New from me: China has been ramping up its public attribution against Taiwan, likely in an attempt to shift the conversation on cyber intrusions and pressure the island and they're using their private sector cybersecurity companies to do it. Read the piece, but a few highlights, take aways in this ๐งต
22.07.2025 18:38 โ ๐ 8 ๐ 5 ๐ฌ 1 ๐ 0
Time to ditch the AI arms race analogy
You donโt need AI to beat AI. Most threats still fail in the face of ordinary, well-applied defences
The increasingly popular narrative that #AIthreats need to be fought with #AIsecuritysolutions fall short upon closer inspection, argue @virtualroutes.bsky.socialโs Jamie Collier and @maxwsmeets.bsky.social in their latest: bindinghook.com/articles-bin...
15.07.2025 07:33 โ ๐ 4 ๐ 2 ๐ฌ 0 ๐ 0
mailchi.mp/bindinghook....
30.06.2025 10:53 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
YouTube video by Virtual Routes
Virtual Routes at CyCon 2025
Our #CyCon2025 #ransomware workshop, now in video! ๐๏ธ Watch the recap and join us for a quick trip back to Tallinn. ๐ @maxwsmeets.bsky.social @jamesshires.bsky.social www.youtube.com/watch?v=gb7G...
02.06.2025 12:11 โ ๐ 4 ๐ 2 ๐ฌ 0 ๐ 0
๐๏ธ The new episode of the @sansinstitute.bsky.social #CyberLeadersPodcast featuring @maxwsmeets.bsky.social is out now! Have a listen: sans.org/u/1Bxx
13.06.2025 13:08 โ ๐ 4 ๐ 2 ๐ฌ 0 ๐ 0
On Lawfare Daily, @jshermcyber.bsky.social and Jonathan Cedarbaum spoke to @maxwsmeets.bsky.social about his book โRansom War,โ the history of ransomware, how the threats have evolved, and some of the major drivers of innovation within the ecosystem. www.lawfaremedia.org/article/lawf...
26.06.2025 14:44 โ ๐ 11 ๐ 2 ๐ฌ 0 ๐ 0
bindinghooklive.com
31.05.2025 11:31 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
Ransom War is now available as an audiobook! www.amazon.com/Ransom-War-B...
28.05.2025 08:46 โ ๐ 6 ๐ 0 ๐ฌ 0 ๐ 0
โฐ Hurry up - only 1๏ธโฃ week left until the deadline! ๐ Submit your Lightning Talk proposal by May 31: bindinghooklive.com
24.05.2025 08:52 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
Updates to our speakers list! Looking forward to the talks by Mattijs Dijkstra & Zawadi Done (@huntandhackett.com), @joshagoldstein.bsky.social (Georgetown's CSET), & @maxwsmeets.bsky.social (@virtualroutes.bsky.social + @ethz.ch). Registration closing 1 June: www.thehagueprogram.nl/the-hague-ti...
20.05.2025 08:36 โ ๐ 4 ๐ 3 ๐ฌ 0 ๐ 0
Het aantal gerichte taps door de #AIVD is de laatste 5 jaar aanzienlijk gedaald, daarentegen is het aantal taps door de #MIVD de afgelopen twee jaar geรซxplodeerd:
20.05.2025 06:23 โ ๐ 4 ๐ 2 ๐ฌ 1 ๐ 1
The Hague Program: Hague TIX 2025 Welcome
Excited to be speaking at The Hague TIX this year. Great line up once again from @monicakello.bsky.social and team!
www.thehagueprogram.nl/the-hague-ti...
16.05.2025 18:10 โ ๐ 7 ๐ 0 ๐ฌ 0 ๐ 0
We are excited to launch a new program in the Netherlands. The goal is to give students hands-on experience in cybersecurity, with courses like malware reverse engineering, digital forensics, and ransomware economics.
14.05.2025 07:50 โ ๐ 19 ๐ 7 ๐ฌ 0 ๐ 0
Ransomware groups are not always out of reach
The arrest of a suspect after a spate of ransomware attacks in the Netherlands is an unusual win for law enforcement, but a more holistic approach is required.
