lade...
random avatar

z_edian - Network

Posts Subscribe

On March 26, I will speak with @thegrugq about all-things-cyber-military-Europe.Come join...

https://infosec.exchange/@z_edia...

On March 26, I will speak with @thegrugq about all-things-cyber-military-Europe.

Come join us!

interface-eu.org/events/the-fu

12.3.2025 07:20On March 26, I will speak with @thegrugq about all-things-cyber-military-Europe.Come join...
https://infosec.exchange/@z_edia...

Im Podcast "Cybersecurity ist Chefsache" habe ich mit Nico über Aktive Cyberabwehr in Deutschland gesprochen.Hier geht es zum...

https://infosec.exchange/@z_edia...

Im Podcast "Cybersecurity ist Chefsache" habe ich mit Nico über Aktive Cyberabwehr in Deutschland gesprochen.

Hier geht es zum Podcast: youtube.com/watch?v=g6SP9uClPII

3.3.2025 12:41Im Podcast "Cybersecurity ist Chefsache" habe ich mit Nico über Aktive Cyberabwehr in Deutschland gesprochen.Hier geht es zum...
https://infosec.exchange/@z_edia...

Some people call it "large-scale compromise of telcommunication infrastructure", I would rather see it as "externally-forced...

https://infosec.exchange/@z_edia...

Some people call it "large-scale compromise of telcommunication infrastructure", I would rather see it as "externally-forced upgrade of legacy IT-infrastructure".

"Warner said that replacing aging and vulnerable networking equipment could cost the telecom companies tens of billions, while evicting the Chinese from every nook and cranny inside the nation's sprawling phone system could take "50,000 people and a complete shutdown of the network for 12 hours."

news.risky.biz/why-america-nee

20.2.2025 09:04Some people call it "large-scale compromise of telcommunication infrastructure", I would rather see it as "externally-forced...
https://infosec.exchange/@z_edia...

One person's backdoor is another person's fucked up update mechanism connecting to a random university's server in #China Oh...

https://infosec.exchange/@z_edia...

One person's backdoor is another person's fucked up update mechanism connecting to a random university's server in

Oh , you never seize to amaze me.

# # #
"Although the full update process is VERY dangerous and risky, to us it does not appear to have malicious intent behind it, especially when considering the manual boldly refers to this IP address, and white-label vendors ask users to configure their internal CMS with this IP address."

However, as the IP address specified in the manual is a public address in China, it could lead to inadvertent data leaks and takeover risks if an NFS server is running. Currently, no NFS server is configured at this IP address.
# # #

bleepingcomputer.com/news/secu

12.2.2025 09:00One person's backdoor is another person's fucked up update mechanism connecting to a random university's server in #China Oh...
https://infosec.exchange/@z_edia...

On January 15, I returned to the place, where my career started almost to the day 15 years ago: the Konrad-Adenauer-Stiftung...

https://infosec.exchange/@z_edia...

On January 15, I returned to the place, where my career started almost to the day 15 years ago: the Konrad-Adenauer-Stiftung Philippines.

While 15 years ago, I was taken in as intern, this year I was honored to be the German counterpart on a panel about the potential of German-Philippine Defense Cooperation in the cyber domain. An idea that was discussed between Germany and the Philippines in 2024 with a defense agreement to be signed soon.

I explored that potential together with Dr. Francis Rico C. Domingo
Associate Professor at the Department of Political
Science, University of the Philippines Diliman and Director Christine June P. Cariño from the Office for Cyber and Information System Management, Department of National Defense.

My key points were:
1. Germany and the Philippines can explore a joint talent pipeline due to the German and EU need for an increasing IT security worforce as well as the Philippines' hacker talent and experience on Oversea Filipino Worker (OFW) policy.
2. If the Philippines identifies architectural and policy requirements, Germany could share best practices and failures in its vast experience of shaping a cybersecurity architecture and policy ecosystem.
3. Germany and the Philippines could work towards intelligence exchange with a special focus on a shared adversary: Chinese threat actors and cyber campaigns.

