign Intelligence Service’s assessment, Russia has no intention of militarily attacking Estonia or any other NATO member state in the coming year. ... 2/6
Annual report by the Välisluureamet / Estonian Foreign Intelligence Service is always a must read, but what struck me most in this edition was this passage right in the foreword: 1/6
10/10 no notes selection for supply chain breach.
For folks looking for Notepad++ IoCs, @rapid7.com just dropped a write-up. www.rapid7.com/blog/post/tr...
Np dlatego, że doprowadzi do śmierci obywateli lub zniszczenia infrastruktury krytycznej.
PS Ponownie, raport jest super i duże brawa dla CERT PL, lektura obowiązkowa. 12/12 cert.pl/posts/2026/0...
Paradoksalnie jednak w dłuższej perspektywie podejście to może poskutkować koniecznością eskalacji, gdy atakujący zachęcony powtarzającym się brakiem reakcji przeprowadzi w końcu atak, którego państwo nie będzie mogło zignorować. 11/12
Ostatecznie reakcja na atak (lub jej brak) będzie wyznacznikiem tego czy cyber cały czas jest traktowane ulgowo, z wyraźną niechęcią do eskalacji czy nawet częściowo symetrycznych odpowiedzi. 10/12
W tym zakresie zaangażowanie Rosji w inwazję Ukrainy tylko zwiększa podatność na ataki np. : na infrastrukturę, która zapewnia logistykę dla inwazji. 9/12
W mojej ocenie, i zgodnie ze zrównaniem do celowych podpaleń, atak powinien spowodować przynajmniej wniosek o konsultacje w ramach Artykułu 4 Traktatu Północnoatlantyckiego. Na końcowym spektrum odpowiedzi potencjalnie może być rozważana symetryczna operacja ofensywna. 8/12
Jednak charakter ataku (infrastruktura krytyczna, atak w zimę, destrukcyjny charakter) sprawia, że ograniczona odpowiedź jest obarczona ryzykiem przyzwolenia na kolejne operacje. 7/12