Max Smeets's Avatar

Max Smeets

@maxwsmeets.bsky.social

Author of No Shortcuts & Ransom War Co-director Virtual Routes (https://virtual-routes.org/), previously ECCRI Managing Editor Binding Hook (https://bindinghook.com) Senior Researcher, ETH Zurich

6,138 Followers  |  490 Following  |  182 Posts  |  Joined: 19.05.2023  |  1.5914

Latest posts by maxwsmeets.bsky.social on Bluesky

Preview
China is using cyber attribution to pressure Taiwan Mirroring Western tactics, Chinaโ€™s main intelligence agency and private sector allies are publicly unmasking alleged Taiwanese hackers in a gambit to sway domestic and international opinion

#PublicAttribution of cyber activities is #Chinaโ€™s latest technique for pressuring #Taiwan and shaping the international dialogue around #cybersecurity. @benread.bsky.social digs into the details on Binding Hook: bindinghook.com/articles-hoo...

22.07.2025 07:50 โ€” ๐Ÿ‘ 15    ๐Ÿ” 9    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 3

New from me: China has been ramping up its public attribution against Taiwan, likely in an attempt to shift the conversation on cyber intrusions and pressure the island and they're using their private sector cybersecurity companies to do it. Read the piece, but a few highlights, take aways in this ๐Ÿงต

22.07.2025 18:38 โ€” ๐Ÿ‘ 8    ๐Ÿ” 5    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Time to ditch the AI arms race analogy You donโ€™t need AI to beat AI. Most threats still fail in the face of ordinary, well-applied defences

The increasingly popular narrative that #AIthreats need to be fought with #AIsecuritysolutions fall short upon closer inspection, argue @virtualroutes.bsky.socialโ€™s Jamie Collier and @maxwsmeets.bsky.social in their latest: bindinghook.com/articles-bin...

15.07.2025 07:33 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

mailchi.mp/bindinghook....

30.06.2025 10:53 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Virtual Routes at CyCon 2025
YouTube video by Virtual Routes Virtual Routes at CyCon 2025

Our #CyCon2025 #ransomware workshop, now in video! ๐ŸŽž๏ธ Watch the recap and join us for a quick trip back to Tallinn. ๐Ÿ‘‡ @maxwsmeets.bsky.social @jamesshires.bsky.social www.youtube.com/watch?v=gb7G...

02.06.2025 12:11 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐ŸŽ™๏ธ The new episode of the @sansinstitute.bsky.social #CyberLeadersPodcast featuring @maxwsmeets.bsky.social is out now! Have a listen: sans.org/u/1Bxx

13.06.2025 13:08 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Why Europe must finally secure its water sectors from cyber threats Despite the vital importance of both drinking water and wastewater management, these sectors are highly vulnerable to cyberattacks. What policy actions can help?

Gijs van Loon, Apolline Rolland, @jamesshires.bsky.social, and @maxwsmeets.bsky.social call for increased action from the EU to support and protect European drinking- and wastewater utilities. bindinghook.com/articles-bin...

24.06.2025 07:56 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

On Lawfare Daily, @jshermcyber.bsky.social and Jonathan Cedarbaum spoke to @maxwsmeets.bsky.social about his book โ€œRansom War,โ€ the history of ransomware, how the threats have evolved, and some of the major drivers of innovation within the ecosystem. www.lawfaremedia.org/article/lawf...

26.06.2025 14:44 โ€” ๐Ÿ‘ 11    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
The Cyber Battlefield with Max Smeets | 13 | Cyber Leaders Podcast | SANS Institute In this episode, Ciaran and James meet Max Smeets, Co-Director of Virtual Routes and Senior Researcher at the Center for Strategic Studies at ETH Zurich, to discuss how digital threats are reshaping g...

I enjoyed joining James Lyne and @ciaranm.bsky.social on the Cyber Leaders podcast. It was both fun and useful to discuss state and criminal cyber activity in one episode - and to explore where the two intersect.

www.sans.org/podcasts/cyb...

13.06.2025 09:09 โ€” ๐Ÿ‘ 6    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

bindinghooklive.com

31.05.2025 11:31 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Ransom War is now available as an audiobook! www.amazon.com/Ransom-War-B...

