Aleksandar Milenkoski

581 posts

Aleksandar Milenkoski banner
Aleksandar Milenkoski

Aleksandar Milenkoski

@milenkowski

Cyber Threat Intelligence & AI Innovation | PhD | European Commission Marie Curie Research Fellow 2011-2014 | Personal Profile

Katılım Mart 2012
592 Takip Edilen2K Takipçiler
Sabitlenmiş Tweet
Aleksandar Milenkoski
Aleksandar Milenkoski@milenkowski·
Dropping this today: ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware In collaboration with @JulianVoeg from @RecordedFuture 🧵A quick summary and a few thoughts on the use of RSW by APTs s1.ai/Chamel-b
English
1
29
66
15.1K
Aleksandar Milenkoski
Aleksandar Milenkoski@milenkowski·
Last week, a new initiative was launched under @NATO DEEP to develop a Reference Curriculum on Artificial Intelligence as a Tool for Military Power. Honored to work alongside a distinguished group of experts and help define how AI is addressed within military education!
English
0
0
2
181
Aleksandar Milenkoski retweetledi
J. A. Guerrero-Saade
J. A. Guerrero-Saade@juanandres_gs·
Over the past 5 months, SentinelLABS has embraced a remit of experimenting with frontier model capabilities towards meaningful security applications. We’ve been reporting on our findings openly as we complete them. We hope it’ll help others looking for ways to meaningfully impact cybersecurity.
SentinelOne@SentinelOne

It takes a human analyst an average of 41 minutes to process a single CTI report. An LLM typically does it in 3.3 minutes. Our latest @LabsSentinel evaluation shows LLM-driven pipelines can process threat intel 18x faster than manual workflows. But there’s a catch. ⚠️ 🧵

English
0
8
43
8.4K
Aleksandar Milenkoski retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
Sentinel Labs researchers Aleksandar Milenkoski & Razvan Gabriel Cirstea explore the application of LLMs for extracting & contextualizing information from cyber threat intelligence (CTI) reports, turning narrative into structured data for downstream use. sentinelone.com/labs/from-narr…
Virus Bulletin tweet media
English
1
15
62
6.9K
Aleksandar Milenkoski
Aleksandar Milenkoski@milenkowski·
Just published: turning cyber threat intel narratives into knowledge graphs with LLMs. Razvan and I explore the application of LLMs for extracting and contextualizing information from CTI reports, turning narrative into structured data for downstream use. [1/2]
English
2
6
55
5.4K
Aleksandar Milenkoski retweetledi
Costin Raiu
Costin Raiu@craiu·
Some additional details emerge about the F5 breach: the hackers were in the company's network for at least 12 months, according to people familiar with the investigation. F5 sent customers on Wednesday a threat hunting guide for Brickstorm, which is leveraged by the UNC5221 Chinese APT group. BTW, 12 months is just a bit short of the 393 days that is the average dwell time for UNC5221. Story by Patrick Howell O'Neill and colleagues: bloomberg.com/news/articles/…
English
8
113
318
49.5K
Aleksandar Milenkoski retweetledi
Tom Hegel
Tom Hegel@TomHegel·
1/ A pro-Hamas persona is making noise from recent airport “hacks”, including broadcast system defacements in 🇨🇦 Kelowna & 🇺🇸 Harrisburg. But digging deeper, their actions remain low-impact and opportunistic. Lets take a deeper look..🧵
English
1
5
6
1.9K
Aleksandar Milenkoski retweetledi
Tom Hegel
Tom Hegel@TomHegel·
It’s finally here.. @labscon_io welcome reception kicks off TONIGHT! Opening with a live Three Buddy Problem show, setting the tone for an incredible week of brilliant minds coming together. Watch #LABScon25 for event updates and highlights. 💜 See you in the desert 🧵..
Tom Hegel tweet media
English
1
4
18
2.3K
Aleksandar Milenkoski retweetledi
SentinelOne
SentinelOne@SentinelOne·
When Public Information Censorship Meets Private Enterprise: @LabsSentinel analyzed a data leak that revealed to them the complex ecosystem between the Chinese Communist Party (CCP) and country’s private cybersecurity sector. The data leak from Chinese cybersecurity firm, Topsec, indicates that private cybersecurity firms are likely being used for content moderation in an effort to monitor and control public opinion. Read the full report from @LabsSentinel’s @spiderspiders_, @milenkowski, and @DakotaInDC: s1.ai/topsec
English
1
1
3
249
Aleksandar Milenkoski
Aleksandar Milenkoski@milenkowski·
Presenting at @HagueTIX with @JulianVoeg was an amazing experience! So many insightful talks! Huge thanks to the organizing team (@monica_kello, Corianne Oosterbaan, and the PC) for having me. Already looking forward to next year, wouldn’t miss it!
Aleksandar Milenkoski tweet media
English
0
2
8
422
Fabio Pagani
Fabio Pagani@pagabuc·
Our research on Secure Boot keeps on giving! Today we disclose CVE-2025-3052, a Secure Boot bypass that started with vulnerable signed module found on VirusTotal and ended with 14 hashes added to dbx by Microsoft in today’s Patch Tuesday 🔥
BINARLY🔬@binarly_io

🚨Binarly is documenting the discovery of CVE-2025-3052, a memory-corruption flaw in a Microsoft-signed UEFI module that lets attackers bypass Secure Boot and run unsigned code before the OS starts. 🔗 Full details: binarly.io/blog/another-c… 🛡️ Advisory: binarly.io/advisories/brl…

English
1
10
34
2.6K
Aleksandar Milenkoski retweetledi
John Lambert
John Lambert@JohnLaTwC·
Think Deeper. One line of this @SentinelOne blog (🙏 @TomHegel and @milenkowski) stood out to me. 💭"Encrypts and password-protects the archive using 7-Zip with the password @WsxCFt6&UJMmko0, ensuring the data is obfuscated from inspection." Pretty strong password at first blush. Let's see if @Copilot can figure out why the threat actor may have chosen it.
John Lambert tweet media
English
2
18
59
9K