Stefan Soesanto
@iiyonite
Followers
2K
Following
4K
Media
1K
Statuses
11K
Former Senior Cyber Defense Researcher @CSS_ETHZurich @ETH // Former @ECFR & @Pacificforum // all cyber op flavors, EU cyber diplo toolbox, IW, CEMA, space 🃔
Zurich (Switzerland)
Joined October 2013
Guess the incoming Dutch government will get a briefing on the history and current state of Maximator at some point.
The Netherlands’ incoming government wants to push Europe toward a tighter intelligence-sharing club — including what it calls a potential “European equivalent” of the Five Eyes alliance — as part of a broader overhaul of its security services. https://t.co/cCVNNoOOSb
0
0
2
‼️At the end of last year, there was a series of coordinated attacks in Polish cyberspace. 📌Today, our team is publishing a report describing the technical analysis of these events. We show the scheme of operation and the tools used by the attackers. ➡️ https://t.co/A7EuPsL12h
1
0
1
Dragos released a report as well: "ELECTRUM: Cyber Attack on Poland's Electric System 2025" https://t.co/E4AUxMwpos
hub.dragos.com
This report to explores ten years of ELECTRUM and KAMACITE adversary evolution and the insights you need to protect critical infrastructure against ICS-focused threats. Download now →
1
0
0
Great to see Eugenio's report still making the rounds :) He worked hard on the "Before Vegas" and the "From Vegas to Chengdu" reports. If you are interested in what he and Mei Danowski churn out next on China, subscribe to
nattothoughts.com
Stories, analysis and insights from the intersection of culture, technology, and security. Click to read Natto Thoughts, a Substack publication with thousands of subscribers.
What separates Chinese cyber ops from Five Eyes? Three things that shifted my thinking about this topic: 1. Early cyber training (90s-2000s) happened on live targets. Not sandboxes, not simulations...actual foreign infrastructure. The "practice" was the operation. Operational
1
1
16
#ESETresearch attributes the attack to the 🇷🇺 Russia‑aligned #Sandworm APT group with medium confidence, based on strong overlaps in behavior and TTPs with multiple earlier Sandworm-linked wiper operations investigated by our team. 2/5
1
0
0
Think tanks in the US and Europe seem to be busy churning out junk on Greenland rather than looking at warfighting against Iran. Now, would be the perfect time for analysts to sketch out their expectations of how a U.S.-Iran war will unfold and progress [in cyberspace].
0
0
0
Launching the revolutionary Mission Control project ⚡️ Ukraine is moving to a unified, data-driven digital system for drone command and control on the battlefield. Commanders will have a full real-time operational picture. Modern warfare must be technological and effective.
30
149
807
Would be great if the Polish government would release a technical report on this failed campaign. From just what the minister said it sounds more like Sandworm than NoName or CARR. https://t.co/K0SuvRuPOt
therecord.media
Poland narrowly avoided a large-scale power outage by thwarting what officials described as the most serious cyberattack on its energy infrastructure in years.
1
0
2
"strengthening asymmetric and cyber strikes against the enemy and its economy" ... this will be interesting.
Today, the Verkhovna Rada of Ukraine appointed me Minister of Defense. The President has set a clear task: to build a system capable of stopping the enemy in the air, halting advances on the ground, and strengthening asymmetric and cyber strikes against the enemy and its economy.
0
0
0
Battlefield data goes live: added key weapon performance metrics to the Brave1 Market. Now, Ukrainian manufacturers can track their drones combat effectiveness in real-time: - Number of hits and points earned - Market share - Top military users - Target analysis & strike depth
1
3
17
Stark also explains that the Air Force One intercepts never left the BND building. The transcripts were read by the head of the BND and then shredded.
2
0
0
If I had to guess: Stark doesn't talk about a targeted operation - which would have necessitated approval from the Chancellory. The Air Force One intercepts were likely part of the BND's bulk satellite traffic collection. Some of it could be decrypted, some was unencrypted.
1
0
1
Link to the Ronzheimer Podcast here:
podcasts.apple.com
Podcast Episode · RONZHEIMER. · 01/04/2026 · 1h 12m
1
0
0
Original quote in German: "Deswegen haben die Amerikaner immer mal wieder auch Gespräche geführt, die entweder schlecht verschlüsselt waren, wo es Lücken gab, oder die gar nicht verschlüsselt waren." Welt has the quote here: https://t.co/4PZ0PPaTfW
welt.de
Bundeskanzlerin Merkel echauffierte sich, als bekannt wurde, dass ein US-Geheimdienst ihr Handy abgehört hatte. Nun kommt heraus: Der BND hat offenbar selbst den damaligen US-Präsidenten Obama...
1
0
1
Stark is a bit wobbly on this. In the podcast he said: "That's why the Americans have repeatedly held conversations that were either poorly encrypted, with gaps, or not encrypted at all."
@holger_stark @POTUS @BarackObama Is bekannt ob der BND nur die unverschlüsselte Telefonleitung oder auch die verschlüsselte abhören konnte?
1
0
1
Federov will likely become the new Defense Minister. Cybering pays off. https://t.co/6NNasyIzaT
united24media.com
0
0
0
Interesting to see Budanov becoming Zelensky's chief of staff. More cyber in the making? https://t.co/OvubjtZBAN
defensenews.com
Kyrylo Budanov is one of the country’s most recognizable and popular wartime figures. He has led Ukraine’s military intelligence agency since 2020.
1
0
0