Sven Herpig (@z_edian) 's Twitter Profile
Sven Herpig

@z_edian

Once wrote a "sensible policy blueprint" on operational active cyber defense norms (@tomatospy). Formerly German government.

ID: 250064912

linkhttps://github.com/z-edian/publications calendar_today10-02-2011 10:32:42

16,16K Tweet

4,4K Followers

492 Following

David Kaye (@davidakaye) 's Twitter Profile Photo

UN #Cybercrime Convention may be voted tomorrow. Years of negotiation leave way too many questions for it to be adopted. Huge risks for abuse of fundamental human rights. I urge governments that care about freedom online to reject the draft.

Sven Herpig (@z_edian) 's Twitter Profile Photo

Hey, we should at least inform people a posteriori when we surveilled them for possible criminal offenses. Because, you know, right to legal recourse. United Nations convention against cybercrime: No can do. undocs.org/Home/Mobile?Fi…

Hey, we should at least inform people a posteriori when we surveilled them for possible criminal offenses. Because, you know, right to legal recourse.

United Nations convention against cybercrime: No can do.

undocs.org/Home/Mobile?Fi…
Sven Herpig (@z_edian) 's Twitter Profile Photo

"Exploit released for Cisco SSM bug allowing admin password changes"; bleepingcomputer.com/news/security/… Manchmal frage ich mich, an welchen Punkt man sagt: "Ach, komm, das wird eh nichts mehr mit IT-Sicherheit bei denen".

"Exploit released for Cisco SSM bug allowing admin password changes"; bleepingcomputer.com/news/security/…

Manchmal frage ich mich, an welchen Punkt man sagt: "Ach, komm, das wird eh nichts mehr mit IT-Sicherheit bei denen".
Sven Herpig (@z_edian) 's Twitter Profile Photo

Belt and Road Initiative victims of Chinese Communist Party-linked intrusive cyber operations company I-Soon. intrusiontruth.wordpress.com/2024/08/07/is-…

Belt and Road Initiative victims of Chinese Communist Party-linked intrusive cyber operations company I-Soon.

intrusiontruth.wordpress.com/2024/08/07/is-…
Yann LeCun (@ylecun) 's Twitter Profile Photo

Sometimes, the obvious must be studied so it can be asserted with full confidence: - LLMs can not answer questions whose answers are not in their training set in some form, - they can not solve problems they haven't been trained on, - they can not acquire new skills our

OSINTdefender (@sentdefender) 's Twitter Profile Photo

The Central Bank of Iran (CBI), the Largest Financial Institution in the Islamic Republic of Iran, as well as several other Banks across the Country were Targeted earlier today in a Cyberattack by Unknown State Actors, resulting in Account Information and Balances to be Leaked,

The Central Bank of Iran (CBI), the Largest Financial Institution in the Islamic Republic of Iran, as well as several other Banks across the Country were Targeted earlier today in a Cyberattack by Unknown State Actors, resulting in Account Information and Balances to be Leaked,
Sven Herpig (@z_edian) 's Twitter Profile Photo

#Chinese-#Russian-'no-limits'-friendship: "[Kaspersky] described the [#China-based APT] campaign as "a series of ongoing targeted cyberattacks on dozens of computers at Russian government organisations and IT companies"." Via Tom Uren: news.risky.biz/australias-nat…

JD Work (@hostilespectrum) 's Twitter Profile Photo

PRC doubling down on ransomware as cover for action in an attempt to avoid blowback from detection of VOLT TYPHOON intrusions & OPE is a predictable but dangerous burn plan. It suggests the adversary may be willing to falsely leverage unrelated global criminal continuing

Sven Herpig (@z_edian) 's Twitter Profile Photo

Ab sofort gibt es die deutsche Cybersicherheitsarchitektur als eigene Microsite, u. a. mit durchsuchbarer Datenbank! Abrufbar hier: cybersicherheitsarchitektur.de Mehr Infos via LinkedIn-Post: linkedin.com/posts/dr-sven-…

Ab sofort gibt es die deutsche Cybersicherheitsarchitektur als eigene Microsite, u. a. mit durchsuchbarer Datenbank!

Abrufbar hier: cybersicherheitsarchitektur.de

Mehr Infos via LinkedIn-Post: linkedin.com/posts/dr-sven-…
Sven Herpig (@z_edian) 's Twitter Profile Photo

"The US military purchased Tinder ads in the Middle East to warn Iran and its proxies against attacking Israel" Okay... news.risky.biz/durov-bailed-a…

Sven Herpig (@z_edian) 's Twitter Profile Photo

"States have the motivation and the resources to develop an astoundingly in-depth understanding of malware used by other actors. And at times they'll take advantage of that knowledge." news.risky.biz/using-exploits…

Sven Herpig (@z_edian) 's Twitter Profile Photo

US Military: Using remote access devices in special operations training[1]. Also US Military: Hahaha private STINKY-satellite-WLAN on Combat Ship in West Pacific goes vroooom[2] 1: army.mil/article/279281… 2: arstechnica.com/security/2024/… #TGIF

US Military: Using remote access devices in special operations training[1].

Also US Military: Hahaha private STINKY-satellite-WLAN on Combat Ship in West Pacific goes vroooom[2]

1: army.mil/article/279281…

2: arstechnica.com/security/2024/…

#TGIF