Advertisement · 728 × 90

Posts by Aleksandar Milenkoski

LABScon 2025

The LABScon 2025 agenda is packed with incredible talks and speakers. Check it out! [3/3]

s1.ai/agenda25

7 months ago 1 0 0 0

I am also delighted to be hosting a workshop with Jose Luis Sánchez Martínez (Google, VirusTotal) on "Advanced Threat Hunting: Automating Large-Scale Operations with LLMs". [2/3]

7 months ago 0 0 1 0
Post image

🚀LABScon kicks off tomorrow!

I am excited to be presenting on the APT group CamoFei, a joint research project with @julianferdinand.bsky.social (Recorded Future) and @azaka.fun (TeamT5). [1/3]

7 months ago 3 2 1 0
Preview
Exclusive: ‘It’s scary’ - crypto workers under siege from North Korean hackers North Korean hackers are saturating the cryptocurrency industry with credible-sounding job offers as part of their campaign to steal digital cash, according to new research, raw data, and interviews.

.@ajvicens.bsky.social and @raphae.li from @reuters.com provide further coverage of the human dimension of this threat, exploring victim engagement methods and their personal impact. A great read!

Read the Reuters article: www.reuters.com/world/asia-p...

7 months ago 3 3 0 0
Preview
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms DPRK-aligned threat actors abuse CTI platforms to detect infrastructure exposure and scout for new assets.

🚨New research drop: Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms

It was a pleasure collaborating with Sreekar Madabushi and @kennethkinion.bsky.social from Validin!

Read our blog post: s1.ai/nk-ops

7 months ago 10 6 1 0
Post image

Was great presenting with @milenkowski.bsky.social at @haguetix.bsky.social yesterday. Big thank you for hosting this incredible event. Looking forward to next year!

10 months ago 8 3 0 0
Preview
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets This report uncovers a set of related threat clusters linked to PurpleHaze and ShadowPad operators targeting organizations, including cybersecurity vendors.

Get the full story here:

www.sentinelone.com/labs/follow-... [2/2]

10 months ago 3 1 0 0
Advertisement

We just released our findings on long-term activity clusters attributed to China-nexus actors.

We discuss a relatively underreported, yet critical, aspect of the threat landscape: the targeting of cybersecurity vendors.

Big shout out to Lumen's Black Lotus Labs for their support! [1/2]

10 months ago 6 4 1 0
Post image

Huge thanks to the @sleuthcon.bsky.social team for having me and putting on such a great event! It was a pleasure presenting with Sreekar from Validin on North Korean activities. Stay tuned, more to come from us soon.

10 months ago 3 1 0 0

Thanks @ellyrostoum.bsky.social and it was great seeing you!

10 months ago 1 0 0 0
Post image

NEW 👉 FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network

Months-long research project with Validin we just dropped @pivotcon.bsky.social

🖤~40k IOCs: github.com/Validin/indi...
💜 SentinelLabs: s1.ai/freedrain
💙 Validin: www.validin.com/blog/freedra...

Enjoy!

11 months ago 9 5 0 0

An excerpt from the newest Pharos report now available on Binding Hook 👇

11 months ago 2 1 1 0
Pharos Report No. 3: Ransomware’s New Masters: How States Are Hijacking Cybercrime - Virtual Routes The third report in the Pharos Series, Ransomware’s New Masters: How States Are Hijacking Cybercrime is authored by Aleksandar Milenkoski, Jiro Minier, Julian-Ferdinand Vögele, Max Smeets, and Taylor ...

Banger of a report from @milenkowski.bsky.social, Jiro Minier, @julianferdinand.bsky.social, @maxwsmeets.bsky.social, and @tgrossman.bsky.social

virtual-routes.org/pharos-repor...

11 months ago 16 7 0 0