As this is an issue close to my hear, I really hope that there will be a fruitful, effective and operational cooperation between our two countries in the future.

Maraming Salamat.

23.1.2025 09:06On January 15, I returned to the place, where my career started almost to the day 15 years ago: the Konrad-Adenauer-Stiftung...
https://infosec.exchange/@z_edia...

Update about offensive Chinese cyber activities.1. US sanctions Chinese actors over cybersecurity incidents"A Chinese hacker indicted...

https://infosec.exchange/@z_edia...

Update about offensive Chinese cyber activities.

1. US sanctions Chinese actors over cybersecurity incidents
"A Chinese hacker indicted [...] and the PRC-based cybersecurity company [Sichuan Silence] he worked for are both sanctioned by the US government for compromising “tens of thousands of firewalls”

Link: cybernews.com/security/doj-ind

2. Deep Dive: Sichuan Silence Information Technology
"Overall, from what we have discovered, the operations of Sichuan Silence are similar to those of i-SOON and other similar Chinese hacker-for-hire companies."

Link: nattothoughts.substack.com/p/s

3. NSA's take on Volt Typhoon
"He said China is “very focused on building a whole suite of capabilities to deter and defeat the United States, and so Volt Typhoon, these operations that target infrastructure, there really is no kind of reasonable explanation besides pre-positioning. […] It’s really part of a broader military strategy.”"

Link: breakingdefense.com/2024/08/ns

4. NCSC's take on China as cyber threat actor
"“China continues to be a highly sophisticated and capable threat actor, targeting a wide range of sectors and institutions across the globe, including in the UK.”

Link: ctoatncsc.substack.com/p/cto-a

5. Deep Dive: Mei Danowski and Eugenio Benincasa on China’s Cyber-Range Exercises
"When looking at the Chinese ecosystem, they empasize a lot attack-defense and practical skills unlike us in Europe or the US."

Link: cybersecurityadvisors.network/

23.12.2024 12:28Update about offensive Chinese cyber activities.1. US sanctions Chinese actors over cybersecurity incidents"A Chinese hacker indicted...
https://infosec.exchange/@z_edia...

Aus der Tagesspiegel Background Cybersecurity-Reihe "Cybersicherheit -Forschung & Behörden: Was 2024 wichtig war – und wir uns...

https://infosec.exchange/@z_edia...

Aus der Tagesspiegel Background Cybersecurity-Reihe "Cybersicherheit -
Forschung & Behörden: Was 2024 wichtig war – und wir uns für 2025 vornehmen sollten".

Link (Paywall): background.tagesspiegel.de/it-

19.12.2024 09:00Aus der Tagesspiegel Background Cybersecurity-Reihe "Cybersicherheit -Forschung & Behörden: Was 2024 wichtig war – und wir uns...
https://infosec.exchange/@z_edia...

[Chinese] APTs Behaving Badly"We'd describe 'acceptable behaviour' as being targeted at national security rather than...

https://infosec.exchange/@z_edia...

[Chinese] APTs Behaving Badly

"We'd describe 'acceptable behaviour' as being targeted at national security rather than economic interests, carrying out proportionate operations and avoiding unnecessary harm to third parties. Many cyber actors, including the US and allies, generally adhere to these behaviours, but others, including Chinese actors, do not." 

[...]

"Mass deployment of malware is unacceptable because it causes unnecessary collateral damage — not the done thing for a responsible state program. To make matters worse, once Sophos had cottoned on to the intrusions, Guan and his colleagues allegedly altered their malware to make it more damaging, in a kind of scorched earth policy. If victims attempted to remove the malware, it would deploy encryption from the Ragnarok ransomware variant. We have no idea why attackers would do this or what benefit they would get from torching their victims’ infrastructure.."

