Golem
Chinesische #Cyberkriminelle gehören weltweit zu den technisch fähigsten. Teilweise verzahnt mit staatlichen Stellen sind ihre Aktivitäten oft Teil eines Ökosystems aus Kriminalität und Wirtschaftsspionage. #cybercrime #China @z-edian.bsky.social www.golem.de/news/chinesi... (mit Testabo)
10.02.2026 15:52
👍 2
🔁 1
💬 0
📌 0
Policy Paper on “Assessing Irresponsibility in Cyber Operations” now published.
It introduces a “seven-red-flags” framework designed to help decision-makers & operators assess when cyber activities cross the line into irresponsible or unacceptable behavior.
www.interface-eu.org/publications...
01.12.2025 08:27
👍 1
🔁 0
💬 0
📌 0
Sneak peek into our upcoming paper on [working title]:
Assessing Irresponsibility in Cyber Operations
A Guide for Operators and Decision-Makers in Times of Strategic Competition
#cybersecurity #PRC #China #CyberOperations
25.09.2025 07:39
👍 0
🔁 0
💬 0
📌 0
Hackback: Digitale Selbstverteidigung oder gefährliches Spiel mit dem Feuer?
YouTube video by Cybersecurity ist Chefsache
Im Podcast "Cybersecurity ist Chefsache" habe ich mit Nico über Aktive Cyberabwehr in Deutschland gesprochen.
Hier geht es zum Podcast: www.youtube.com/watch?v=g6SP...
03.03.2025 12:39
👍 1
🔁 0
💬 0
📌 0
Update about #offensive #Chinese #cyber activities.
Mastodon: infosec.exchange/@z_edian/113...
LinkedIn: www.linkedin.com/posts/dr-sve...
#cybersecurity #PRC #China #threat #APT
23.12.2024 12:31
👍 0
🔁 0
💬 0
📌 0
Aus der Tagesspiegel Background Cybersecurity-Reihe "Cybersicherheit - Forschung & Behörden: Was 2024 wichtig war – und wir uns für 2025 vornehmen sollten".
Link (Paywall): background.tagesspiegel.de/it-und-cyber...
19.12.2024 09:01
👍 0
🔁 0
💬 0
📌 0
Ein Bild sagt mehr als 1.000 Policy-Texte ...
www.bundesrechnungshof.de/SharedDocs/D...
12.12.2024 13:25
👍 0
🔁 0
💬 0
📌 0
Chinese APTs Behaving Badly
"We have no idea why attackers would do this or what benefit they would get from torching their victims’ infrastructure."
Via news.risky.biz/fcc-to-deman...
12.12.2024 11:36
👍 0
🔁 0
💬 0
📌 1
Ein paar kurze Punkte zur neuen Formulierungshilfe zum NIS-2-Umsetzungs- und Cybersicherheitsstärkungsgesetzes (NIS2UmsuCG) basierend auf meiner schriftlichen Stellungnahme für die Sachverständigenanhörung im Innenausschuss.
www.linkedin.com/feed/update/...
12.12.2024 09:00
👍 0
🔁 0
💬 0
📌 0
Thank you for all the support!
04.12.2024 12:27
👍 1
🔁 0
💬 0
📌 0
Hot off the virtual press: our new publication, 'Vulnerability Disclosure: Guiding Governments from Norm to Action', is now available!
Check it out here:: www.interface-eu.org/publications...
#cybersecurity #vulnerability #disclosure
04.12.2024 11:54
👍 1
🔁 0
💬 0
📌 2
Noch einmal schlafen ;)
02.12.2024 20:42
👍 3
🔁 1
💬 0
📌 0
Hey everyone, INC Ransom has added A CHILDREN’S HOSPITAL to their list of victims.
Your periodic reminder that people who carry out ransomware attacks are worthless pieces of shit who deserve no mercy.
28.11.2024 17:03
👍 36
🔁 13
💬 0
📌 3
Securing AI
Lessons from cybersecurity
"Governments could build collaborative programs that bring together AI research institutions and cybersecurity researchers to ensure adequate expertise is dedicated to identifying and remediating security vulnerabilities."
www.aipolicyperspectives.com/p/securing-ai
#AI #vulnerabilities
28.11.2024 09:32
👍 0
🔁 0
💬 0
📌 0
Engaging with Security Researchers: Embracing a “See Something, Say Something” Culture | CISA
"To protect our nation’s digital infrastructure, we must adopt a “See Something, Say Something” mindset in #cybersecurity. When researchers report #vulnerabilities or evidence of breaches, organizations should engage them as partners rather than adversaries."
www.cisa.gov/news-events/...
28.11.2024 09:08
👍 1
🔁 0
💬 0
📌 0
Orange Cyberdefense CERT Threat Research: The hidden network map
"Between 2023 and 2024, more than 35 advisories [...] concerned zero-day vulnerabilities exploited by Chinese threat actors. These account for 41% of all advisories with a high or very high threat level"
research.cert.orangecyberdefense.com/hidden-netwo...
#Cybersecurity #China #Vulnerabilities
28.11.2024 09:05
👍 0
🔁 1
💬 0
📌 0
The PLA's Cyber Operations Go Dark
Your weekly dose of Seriously Risky Business news is written by Tom Uren and edited by Patrick Gray. It's supported by Lawfare with help from the William and Flora Hewlett Foundation.
You can hear a...
"Nowadays, the MSS is the big kahuna and, since 2021, has been linked to the majority of cyber operations attributed to the PRC."
"PLA has been retasked to directly support military operations."
news.risky.biz/the-plas-cyb...
#China #Cybersecurity #CyberCampaigns
28.11.2024 08:59
👍 1
🔁 0
💬 0
📌 0
If you're afraid of the NSA or some Russian group abusing vulnerabilities on your computer, think again.
Game developers are the real threats, and they'll proudly boast about installing rootkits on your system; just so they can make sure that their games run at 15FPS.
25.11.2024 18:29
👍 14
🔁 4
💬 1
📌 0
Hosting "my" first #UnitedNations side event in #NewYork in Dec 3. Topic: #Vulnerability Disclosure.
Big thank you to our partners, the @cyberseccenter.bsky.social and the German Ministry of Foreign Affairs.
More info: unodaweb-meetings.unoda.org/public/2024-...
#cybersecurity
24.11.2024 12:13
👍 1
🔁 1
💬 0
📌 0
About Apple threat notifications and protecting against mercenary spyware - Apple Support
Apple threat notifications are designed to inform and assist users who may have been individually targeted by mercenary spyware.
If you're part of civil society and received an Apple notification. The Amnesty Security Lab would be happy to test your phone!
The Apple notification looks like this: support.apple.com/en-us/102174
The Security Lab can be contacted here: securitylab.amnesty.org/get-help/
20.11.2024 12:50
👍 28
🔁 25
💬 0
📌 0
Exclusive: CrowdStrike finds that yet another China-linked hacking group is targeting telecom networks
The discovery comes as the U.S. responds to a sprawling China hack of officials' phones.
CrowdStrike has identified a new China hacking group that's been targeting telecom networks since at least 2020.
The group has primarily targeted networks in SE Asia and Africa — but it also have the ability to use their access to breach other networks.
www.axios.com/2024/11/19/c...
19.11.2024 16:57
👍 28
🔁 18
💬 2
📌 3