The arrest of a suspect after a spate of #RansomwareAttacks in the Netherlands is an unusual win for law enforcement, but a more holistic approach is required. Read the new piece by @jamesshires.bsky.social and @maxwsmeets.bsky.social: bindinghook.com/articles-hoo...
14.05.2025 07:38 โ ๐ 5 ๐ 2 ๐ฌ 0 ๐ 0
Binding Hook Live
Binding Hook Live is a one-of-a-kind event bringing together leading voices in digital and emerging technologies and global affairs. This exclusive event takes place at the iconic Underbelly Boulevard...
โณ ๐ฆ๐๐ฏ๐บ๐ถ๐ ๐๐ผ๐๐ฟ ๐๐ถ๐ด๐ต๐๐ป๐ถ๐ป๐ด ๐ง๐ฎ๐น๐ธ ๐ณ๐ผ๐ฟ ๐๐ถ๐ป๐ฑ๐ถ๐ป๐ด ๐๐ผ๐ผ๐ธ ๐๐ถ๐๐ฒ ๐ฏ๐ ๐ ๐ฎ๐ ๐ฏ๐ญ, ๐ฎ๐ฌ๐ฎ๐ฑ!
We're looking for talks on:
๐ Cyber & AI
๐ Surveillance
๐ Info ops
๐ Critical infra
๐ Cybercrime and more
โ
If accepted youโll receive a ๐ณ๐ฟ๐ฒ๐ฒ ๐๐ถ๐ฐ๐ธ๐ฒ๐ to the event and a ยฃ๐ฑ๐ฌ๐ฌ ๐ต๐ผ๐ป๐ผ๐ฟ๐ฎ๐ฟ๐ถ๐๐บ.
๐ ๐ฆ๐๐ฏ๐บ๐ถ๐ ๐๐ผ๐๐ฟ ๐ฝ๐ฟ๐ผ๐ฝ๐ผ๐๐ฎ๐น: bindinghooklive.com
13.05.2025 13:16 โ ๐ 2 ๐ 3 ๐ฌ 0 ๐ 0
Sowing the seeds of enhanced cybersecurity cooperation within the G7
Officials from the Italian National Cybersecurity Agency discuss the challenges and successes of creating the new G7 Cybersecurity Working Group
The G7 Cybersec Working Group has finally put nat cyber agencies in one room to align on critical infra and AI safeguards. Now let us see if a small task force can truly overcome the deep institutional silos that have long slowed collective cyber security/defense:
bindinghook.com/articles-hoo...
12.05.2025 07:52 โ ๐ 6 ๐ 1 ๐ฌ 0 ๐ 0
Binding Hook Live
Binding Hook Live is a one-of-a-kind event bringing together leading voices in digital and emerging technologies and global affairs. This exclusive event takes place at the iconic Underbelly Boulevard...
One month left to submit a proposal for a Lightning Talk at Binding Hook Live. 10-minute presentations that should fit the same editorial scope as Binding Hook. We are interested in how digital and emerging technologies shape security.
bindinghooklive.com
29.04.2025 05:12 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
Published a new Pharos report today - and learned a lot in the process from @milenkowski.bsky.social Jiro, @julianferdinand.bsky.social @tgrossman.bsky.social. The report takes a closer look at how states are using ransomware.
virtual-routes.org/wp-content/u...
23.04.2025 20:19 โ ๐ 14 ๐ 9 ๐ฌ 1 ๐ 1
North Koreaโs financially driven approach, embedding itself deep within the ecosystem, is also striking. And then there is Iran.. which may be the most versatile in its use. We found it harder to pin down, but much of it mirrors their hacktivist tactics with wipers, offering a similar kind of cover.
23.04.2025 20:19 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
Russia has used it largely to maintain operational tempo during the war in Ukraine, while China seems to mostly lean on it for plausible deniability.
