Sven Herpig's Avatar

Sven Herpig

@z-edian

Once wrote a "sensible policy blueprint" on active cyber defense Currently: operational parameters of Chinese cyber campaigns & all things vulnerability disclosure Formerly German government https://github.com/z-edian/publications Avatar @midjourney

100
Followers
73
Following
22
Posts
20.11.2024
Joined
Posts Following

Latest posts by Sven Herpig @z-edian

Golem

Chinesische #Cyberkriminelle gehören weltweit zu den technisch fähigsten. Teilweise verzahnt mit staatlichen Stellen sind ihre Aktivitäten oft Teil eines Ökosystems aus Kriminalität und Wirtschaftsspionage. #cybercrime #China @z-edian.bsky.social www.golem.de/news/chinesi... (mit Testabo)

10.02.2026 15:52 👍 2 🔁 1 💬 0 📌 0
Post image

Policy Paper on “Assessing Irresponsibility in Cyber Operations” now published.

It introduces a “seven-red-flags” framework designed to help decision-makers & operators assess when cyber activities cross the line into irresponsible or unacceptable behavior.

www.interface-eu.org/publications...

01.12.2025 08:27 👍 1 🔁 0 💬 0 📌 0
Preview
Perspektive: Ein Cyber Dome made in Germany? Innenminister Alexander Dobrindt (CSU) hat einen deutschen „Cyber Dome“ vorgeschlagen. Was sich hinter dem Schlagwort verbirgt, ließ er jedoch offen. Richtig durchdacht und umgesetzt, könnte so ein Sc...

Ein Cyber Dome made in Germany? Ein paar Gedanken.

background.tagesspiegel.de/it-und-cyber...

25.09.2025 07:40 👍 0 🔁 0 💬 0 📌 0
Post image

Sneak peek into our upcoming paper on [working title]:

Assessing Irresponsibility in Cyber Operations
A Guide for Operators and Decision-Makers in Times of Strategic Competition

#cybersecurity #PRC #China #CyberOperations

25.09.2025 07:39 👍 0 🔁 0 💬 0 📌 0
Hackback: Digitale Selbstverteidigung oder gefährliches Spiel mit dem Feuer?
Hackback: Digitale Selbstverteidigung oder gefährliches Spiel mit dem Feuer? YouTube video by Cybersecurity ist Chefsache

Im Podcast "Cybersecurity ist Chefsache" habe ich mit Nico über Aktive Cyberabwehr in Deutschland gesprochen.

Hier geht es zum Podcast: www.youtube.com/watch?v=g6SP...

03.03.2025 12:39 👍 1 🔁 0 💬 0 📌 0
Preview
Backdoor found in two healthcare patient monitors, linked to IP in China The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient...

One person's backdoor is another person's fucked up update mechanism connecting to a random university's server in #China.

Oh #cybersecurity, you never seize to amaze me.

www.bleepingcomputer.com/news/securit...

12.02.2025 09:01 👍 1 🔁 0 💬 0 📌 0
Post image

Update about #offensive #Chinese #cyber activities.

Mastodon: infosec.exchange/@z_edian/113...

LinkedIn: www.linkedin.com/posts/dr-sve...

#cybersecurity #PRC #China #threat #APT

23.12.2024 12:31 👍 0 🔁 0 💬 0 📌 0
Post image

Aus der Tagesspiegel Background Cybersecurity-Reihe "Cybersicherheit - Forschung & Behörden: Was 2024 wichtig war – und wir uns für 2025 vornehmen sollten".

Link (Paywall): background.tagesspiegel.de/it-und-cyber...

19.12.2024 09:01 👍 0 🔁 0 💬 0 📌 0
Post image

Ein Bild sagt mehr als 1.000 Policy-Texte ...

www.bundesrechnungshof.de/SharedDocs/D...

12.12.2024 13:25 👍 0 🔁 0 💬 0 📌 0
Post image

Chinese APTs Behaving Badly

"We have no idea why attackers would do this or what benefit they would get from torching their victims’ infrastructure."

Via news.risky.biz/fcc-to-deman...

