⚛️ Marcin Siedlarz (@siedlmar) 's Twitter Profile
⚛️ Marcin Siedlarz

@siedlmar

Technical attribution of cyber threats | Frontline Intrusion Intelligence 🦅 @Mandiant

ID: 1882712942

linkhttps://keybase.io/siedlmar calendar_today19-09-2013 10:38:34

3,3K Tweet

1,1K Takipçi

1,1K Takip Edilen

Mathew (@mittypk) 's Twitter Profile Photo

Is there a ghost in your router? Our new blog outlines how #UNC3886 continues to deploy custom malware ecosystems for long-term access, this time targeting Juniper Networks’ Junos OS routers. 👻👻 Google Cloud cloud.google.com/blog/topics/th…

Dan Perez (@mrdanperez) 's Twitter Profile Photo

🚨Hiring Alert🚨 Our Cyber Espionage Intelligence Production team is hiring for a role dedicated to producing Intelligence on 🇨🇳 cyber threats!!!! This is an awesome opportunity to work with a team of dedicated analysts supporting the 🇨🇳Mission Team! Lots of exciting data,

Josh++ (@josh_murchie) 's Twitter Profile Photo

"GTIG assesses that UNC5221 will continue pursuing zero-day exploitation of edge devices based on their consistent history of success and aggressive operational tempo." If you're not paying attention to this TA then I don't know what to tell you 🤷‍♂️ cloud.google.com/blog/topics/th…

John (@big_bad_w0lf_) 's Twitter Profile Photo

Fresh off the press today is a new blog detailing our observations from in the wild exploitation of CVE-2025-22457 by UNC5221 that includes two newly observed malware families tracked as BRUSHFIRE and TRAILBLAZE. cloud.google.com/blog/topics/th…

RooCon (@roocon_au) 's Twitter Profile Photo

🎉 RooCon25 is coming! 🎉 Join us on 5-6 November for our 3rd edition! As one of Australia's key cyber threat intelligence conferences, we're building on past success to make this our best event yet. Our Call for Papers opens in just one week! [1/3]

RooCon (@roocon_au) 's Twitter Profile Photo

🦘 RooCon25 Call for Papers is open! 🦘 This is your chance to share your latest insights and help us make RooCon25 the most successful edition to date! We’re waiting for submissions until 22nd of August. Find the CFP submission link and the guidelines at rsvp.withgoogle.com/events/roocon2…

RooCon (@roocon_au) 's Twitter Profile Photo

Have you tracked an adversary, uncovered a novel TTP, or perfected an analytic technique? 🕵️‍♂️ The Call for Papers for RooCon25 is open, and while the initial submissions are excellent, we are actively seeking more voices. We are looking for 👉 your voice.

The Shadowserver Foundation (@shadowserver) 's Twitter Profile Photo

We are sharing Fortinet FortiWeb instances compromised with webshells likely via CVE-2025-25257. We see 77 cases on 2025-07-15, down from 85 on 2025-07-14. CVE-2025-25257 exploitation activity observed since Jul 11th. Tree map overview (compromised): dashboard.shadowserver.org/statistics/com…

We are sharing Fortinet FortiWeb instances compromised with webshells likely via CVE-2025-25257.  We see 77 cases on 2025-07-15, down from 85 on 2025-07-14. CVE-2025-25257 exploitation activity observed since Jul 11th.  

Tree map overview (compromised): dashboard.shadowserver.org/statistics/com…
LondonCyber (@londoncyber) 's Twitter Profile Photo

🚨 BREAKING 🚨 Supported by The Shadowserver Foundation, the Europol-led Operation Eastwood dismantles pro-Russian cybercrime group ‘NoName057(16), behind DDoS attacks on Ukraine 🇺🇦 and allies. 🔒 100+ systems shut down 👮‍♀️ Arrests in 🇫🇷&🇪🇸 🎯 6 Russian nationals wanted

The Shadowserver Foundation (@shadowserver) 's Twitter Profile Photo

Alert: SharePoint CVE-2025-53770 incidents! In collaboration with Eye Security & watchTowr we are notifying compromised parties. Read: research.eye.security/sharepoint-und… ~9300 Sharepoint IPs seen exposed daily (just population, no vulnerability assessment): dashboard.shadowserver.org/statistics/iot…

Alert: SharePoint CVE-2025-53770 incidents! In collaboration with <a href="/eyesecurity/">Eye Security</a> &amp; <a href="/watchtowrcyber/">watchTowr</a> we are notifying compromised parties. Read: research.eye.security/sharepoint-und…

~9300 Sharepoint IPs seen exposed daily (just population, no vulnerability assessment): dashboard.shadowserver.org/statistics/iot…
Censys (@censysio) 's Twitter Profile Photo

New from Censys: Uncover attacker infrastructure hiding in plain sight. Our latest Threat Hunting upgrade adds Open Directory Intelligence, exposing files & tools - giving you early insights into future attack patterns. Learn more: hubs.ly/Q03zS4Nn0 #ThreatHunting