Przemek Skowron (@evilrez) 's Twitter Profile
Przemek Skowron

@evilrez

Move && Eat && Hunt && Repeat. My tweets are my own.

ID: 37994501

linkhttps://linkedin.com/in/pskowron calendar_today05-05-2009 19:13:37

1,1K Tweet

943 Followers

2,2K Following

Przemek Skowron (@evilrez) 's Twitter Profile Photo

Michał was one of the first people who started sharing examples and workflows on how to hunt for adversary infrastructure publicly and with TLP:White. You can like this or not, but it’s what it is. Afterwards, more people started to share more examples. Thanks for doing it! 👊

Kamil Bojarski 🌻 counterintelligence.pl (@lawsecnet) 's Twitter Profile Photo

🚨#cti #jobs #hiring 🚨We are looking for folks to join the brand new Client & Third Party Intelligence team at Standard Chartered. Please see the details below :) This is a very exciting opportunity for analysts who would like to have the best of both worlds:

Michael Koczwara (@michalkoczwara) 's Twitter Profile Photo

Next week, we're excited to add several new modules/lessons, bringing our March total to around 37 lessons. Want to access this training for free? academy.intel-ops.io/courses/huntin… Simply repost, like, and share in the comments how this training could benefit your career or day-to-day

Christian Reber 🇪🇺 (@christianreber) 's Twitter Profile Photo

this is horrible advise. i’ve been there and can’t recommend. took me over a year to get out of it. instead I’d suggest this: 1) make YOU and your physical and mental health the #1 priority in life. Then your family, then your company. 2) work with a therapist to identify

ZaufanaTrzeciaStrona @zaufanatrzeciastrona@infosec (@zaufana3strona) 's Twitter Profile Photo

Jak namierzyć gang ransomware, czyli wgląd w infrastrukturę przestępców i próba atrybucji zaufanatrzeciastrona.pl/post/jak-namie… Ile pracy i szczęścia potrzeba, by znaleźć nazwisko sprawcy ataku? Przekonajcie się sami.

Jak namierzyć gang ransomware, czyli wgląd w infrastrukturę przestępców i próba atrybucji

zaufanatrzeciastrona.pl/post/jak-namie…

Ile pracy i szczęścia potrzeba, by znaleźć nazwisko sprawcy ataku? Przekonajcie się sami.
Przemek Skowron (@evilrez) 's Twitter Profile Photo

This and more. You may want to use such skills to verify and assess a purpose of observed adversary infrastructure in the context of known or unknown adversary infrastructure related to currently handled intrusion, IOCs or IPs triggered alarms. Open your mind and eyes to do so 😎

Intel 471 (@intel471inc) 's Twitter Profile Photo

Tomorrow: Out of the Woods LIVE (Dec. 5, 12–1:30 PM ET). Explore how to achieve impactful results in threat hunting. Join the discussion on tools, strategies, and skills—or just listen in. Sign up here: hubs.la/Q02-dHl10