12.12.2024 11:36 👍 0 🔁 0 💬 0 📌 1
Post image

Ein paar kurze Punkte zur neuen Formulierungshilfe zum NIS-2-Umsetzungs- und Cybersicherheitsstärkungsgesetzes (NIS2UmsuCG) basierend auf meiner schriftlichen Stellungnahme für die Sachverständigenanhörung im Innenausschuss.

www.linkedin.com/feed/update/...

12.12.2024 09:00 👍 0 🔁 0 💬 0 📌 0
Preview
U.S. officials urge Americans to use encrypted apps amid cyberattack that exposed live phone calls Officials from the FBI and CISA said it was impossible to predict when the telecommunications companies would be fully safe from interlopers.

From now on, every time there is a new proposal to backdoor e2ee apps, we're just going to point to this, right?

www.nbcnews.com/tech/securit...

04.12.2024 01:35 👍 393 🔁 150 💬 11 📌 10

Thank you for all the support!

04.12.2024 12:27 👍 1 🔁 0 💬 0 📌 0
Post image

Hot off the virtual press: our new publication, 'Vulnerability Disclosure: Guiding Governments from Norm to Action', is now available!

Check it out here:: www.interface-eu.org/publications...

#cybersecurity #vulnerability #disclosure

04.12.2024 11:54 👍 1 🔁 0 💬 0 📌 2
Post image

Noch einmal schlafen ;)

02.12.2024 20:42 👍 3 🔁 1 💬 0 📌 0

Hey everyone, INC Ransom has added A CHILDREN’S HOSPITAL to their list of victims.

Your periodic reminder that people who carry out ransomware attacks are worthless pieces of shit who deserve no mercy.

28.11.2024 17:03 👍 36 🔁 13 💬 0 📌 3
Preview
Securing AI Lessons from cybersecurity

"Governments could build collaborative programs that bring together AI research institutions and cybersecurity researchers to ensure adequate expertise is dedicated to identifying and remediating security vulnerabilities."

www.aipolicyperspectives.com/p/securing-ai

#AI #vulnerabilities

28.11.2024 09:32 👍 0 🔁 0 💬 0 📌 0
From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Posted by the Big Sleep team Introduction In our previous post, Project Naptime: Evaluating Offensive Security Capabilities of Large L...

"We believe this is the first public example of an AI agent finding a previously unknown exploitable memory-safety issue in widely used real-world software."

googleprojectzero.blogspot.com/2024/10/from...

#cybersecurity #machinelearning #AI #vulnerabilities

28.11.2024 09:29 👍 0 🔁 0 💬 0 📌 0
Engaging with Security Researchers: Embracing a “See Something, Say Something” Culture | CISA

"To protect our nation’s digital infrastructure, we must adopt a “See Something, Say Something” mindset in #cybersecurity. When researchers report #vulnerabilities or evidence of breaches, organizations should engage them as partners rather than adversaries."

www.cisa.gov/news-events/...

28.11.2024 09:08 👍 1 🔁 0 💬 0 📌 0
Orange Cyberdefense CERT Threat Research: The hidden network map

"Between 2023 and 2024, more than 35 advisories [...] concerned zero-day vulnerabilities exploited by Chinese threat actors. These account for 41% of all advisories with a high or very high threat level"

research.cert.orangecyberdefense.com/hidden-netwo...

#Cybersecurity #China #Vulnerabilities

28.11.2024 09:05 👍 0 🔁 1 💬 0 📌 0
Preview
The PLA's Cyber Operations Go Dark Your weekly dose of Seriously Risky Business news is written by Tom Uren and edited by Patrick Gray. It's supported by Lawfare with help from the William and Flora Hewlett Foundation.  You can hear a...

"Rapid exploitation of 0day vulnerabilities is the new normal"

news.risky.biz/the-plas-cyb...

#Vulnerabilities #Cybersecurity #CVD #0Day

28.11.2024 09:01 👍 0 🔁 0 💬 0 📌 0
Preview
The PLA's Cyber Operations Go Dark Your weekly dose of Seriously Risky Business news is written by Tom Uren and edited by Patrick Gray. It's supported by Lawfare with help from the William and Flora Hewlett Foundation.  You can hear a...

