SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Aleksandar Milenkoski

Aleksandar Milenkoski is a Principal Threat Researcher at SentinelLABS. With expertise in malware research and focus on targeted attacks, he brings a blend of practical and deep insights to the forefront of cyber threat intelligence. Aleksandar has a PhD in system security and is the author of numerous reports on cyberespionage and high-impact cybercriminal operations, conference talks, and peer-reviewed research papers. From 2011 to 2014, he was a European Commission Marie Skłodowska-Curie Research Fellow. His research has won awards from SPEC, the Bavarian Foundation for Science, and the University of Würzburg.
Ransoms Without Ransomware Data Corruption And Other New Tactics In Cyber Extortion 4
labs

Ransoms Without Ransomware, Data Corruption and Other New Tactics in Cyber Extortion

Aleksandar Milenkoski & Gijs Rijnders (Cyber Threat Intelligence - Netherlands Police) / October 20, 2022

Cybercriminals prioritize fast data theft over slow encryption as ransomware landscape evolves into spectrum of data extortion threat actors.

Read More
Intermittent Encryption For Speed And Evasion On The Rise A Trending Feature On The Ransomware Scene By Aleksandar Milenkoski Jim Walter 5
labs
Crimeware

Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection

Aleksandar Milenkoski / September 8, 2022

Partially encrypting victims' files improves ransomware speed and aids evasion. First seen in LockFile, the technique is now being widely adopted.

Read More
Who Needs Macros Threat Actors Pivot To Abusing Explorer And Other LOLBins Via Windows Shortcuts 6
labs
Crimeware

Who Needs Macros? | Threat Actors Pivot to Abusing Explorer and Other LOLBins via Windows Shortcuts 

Aleksandar Milenkoski / August 4, 2022

Crimeware vendors say 'macros are dead', but they have a new weapon to help threat actors successfully deploy malware.

Read More
Inside Malicious Windows Apps For Malware Deployment By Aleksandar Milenkoski 3
labs
Security Research

Inside Malicious Windows Apps for Malware Deployment

Aleksandar Milenkoski / July 14, 2022

Learn how threat actors manipulate Windows to install malicious apps that are trusted by the system, and how to defend against them.

Read More
Previous
1 2 3
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.