Via @tomatospy - news.risky.biz/fcc-to-demand-t

12.12.2024 11:28[Chinese] APTs Behaving Badly"We'd describe 'acceptable behaviour' as being targeted at national security rather than...
https://infosec.exchange/@z_edia...

Ein paar kurze Punkte zur neuen Formulierungshilfe zum NIS-2-Umsetzungs- und Cybersicherheitsstärkungsgesetzes (NIS2UmsuCG)[1] basierend...

https://infosec.exchange/@z_edia...

Ein paar kurze Punkte zur neuen Formulierungshilfe zum NIS-2-Umsetzungs- und Cybersicherheitsstärkungsgesetzes (NIS2UmsuCG)[1] basierend auf meiner schriftlichen Stellungnahme für die Sachverständigenanhörung im Innenausschuss[2].

Die Umsetzung der Vorschläge aus der Formulierungshilfe würde zu einer deutlichen Nachbesserung des NIS2UmsuCG führen. Gerade bei zentralen Kritikpunkten, wie der Unabhängigkeit des BSI und der Ausgestaltung der CISO Bund Rolle (auch wenn Letzteres wohl nicht verfassungskonform wäre..?).

Bei den Themen Schwachstellenmanagement und Ausnahmen von IT-Sicherheitsanforderungen für Einrichtungen der (Bundes-)Verwaltung würde sich auch eine Nachbesserung ergeben – jedoch mit Einschränkungen. Beim Schwachstellenmanagement beziehen sich die Änderungen ausschließlich auf das BSI und nicht auf den Umgang mit Schwachstellen der anderen Sicherheitsbehörden (vgl. [2] u. a. Unterkapitel 2.2, sowie Einzelkritik zu §3 Abs. 1 (18) und §14) . Bei den IT-Sicherheitsanforderungen für die Einrichtungen der Verwaltung gäbe es noch immer weitgehende Ausnahmen für AA und BMVg, sowie für die Einrichtungen der Länder (vgl. [2] u. a. Unterkapitel 2.1, sowie Einzelkritik §3 Abs. 1 (17), §3 Abs. 1 (20), §6 Abs. 6, §29 Abs. 2).

Andere Kritikpunkte aus meiner Stellungnahme wurden nicht umgesetzt, darunter fallen:
1. zu breite Definitionen und die sich daraus ergebenden Probleme (vgl. [2] u. a. Einzelkritik §2 1 und 36)
2. zu eingeschränkter Empfängerkreis von Informationen und Instrumenten zur Steigerung der IT-Sicherheit (vgl. [2] u. a. Einzelkritik §3 Abs. 1 (17) und (20) und §19)
3. die mangelnde Effektivität der Schulungen mangels Erfolgsnachweis (vgl. [2] Einzelkritik §38 Abs. 3 und §43 Abs. 2) und des Freiwilligen IT-Sicherheitskennzeichens (vgl. [2] Einzelkritik §55).

[1] ag.kritis.info/2024/12/10/refe
[2] bundestag.de/resource/blob/102

12.12.2024 09:01Ein paar kurze Punkte zur neuen Formulierungshilfe zum NIS-2-Umsetzungs- und Cybersicherheitsstärkungsgesetzes (NIS2UmsuCG)[1] basierend...
https://infosec.exchange/@z_edia...

Hot off the virtual press: our new publication, 'Vulnerability Disclosure: Guiding Governments from Norm to Action', is now...

https://infosec.exchange/@z_edia...

Hot off the virtual press: our new publication, 'Vulnerability Disclosure: Guiding Governments from Norm to Action', is now available!

Check it out here: interface-eu.org/publications/

4.12.2024 11:55Hot off the virtual press: our new publication, 'Vulnerability Disclosure: Guiding Governments from Norm to Action', is now...
https://infosec.exchange/@z_edia...

TEASER: Policy paper coming very soon!

https://infosec.exchange/@z_edia...

TEASER: Policy paper coming very soon!

2.12.2024 20:41TEASER: Policy paper coming very soon!
https://infosec.exchange/@z_edia...