28.05.2025 08:46 โ€” ๐Ÿ‘ 6    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

โฐ Hurry up - only 1๏ธโƒฃ week left until the deadline! ๐Ÿ“ Submit your Lightning Talk proposal by May 31: bindinghooklive.com

24.05.2025 08:52 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Updates to our speakers list! Looking forward to the talks by Mattijs Dijkstra & Zawadi Done (@huntandhackett.com), @joshagoldstein.bsky.social (Georgetown's CSET), & @maxwsmeets.bsky.social (@virtualroutes.bsky.social + @ethz.ch). Registration closing 1 June: www.thehagueprogram.nl/the-hague-ti...

20.05.2025 08:36 โ€” ๐Ÿ‘ 4    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Het aantal gerichte taps door de #AIVD is de laatste 5 jaar aanzienlijk gedaald, daarentegen is het aantal taps door de #MIVD de afgelopen twee jaar geรซxplodeerd:

20.05.2025 06:23 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
The Hague Program: Hague TIX 2025 Welcome

Excited to be speaking at The Hague TIX this year. Great line up once again from @monicakello.bsky.social and team!

www.thehagueprogram.nl/the-hague-ti...

16.05.2025 18:10 โ€” ๐Ÿ‘ 7    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Cybersecurity Seminars NL - Virtual Routes The Google.org Cybersecurity Seminars program has been successfully implemented in higher education institutions across Europe, Africa, and the Middle East, and is now being launched in the Netherland...

@virtualroutes.bsky.social is expanding the Google.org Cybersecurity Seminars program to the Netherlands, focusing on defending local communities against ransomware. Current university students can register interest now virtual-routes.org/initiatives/...

14.05.2025 08:56 โ€” ๐Ÿ‘ 7    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

We are excited to launch a new program in the Netherlands. The goal is to give students hands-on experience in cybersecurity, with courses like malware reverse engineering, digital forensics, and ransomware economics.

14.05.2025 07:50 โ€” ๐Ÿ‘ 19    ๐Ÿ” 7    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Ransomware groups are not always out of reach The arrest of a suspect after a spate of ransomware attacks in the Netherlands is an unusual win for law enforcement, but a more holistic approach is required.

The arrest of a suspect after a spate of #RansomwareAttacks in the Netherlands is an unusual win for law enforcement, but a more holistic approach is required. Read the new piece by @jamesshires.bsky.social and @maxwsmeets.bsky.social: bindinghook.com/articles-hoo...

14.05.2025 07:38 โ€” ๐Ÿ‘ 5    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Binding Hook Live Binding Hook Live is a one-of-a-kind event bringing together leading voices in digital and emerging technologies and global affairs. This exclusive event takes place at the iconic Underbelly Boulevard...

โณ ๐—ฆ๐˜‚๐—ฏ๐—บ๐—ถ๐˜ ๐˜†๐—ผ๐˜‚๐—ฟ ๐—Ÿ๐—ถ๐—ด๐—ต๐˜๐—ป๐—ถ๐—ป๐—ด ๐—ง๐—ฎ๐—น๐—ธ ๐—ณ๐—ผ๐—ฟ ๐—•๐—ถ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—›๐—ผ๐—ผ๐—ธ ๐—Ÿ๐—ถ๐˜ƒ๐—ฒ ๐—ฏ๐˜† ๐— ๐—ฎ๐˜† ๐Ÿฏ๐Ÿญ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ!

We're looking for talks on:

๐Ÿ‘‰ Cyber & AI
๐Ÿ‘‰ Surveillance
๐Ÿ‘‰ Info ops
๐Ÿ‘‰ Critical infra
๐Ÿ‘‰ Cybercrime and more

โœ… If accepted youโ€™ll receive a ๐—ณ๐—ฟ๐—ฒ๐—ฒ ๐˜๐—ถ๐—ฐ๐—ธ๐—ฒ๐˜ to the event and a ยฃ๐Ÿฑ๐Ÿฌ๐Ÿฌ ๐—ต๐—ผ๐—ป๐—ผ๐—ฟ๐—ฎ๐—ฟ๐—ถ๐˜‚๐—บ.