23.04.2025 20:19 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0
I touched on this already in Ransom War, but it felt like the topic deserved a more in-depth treatment. What stands out is just how differently states use ransomware:
23.04.2025 20:19 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Published a new Pharos report today - and learned a lot in the process from @milenkowski.bsky.social Jiro, @julianferdinand.bsky.social @tgrossman.bsky.social. The report takes a closer look at how states are using ransomware.
virtual-routes.org/wp-content/u...
23.04.2025 20:19 โ ๐ 14 ๐ 9 ๐ฌ 1 ๐ 1
Looking forward to welcome @maxwsmeets.bsky.social at our next online seminar on 22 May to talk about his new book Ransom War: How Cyber Crime Became a Threat to National Security! More info and how to register: www.thehagueprogram.nl/events/ranso...
23.04.2025 12:37 โ ๐ 5 ๐ 2 ๐ฌ 0 ๐ 0
๐ก The third report of the Pharos Series, Ransomwareโs New Masters: How States Are Hijacking Cybercrime by @milenkowski.bsky.social, Jiro Minier, @julianferdinand.bsky.social, @maxwsmeets.bsky.social, and @tgrossman.bsky.social is out now. Read the full report: virtual-routes.org/pharos-repor...
23.04.2025 08:25 โ ๐ 7 ๐ 3 ๐ฌ 1 ๐ 0
๐ @maxwsmeets.bsky.social Ransom War: How Cyber Crime Became a Threat to National Security is now available in the US! โญ๏ธ Get your copy: a.co/d/7AZEKWu
15.04.2025 12:41 โ ๐ 6 ๐ 1 ๐ฌ 0 ๐ 0
Prof at FGV Law School, heading CTS.FGV.br and CyberBRICS.info
Director of CPDP.lat
Personal Views
Minister van Defensie | VVD | Brabander | Minister of Defence of The Netherlands | Personal account
PhD Researcher @ IMT School for Advanced Studies Lucca, Italy | digital policy & regulation - cybersecurity & resilience - regulatory experimentation
Butlerian jihadist. Cyber stuff sometimes. Writing stuff always. He/him.
Infosec bod, thinker of silly thoughts
Onderzoeksjournalist Volkskrant
Going dark
h.modderkolk at volkskrant.nl
Signal: hmodderkolk.20
Cyber Threat Intelligence at Microsoft | Former Yahoo & Secret Squirrel | Thoughts my own
Technologist @ Human Rights Watch (previously Amnesty, Citizen Lab)
Malware, Threats, Online Investigations, Disinformation, Human Rights and silly memes.
On Mastodon: tek@todon.eu
Also on https://maynier.eu/
We build software for cyber #threatintelligence analysts.
https://www.dogesec.com/
Pattern recognizer *Author: Chinaโs Digital Colonialism, Diamond Model for Influence Operations * Public Speaker
Sharing information on malicious network traffic and malware samples at https://www.malware-traffic-analysis.net/
Head of Research and Discovery @Google Threat Intelligence. Leading multidisciplinary teams to defeat adversaries. Posts are attributable to meโnot my employer.
Three Buddy Problem
https://securityconversations.com
I look for ICS threats, and spend a lot of time reverse engineering.
Distinguished Malware Technical Lead @ Dragos.
Lead Analyst on TRISIS and PIPEDREAM.
He/Him
All things cybersecurity, incident response, threat Intel, AI, and law. Founded @AdvancedCyberLaw.com after forever @MSFT. Host of @AdvancingCyber.com Podcast on Apple Podcast and Spotify. Mom to humans, dog, and cat. Seeks big mountains and lakes.
Interests include politics, cyber security, threat intelligence, wildlife conservation, history, and ice hockey. Here for information and stimulating conversation.
Now Google Threat Intelligence & doing fun things at DistrictCon, fmrly GreyNoiseIO and RecordedFuture, SAISHopkins MASCI alumna | โกs & rts are my own, my employer definitely doesnโt like Taylor Swift that much
Senior security researcher and reverse engineer @Intezer
Principal Threat Researcher at Trend Micro
Working at Google TAG. Retired FreeBSD committer. May or may not be a robot.