Chinese threat actors often exploit 0-days"Between 2023 and 2024, more than 35 advisories issued by our World Watch Cyber Threat...

https://infosec.exchange/@z_edia...

Chinese threat actors often exploit 0-days

"Between 2023 and 2024, more than 35 advisories issued by our World Watch Cyber Threat Intelligence concerned zero-day vulnerabilities exploited by Chinese threat actors. These account for 41% of all advisories with a high or very high threat level, representing a substantial portion of the critical threats potentially facing our customers."

Link: research.cert.orangecyberdefen

28.11.2024 09:22Chinese threat actors often exploit 0-days"Between 2023 and 2024, more than 35 advisories issued by our World Watch Cyber Threat...
https://infosec.exchange/@z_edia...

A Panda in your Telco Networks"Liminal Panda, an advanced persistent threat (APT) hyper-focused on gathering intelligence from...

https://infosec.exchange/@z_edia...

A Panda in your Telco Networks

"Liminal Panda, an advanced persistent threat (APT) hyper-focused on gathering intelligence from telecommunications networks."

Link: darkreading.com/threat-intelli

28.11.2024 09:10A Panda in your Telco Networks"Liminal Panda, an advanced persistent threat (APT) hyper-focused on gathering intelligence from...
https://infosec.exchange/@z_edia...

Chinese Threat Actors meets Bureaucracy"Nowadays, the MSS is the big kahuna and, since 2021, has been linked to the majority of cyber...

https://infosec.exchange/@z_edia...

Chinese Threat Actors meets Bureaucracy

"Nowadays, the MSS is the big kahuna and, since 2021, has been linked to the majority of cyber operations attributed to the PRC."

"PLA has been retasked to directly support military operations."

Link: news.risky.biz/the-plas-cyber-

28.11.2024 09:09Chinese Threat Actors meets Bureaucracy"Nowadays, the MSS is the big kahuna and, since 2021, has been linked to the majority of cyber...
https://infosec.exchange/@z_edia...

Liebe Community, ein persönliches Update: Ab dem 05.11.2024 werde ich voraussichtlich für fünf Monate in Teilzeit beim Bundesamt für...

https://infosec.exchange/@z_edia...

Liebe Community,

ein persönliches Update: Ab dem 05.11.2024 werde ich voraussichtlich für fünf Monate in Teilzeit beim Bundesamt für Sicherheit in der Informationstechnik hospitieren. Dort werde ich Teil der „Abteilung T“ sein – eine Art Strategieeinheit, die sich vor allem mit neuen Herausforderungen und Entwicklungen in der IT-Sicherheit beschäftigt.

Warum mache ich das? In vielen Berufen gibt es ein großes Weiterbildungsangebot. In der kleinen Berufswelt der Think Tanks organisieren wir Fortbildungen häufig selbst. Das kann bedeuten, von Zeit zu Zeit auch auf Behörden- oder Regierungsseite zu arbeiten. Ich freue mich sehr auf die kommenden Monate und die vielen neuen (und alten) Gesichter!

Während meiner Hospitanz beim BSI werde ich weiterhin mit reduzierter Stundenzahl meine Arbeit bei interface fortführen und für Euch ansprechbar bleiben.

Rückfragen gerne hier oder über die bekannten Kanäle: interface-eu.org/persons/dr-sv

Beste Grüße,
Sven

P.S.: Alle während dieser Zeit getätigten Aussagen beziehen sich, sofern nicht explizit andersweitig gekennzeichnet, auf meine Arbeit bei interface.

24.10.2024 11:58Liebe Community, ein persönliches Update: Ab dem 05.11.2024 werde ich voraussichtlich für fünf Monate in Teilzeit beim Bundesamt für...
https://infosec.exchange/@z_edia...

"Cyber Deception" according to the UK NCSC:"During discussions, it became clear that ‘deception’ has connotations which...

https://infosec.exchange/@z_edia...