๐Ÿ“ ๐—ฆ๐˜‚๐—ฏ๐—บ๐—ถ๐˜ ๐˜†๐—ผ๐˜‚๐—ฟ ๐—ฝ๐—ฟ๐—ผ๐—ฝ๐—ผ๐˜€๐—ฎ๐—น: bindinghooklive.com

13.05.2025 13:16 โ€” ๐Ÿ‘ 2    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Sowing the seeds of enhanced cybersecurity cooperation within the G7 Officials from the Italian National Cybersecurity Agency discuss the challenges and successes of creating the new G7 Cybersecurity Working Group

The G7 Cybersec Working Group has finally put nat cyber agencies in one room to align on critical infra and AI safeguards. Now let us see if a small task force can truly overcome the deep institutional silos that have long slowed collective cyber security/defense:

bindinghook.com/articles-hoo...

12.05.2025 07:52 โ€” ๐Ÿ‘ 6    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
State-backed ransomware at the intersection of espionage, sabotage, and cybercrime The governments of Russia, China, Iran, and North Korea use ransomware for diverse ends.

bindinghook.com/articles-hoo...

06.05.2025 07:56 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Binding Hook Live Binding Hook Live is a one-of-a-kind event bringing together leading voices in digital and emerging technologies and global affairs. This exclusive event takes place at the iconic Underbelly Boulevard...

One month left to submit a proposal for a Lightning Talk at Binding Hook Live. 10-minute presentations that should fit the same editorial scope as Binding Hook. We are interested in how digital and emerging technologies shape security.

bindinghooklive.com

29.04.2025 05:12 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Published a new Pharos report today - and learned a lot in the process from @milenkowski.bsky.social Jiro, @julianferdinand.bsky.social @tgrossman.bsky.social. The report takes a closer look at how states are using ransomware.

virtual-routes.org/wp-content/u...

23.04.2025 20:19 โ€” ๐Ÿ‘ 14    ๐Ÿ” 9    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1

North Koreaโ€™s financially driven approach, embedding itself deep within the ecosystem, is also striking. And then there is Iran.. which may be the most versatile in its use. We found it harder to pin down, but much of it mirrors their hacktivist tactics with wipers, offering a similar kind of cover.

23.04.2025 20:19 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Russia has used it largely to maintain operational tempo during the war in Ukraine, while China seems to mostly lean on it for plausible deniability.

23.04.2025 20:19 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

I touched on this already in Ransom War, but it felt like the topic deserved a more in-depth treatment. What stands out is just how differently states use ransomware:

23.04.2025 20:19 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Published a new Pharos report today - and learned a lot in the process from @milenkowski.bsky.social Jiro, @julianferdinand.bsky.social @tgrossman.bsky.social. The report takes a closer look at how states are using ransomware.

virtual-routes.org/wp-content/u...

23.04.2025 20:19 โ€” ๐Ÿ‘ 14    ๐Ÿ” 9    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Post image

Looking forward to welcome @maxwsmeets.bsky.social at our next online seminar on 22 May to talk about his new book Ransom War: How Cyber Crime Became a Threat to National Security! More info and how to register: www.thehagueprogram.nl/events/ranso...

23.04.2025 12:37 โ€” ๐Ÿ‘ 5    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ’ก The third report of the Pharos Series, Ransomwareโ€™s New Masters: How States Are Hijacking Cybercrime by @milenkowski.bsky.social, Jiro Minier, @julianferdinand.bsky.social, @maxwsmeets.bsky.social, and @tgrossman.bsky.social is out now. Read the full report: virtual-routes.org/pharos-repor...

23.04.2025 08:25 โ€” ๐Ÿ‘ 7    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐Ÿ“˜ @maxwsmeets.bsky.social Ransom War: How Cyber Crime Became a Threat to National Security is now available in the US! โญ๏ธ Get your copy: a.co/d/7AZEKWu

15.04.2025 12:41 โ€” ๐Ÿ‘ 6    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@maxwsmeets is following 20 prominent accounts