"Nowadays, the MSS is the big kahuna and, since 2021, has been linked to the majority of cyber operations attributed to the PRC."

"PLA has been retasked to directly support military operations."

news.risky.biz/the-plas-cyb...

#China #Cybersecurity #CyberCampaigns

28.11.2024 08:59 👍 1 🔁 0 💬 0 📌 0
Preview
China's Liminal Panda APT Attacks Telcos, Steals Data In US Senate testimony, a CrowdStrike exec explained how this advanced persistent threat penetrated telcos in Asia and Africa, gathering SMS messages, unique identifiers, and other metadata along the ...

"Liminal Panda, an advanced persistent threat (APT) hyper-focused on gathering intelligence from telecommunications networks."

www.darkreading.com/threat-intel...

#China #Cybersecurity #APT

28.11.2024 08:54 👍 0 🔁 0 💬 0 📌 0
Preview
Introduction to Investigative Journalism: Digital Security Digital security may seem a little daunting at first, but increased security will help investigative journalists build trust with — and protect — current and future sources.

I wrote a very timely introduction to digital security for journalists for @gijn.org, this guidance may also apply to activists, lawyers, and anyone else doing at-risk work these days. gijn.org/resource/int...

27.11.2024 11:39 👍 159 🔁 77 💬 8 📌 9

If you're afraid of the NSA or some Russian group abusing vulnerabilities on your computer, think again.

Game developers are the real threats, and they'll proudly boast about installing rootkits on your system; just so they can make sure that their games run at 15FPS.

25.11.2024 18:29 👍 14 🔁 4 💬 1 📌 0

Hosting "my" first #UnitedNations side event in #NewYork in Dec 3. Topic: #Vulnerability Disclosure.

Big thank you to our partners, the @cyberseccenter.bsky.social and the German Ministry of Foreign Affairs.

More info: unodaweb-meetings.unoda.org/public/2024-...

#cybersecurity

24.11.2024 12:13 👍 1 🔁 1 💬 0 📌 0
Preview
Dr. Sven Herpig on LinkedIn: UPDATE: Mitgliedschaft von interface im Nationalen… UPDATE: Mitgliedschaft von interface im Nationalen Cyber-Sicherheitsrat Ich freue mich darüber, dass sich die Mitglieder des Nationalen Cyber-Sicherheitsrats…

interface ist jetzt permanentes Mitglied im Nationalen Cyber-Sicherheitsrat.

Mehr Infos: www.linkedin.com/posts/dr-sve...

21.11.2024 17:20 👍 0 🔁 0 💬 0 📌 0
From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Posted by the Big Sleep team Introduction In our previous post, Project Naptime: Evaluating Offensive Security Capabilities of Large L...

If you've missed #BigSleep on other platforms:

Project Zero blog:
LLMs find 0days now!

And: our fuzzer setup did *not* reproduce it!
googleprojectzero.blogspot.com/2024/10/from...

20.11.2024 18:21 👍 21 🔁 4 💬 0 📌 0
About Apple threat notifications and protecting against mercenary spyware - Apple Support Apple threat notifications are designed to inform and assist users who may have been individually targeted by mercenary spyware.

If you're part of civil society and received an Apple notification. The Amnesty Security Lab would be happy to test your phone!

The Apple notification looks like this: support.apple.com/en-us/102174

The Security Lab can be contacted here: securitylab.amnesty.org/get-help/

20.11.2024 12:50 👍 28 🔁 25 💬 0 📌 0
Preview
Exclusive: CrowdStrike finds that yet another China-linked hacking group is targeting telecom networks The discovery comes as the U.S. responds to a sprawling China hack of officials' phones.

CrowdStrike has identified a new China hacking group that's been targeting telecom networks since at least 2020.

The group has primarily targeted networks in SE Asia and Africa — but it also have the ability to use their access to breach other networks.

www.axios.com/2024/11/19/c...

19.11.2024 16:57 👍 28 🔁 18 💬 2 📌 3