"Cyber Deception" according to the UK NCSC:

"During discussions, it became clear that ‘deception’ has connotations which can be uncomfortable for some. It is important to acknowledge this, and although there are wider definitions of cyber deception in military and other contexts, they differ to the technology we are referring to here. So for our policy, legal and executive colleagues, when we use these terms in a cyber security context, we mean:

Tripwires: components and systems designed to detect a threat actor, by interacting with them to disclose their unauthorised presence in an environment which include honeytokens.

Honeypots: components and systems designed to allow a threat actor to interact with them, allowing observation of their techniques, tactics and procedures, as well as the capability and infrastructure they use – with the aim of collecting cyber threat intelligence.

Breadcrumbs: digital artefacts distributed in a system that entice a threat actor to interact with a tripwire and/or honeypot.

It's also worth noting that we are aware of wider thinking and approaches designed to produce synthetic behaviours and content, with the aim of degrading an adversary’s efficacy objective, through effects and other means. But this is not our focus, as these approaches and intents are out of scope for our cyber security use cases."

ncsc.gov.uk/blog-post/building

1.10.2024 06:41"Cyber Deception" according to the UK NCSC:"During discussions, it became clear that ‘deception’ has connotations which...
https://infosec.exchange/@z_edia...

There is no Pakistan-linked threat actor (APT) that leveraged a 0-day vulnerability.Prove me wrong.

https://infosec.exchange/@z_edia...

There is no Pakistan-linked threat actor (APT) that leveraged a 0-day vulnerability.

Prove me wrong.

24.9.2024 13:37There is no Pakistan-linked threat actor (APT) that leveraged a 0-day vulnerability.Prove me wrong.
https://infosec.exchange/@z_edia...

US Military: Using remote access devices in special operations training[1].Also US Military: Hahaha private STINKY-satellite-WLAN on Combat...

https://infosec.exchange/@z_edia...

US Military: Using remote access devices in special operations training[1].

Also US Military: Hahaha private STINKY-satellite-WLAN on Combat Ship in West Pacific goes vroooom[2]

1: army.mil/article/279281/green_

2: arstechnica.com/security/2024/

6.9.2024 08:30US Military: Using remote access devices in special operations training[1].Also US Military: Hahaha private STINKY-satellite-WLAN on Combat...
https://infosec.exchange/@z_edia...

Notification of Concerns Identified in the Federal Bureau of Investigation’s Inventory Management and Disposition Procedures of Electronic...

https://infosec.exchange/@z_edia...

Notification of Concerns Identified in the Federal Bureau of Investigation’s Inventory Management and Disposition Procedures of Electronic Storage Media

tl;dr: OIG finds FBI is not handling their digital security well enough.

oig.justice.gov/sites/default/

29.8.2024 08:41Notification of Concerns Identified in the Federal Bureau of Investigation’s Inventory Management and Disposition Procedures of Electronic...
https://infosec.exchange/@z_edia...

Ab sofort gibt es die deutsche Cybersicherheitsarchitektur als eigene Microsite, u. a. mit durchsuchbarer Datenbank!Abrufbar hier:...

https://infosec.exchange/@z_edia...

Ab sofort gibt es die deutsche Cybersicherheitsarchitektur als eigene Microsite, u. a. mit durchsuchbarer Datenbank!

Abrufbar hier: cybersicherheitsarchitektur.de/

Mehr Infos via LinkedIn-Post: linkedin.com/posts/dr-sven-her

29.8.2024 07:31Ab sofort gibt es die deutsche Cybersicherheitsarchitektur als eigene Microsite, u. a. mit durchsuchbarer Datenbank!Abrufbar hier:...
https://infosec.exchange/@z_edia...
Subscribe
To add news/posts to your profile here, you must add a link to a RSS-Feed to your webfinger. One example how you can do this is to join Fediverse City.
         
Webfan Website Badge
Nutzungsbedingungen   Datenschutzerklärung  Impressum
Webfan | @Web pages | Fediverse Members