๐ This was Binding Hook Live โ a day filled with incredible conversations and discussions on and off stage. Read more insights from Binding Hook Live by our Managing Editors James Shires and @maxwsmeets.bsky.social: bindinghook.com/insights-fro...
๐๏ธ youtu.be/MOr-eZ_IJfo?...
Posts by Max Smeets
๐จ #BindingHookLive tickets are going fast! ๐จ A little over a month to go until the very first Binding Hook Live! Don't miss the chance to be part of this one-of-a-kind event featuring a fantastic line-up of expert speakers. ๐๏ธ Request your invite: bindinghooklive.com
๐ญ Introducing #AI over Lunch - a new interview series exploring how leaders across sectors are grappling with the opportunities and risks of artificial intelligence. Read the first interview with #NATO CIO Manfred Boudreaux-Dehmer: virtual-routes.org/ai-over-lunc...
Where is #AI really shaping #ransomware โ and where is it just hype? Join experts โชโชCiaran Martin, Jamie MacColl, Will Thomas, Taylor Grossman & Max Smeets as they discuss AIโs role in ransomware. ๐ To join, register as a member: docs.google.com/forms/d/e/1F...
I've been thinking a lot about @maxwsmeets.bsky.social Ransomware Trust Paradox and how I think it's breaking. My analysis below (btw: if you haven't you should buy Max's book).
With more writers joining and more readers returning, we felt it was time for a better space. Our new @bindinghook.bsky.social website is now live! bindinghook.com
#PublicAttribution of cyber activities is #Chinaโs latest technique for pressuring #Taiwan and shaping the international dialogue around #cybersecurity. @benread.bsky.social digs into the details on Binding Hook: bindinghook.com/articles-hoo...
New from me: China has been ramping up its public attribution against Taiwan, likely in an attempt to shift the conversation on cyber intrusions and pressure the island and they're using their private sector cybersecurity companies to do it. Read the piece, but a few highlights, take aways in this ๐งต
The increasingly popular narrative that #AIthreats need to be fought with #AIsecuritysolutions fall short upon closer inspection, argue @virtualroutes.bsky.socialโs Jamie Collier and @maxwsmeets.bsky.social in their latest: bindinghook.com/articles-bin...
mailchi.mp/bindinghook....
Our #CyCon2025 #ransomware workshop, now in video! ๐๏ธ Watch the recap and join us for a quick trip back to Tallinn. ๐ @maxwsmeets.bsky.social @jamesshires.bsky.social www.youtube.com/watch?v=gb7G...
๐๏ธ The new episode of the @sansinstitute.bsky.social #CyberLeadersPodcast featuring @maxwsmeets.bsky.social is out now! Have a listen: sans.org/u/1Bxx
Gijs van Loon, Apolline Rolland, @jamesshires.bsky.social, and @maxwsmeets.bsky.social call for increased action from the EU to support and protect European drinking- and wastewater utilities. bindinghook.com/articles-bin...
On Lawfare Daily, @jshermcyber.bsky.social and Jonathan Cedarbaum spoke to @maxwsmeets.bsky.social about his book โRansom War,โ the history of ransomware, how the threats have evolved, and some of the major drivers of innovation within the ecosystem. www.lawfaremedia.org/article/lawf...
I enjoyed joining James Lyne and @ciaranm.bsky.social on the Cyber Leaders podcast. It was both fun and useful to discuss state and criminal cyber activity in one episode - and to explore where the two intersect.
www.sans.org/podcasts/cyb...
bindinghooklive.com
Ransom War is now available as an audiobook! www.amazon.com/Ransom-War-B...
โฐ Hurry up - only 1๏ธโฃ week left until the deadline! ๐ Submit your Lightning Talk proposal by May 31: bindinghooklive.com
Updates to our speakers list! Looking forward to the talks by Mattijs Dijkstra & Zawadi Done (@huntandhackett.com), @joshagoldstein.bsky.social (Georgetown's CSET), & @maxwsmeets.bsky.social (@virtualroutes.bsky.social + @ethz.ch). Registration closing 1 June: www.thehagueprogram.nl/the-hague-ti...
Het aantal gerichte taps door de #AIVD is de laatste 5 jaar aanzienlijk gedaald, daarentegen is het aantal taps door de #MIVD de afgelopen twee jaar geรซxplodeerd:
Excited to be speaking at The Hague TIX this year. Great line up once again from @monicakello.bsky.social and team!
www.thehagueprogram.nl/the-hague-ti...
@virtualroutes.bsky.social is expanding the Google.org Cybersecurity Seminars program to the Netherlands, focusing on defending local communities against ransomware. Current university students can register interest now virtual-routes.org/initiatives/...
We are excited to launch a new program in the Netherlands. The goal is to give students hands-on experience in cybersecurity, with courses like malware reverse engineering, digital forensics, and ransomware economics.
The arrest of a suspect after a spate of #RansomwareAttacks in the Netherlands is an unusual win for law enforcement, but a more holistic approach is required. Read the new piece by @jamesshires.bsky.social and @maxwsmeets.bsky.social: bindinghook.com/articles-hoo...
โณ ๐ฆ๐๐ฏ๐บ๐ถ๐ ๐๐ผ๐๐ฟ ๐๐ถ๐ด๐ต๐๐ป๐ถ๐ป๐ด ๐ง๐ฎ๐น๐ธ ๐ณ๐ผ๐ฟ ๐๐ถ๐ป๐ฑ๐ถ๐ป๐ด ๐๐ผ๐ผ๐ธ ๐๐ถ๐๐ฒ ๐ฏ๐ ๐ ๐ฎ๐ ๐ฏ๐ญ, ๐ฎ๐ฌ๐ฎ๐ฑ!
We're looking for talks on:
๐ Cyber & AI
๐ Surveillance
๐ Info ops
๐ Critical infra
๐ Cybercrime and more
โ
If accepted youโll receive a ๐ณ๐ฟ๐ฒ๐ฒ ๐๐ถ๐ฐ๐ธ๐ฒ๐ to the event and a ยฃ๐ฑ๐ฌ๐ฌ ๐ต๐ผ๐ป๐ผ๐ฟ๐ฎ๐ฟ๐ถ๐๐บ.
๐ ๐ฆ๐๐ฏ๐บ๐ถ๐ ๐๐ผ๐๐ฟ ๐ฝ๐ฟ๐ผ๐ฝ๐ผ๐๐ฎ๐น: bindinghooklive.com
The G7 Cybersec Working Group has finally put nat cyber agencies in one room to align on critical infra and AI safeguards. Now let us see if a small task force can truly overcome the deep institutional silos that have long slowed collective cyber security/defense:
bindinghook.com/articles-hoo...
One month left to submit a proposal for a Lightning Talk at Binding Hook Live. 10-minute presentations that should fit the same editorial scope as Binding Hook. We are interested in how digital and emerging technologies shape security.
bindinghooklive.com
Published a new Pharos report today - and learned a lot in the process from @milenkowski.bsky.social Jiro, @julianferdinand.bsky.social @tgrossman.bsky.social. The report takes a closer look at how states are using ransomware.
virtual-routes.org/wp-content/u...
North Koreaโs financially driven approach, embedding itself deep within the ecosystem, is also striking. And then there is Iran.. which may be the most versatile in its use. We found it harder to pin down, but much of it mirrors their hacktivist tactics with wipers, offering a similar kind of cover.