Advertisement · 728 × 90

Posts by Sven Herpig

Golem

Chinesische #Cyberkriminelle gehören weltweit zu den technisch fähigsten. Teilweise verzahnt mit staatlichen Stellen sind ihre Aktivitäten oft Teil eines Ökosystems aus Kriminalität und Wirtschaftsspionage. #cybercrime #China @z-edian.bsky.social www.golem.de/news/chinesi... (mit Testabo)

2 months ago 2 1 0 0
Post image

Policy Paper on “Assessing Irresponsibility in Cyber Operations” now published.

It introduces a “seven-red-flags” framework designed to help decision-makers & operators assess when cyber activities cross the line into irresponsible or unacceptable behavior.

www.interface-eu.org/publications...

4 months ago 1 0 0 0
Preview
Perspektive: Ein Cyber Dome made in Germany? Innenminister Alexander Dobrindt (CSU) hat einen deutschen „Cyber Dome“ vorgeschlagen. Was sich hinter dem Schlagwort verbirgt, ließ er jedoch offen. Richtig durchdacht und umgesetzt, könnte so ein Sc...

Ein Cyber Dome made in Germany? Ein paar Gedanken.

background.tagesspiegel.de/it-und-cyber...

6 months ago 0 0 0 0
Post image

Sneak peek into our upcoming paper on [working title]:

Assessing Irresponsibility in Cyber Operations
A Guide for Operators and Decision-Makers in Times of Strategic Competition

#cybersecurity #PRC #China #CyberOperations

6 months ago 0 0 0 0
Hackback: Digitale Selbstverteidigung oder gefährliches Spiel mit dem Feuer?
Hackback: Digitale Selbstverteidigung oder gefährliches Spiel mit dem Feuer? YouTube video by Cybersecurity ist Chefsache

Im Podcast "Cybersecurity ist Chefsache" habe ich mit Nico über Aktive Cyberabwehr in Deutschland gesprochen.

Hier geht es zum Podcast: www.youtube.com/watch?v=g6SP...

1 year ago 1 0 0 0
Preview
Backdoor found in two healthcare patient monitors, linked to IP in China The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient...

One person's backdoor is another person's fucked up update mechanism connecting to a random university's server in #China.

Oh #cybersecurity, you never seize to amaze me.

www.bleepingcomputer.com/news/securit...

1 year ago 1 0 0 0
Post image

Update about #offensive #Chinese #cyber activities.

Mastodon: infosec.exchange/@z_edian/113...

LinkedIn: www.linkedin.com/posts/dr-sve...

#cybersecurity #PRC #China #threat #APT

1 year ago 0 0 0 0
Advertisement
Post image

Aus der Tagesspiegel Background Cybersecurity-Reihe "Cybersicherheit - Forschung & Behörden: Was 2024 wichtig war – und wir uns für 2025 vornehmen sollten".

Link (Paywall): background.tagesspiegel.de/it-und-cyber...

1 year ago 0 0 0 0
Post image

Ein Bild sagt mehr als 1.000 Policy-Texte ...

www.bundesrechnungshof.de/SharedDocs/D...

1 year ago 0 0 0 0
Post image

Chinese APTs Behaving Badly

"We have no idea why attackers would do this or what benefit they would get from torching their victims’ infrastructure."

Via news.risky.biz/fcc-to-deman...

1 year ago 0 0 0 1
Post image

Ein paar kurze Punkte zur neuen Formulierungshilfe zum NIS-2-Umsetzungs- und Cybersicherheitsstärkungsgesetzes (NIS2UmsuCG) basierend auf meiner schriftlichen Stellungnahme für die Sachverständigenanhörung im Innenausschuss.

www.linkedin.com/feed/update/...

1 year ago 0 0 0 0
Preview
U.S. officials urge Americans to use encrypted apps amid cyberattack that exposed live phone calls Officials from the FBI and CISA said it was impossible to predict when the telecommunications companies would be fully safe from interlopers.

From now on, every time there is a new proposal to backdoor e2ee apps, we're just going to point to this, right?

www.nbcnews.com/tech/securit...

1 year ago 393 150 11 10

Thank you for all the support!

1 year ago 1 0 0 0
Post image

Hot off the virtual press: our new publication, 'Vulnerability Disclosure: Guiding Governments from Norm to Action', is now available!

Check it out here:: www.interface-eu.org/publications...

#cybersecurity #vulnerability #disclosure

1 year ago 1 0 0 2
Post image

Noch einmal schlafen ;)

1 year ago 3 1 0 0

Hey everyone, INC Ransom has added A CHILDREN’S HOSPITAL to their list of victims.

Your periodic reminder that people who carry out ransomware attacks are worthless pieces of shit who deserve no mercy.

1 year ago 36 13 0 3
Preview
Securing AI Lessons from cybersecurity

"Governments could build collaborative programs that bring together AI research institutions and cybersecurity researchers to ensure adequate expertise is dedicated to identifying and remediating security vulnerabilities."

www.aipolicyperspectives.com/p/securing-ai

#AI #vulnerabilities

1 year ago 0 0 0 0
Advertisement
From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Posted by the Big Sleep team Introduction In our previous post, Project Naptime: Evaluating Offensive Security Capabilities of Large L...

"We believe this is the first public example of an AI agent finding a previously unknown exploitable memory-safety issue in widely used real-world software."

googleprojectzero.blogspot.com/2024/10/from...

#cybersecurity #machinelearning #AI #vulnerabilities

1 year ago 0 0 0 0
Engaging with Security Researchers: Embracing a “See Something, Say Something” Culture | CISA

"To protect our nation’s digital infrastructure, we must adopt a “See Something, Say Something” mindset in #cybersecurity. When researchers report #vulnerabilities or evidence of breaches, organizations should engage them as partners rather than adversaries."

www.cisa.gov/news-events/...

1 year ago 1 0 0 0
Orange Cyberdefense CERT Threat Research: The hidden network map

"Between 2023 and 2024, more than 35 advisories [...] concerned zero-day vulnerabilities exploited by Chinese threat actors. These account for 41% of all advisories with a high or very high threat level"

research.cert.orangecyberdefense.com/hidden-netwo...

#Cybersecurity #China #Vulnerabilities

1 year ago 0 1 0 0
Preview
The PLA's Cyber Operations Go Dark Your weekly dose of Seriously Risky Business news is written by Tom Uren and edited by Patrick Gray. It's supported by Lawfare with help from the William and Flora Hewlett Foundation.  You can hear a...

"Rapid exploitation of 0day vulnerabilities is the new normal"

news.risky.biz/the-plas-cyb...

#Vulnerabilities #Cybersecurity #CVD #0Day

1 year ago 0 0 0 0
Preview
The PLA's Cyber Operations Go Dark Your weekly dose of Seriously Risky Business news is written by Tom Uren and edited by Patrick Gray. It's supported by Lawfare with help from the William and Flora Hewlett Foundation.  You can hear a...

"Nowadays, the MSS is the big kahuna and, since 2021, has been linked to the majority of cyber operations attributed to the PRC."

"PLA has been retasked to directly support military operations."

news.risky.biz/the-plas-cyb...

#China #Cybersecurity #CyberCampaigns

1 year ago 1 0 0 0
Preview
China's Liminal Panda APT Attacks Telcos, Steals Data In US Senate testimony, a CrowdStrike exec explained how this advanced persistent threat penetrated telcos in Asia and Africa, gathering SMS messages, unique identifiers, and other metadata along the ...

"Liminal Panda, an advanced persistent threat (APT) hyper-focused on gathering intelligence from telecommunications networks."

www.darkreading.com/threat-intel...

#China #Cybersecurity #APT

1 year ago 0 0 0 0
Preview
Introduction to Investigative Journalism: Digital Security Digital security may seem a little daunting at first, but increased security will help investigative journalists build trust with — and protect — current and future sources.

I wrote a very timely introduction to digital security for journalists for @gijn.org, this guidance may also apply to activists, lawyers, and anyone else doing at-risk work these days. gijn.org/resource/int...

1 year ago 158 75 8 9

If you're afraid of the NSA or some Russian group abusing vulnerabilities on your computer, think again.

Game developers are the real threats, and they'll proudly boast about installing rootkits on your system; just so they can make sure that their games run at 15FPS.

1 year ago 14 4 1 0

Hosting "my" first #UnitedNations side event in #NewYork in Dec 3. Topic: #Vulnerability Disclosure.

Big thank you to our partners, the @cyberseccenter.bsky.social and the German Ministry of Foreign Affairs.

More info: unodaweb-meetings.unoda.org/public/2024-...

#cybersecurity

1 year ago 1 1 0 0
Preview
Dr. Sven Herpig on LinkedIn: UPDATE: Mitgliedschaft von interface im Nationalen… UPDATE: Mitgliedschaft von interface im Nationalen Cyber-Sicherheitsrat Ich freue mich darüber, dass sich die Mitglieder des Nationalen Cyber-Sicherheitsrats…

interface ist jetzt permanentes Mitglied im Nationalen Cyber-Sicherheitsrat.

Mehr Infos: www.linkedin.com/posts/dr-sve...

1 year ago 0 0 0 0
Advertisement
From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Posted by the Big Sleep team Introduction In our previous post, Project Naptime: Evaluating Offensive Security Capabilities of Large L...

If you've missed #BigSleep on other platforms:

Project Zero blog:
LLMs find 0days now!

And: our fuzzer setup did *not* reproduce it!
googleprojectzero.blogspot.com/2024/10/from...

1 year ago 21 4 0 0
About Apple threat notifications and protecting against mercenary spyware - Apple Support Apple threat notifications are designed to inform and assist users who may have been individually targeted by mercenary spyware.

If you're part of civil society and received an Apple notification. The Amnesty Security Lab would be happy to test your phone!

The Apple notification looks like this: support.apple.com/en-us/102174

The Security Lab can be contacted here: securitylab.amnesty.org/get-help/

1 year ago 28 24 0 0
Preview
Exclusive: CrowdStrike finds that yet another China-linked hacking group is targeting telecom networks The discovery comes as the U.S. responds to a sprawling China hack of officials' phones.

CrowdStrike has identified a new China hacking group that's been targeting telecom networks since at least 2020.

The group has primarily targeted networks in SE Asia and Africa — but it also have the ability to use their access to breach other networks.

www.axios.com/2024/11/19/c...

1 year ago 28 18 2 3