Chinese teams once ruled Trend Zero Day Initiative #Pwn2Own hacking competition, until new rules required them to report software flaws to the government. Hear from Dustin Childs, Head of Threat Awareness, on how this changed the game for global cybersecurity and boosted China’s state-led hacking efforts: https://spr.ly/6047NbNNV
How new rules changed the #Pwn2Own competition for China
More Relevant Posts
-
State hackers aren’t slowing down- they’re scaling up. 5,000 cyber incidents show the EU is under constant digital siege. The frontline of espionage today isn’t borders- it’s firewalls. #CyberSecurity #Espionage #EU #Spying #Cyberespionage https://lnkd.in/ec-gDHWs
To view or add a comment, sign in
-
With the move to online services, applications are now the primary way you communicate with your customers. But this shift to digital channels means that cyber threats are becoming more sophisticated by the minute. Are your digital channels prepared for the challenge? Nneko Branche, Head of Business Development at Fujitsu Caribbean cuts through the noise to give you actionable insights on defending your most valuable online assets with our partner F5. Read the full article now! 👇 https://okt.to/rsJNET #CyberAwareness #DigitalStrategy #DataProtection #ITSecurity #FujitsuCaribbean
To view or add a comment, sign in
-
-
🌟 New Blog Just Published! 🌟 📌 North Korea Uses EtherHiding in Smart Contracts to Hide Malware 🚀 ✍️ Author: Hiren Dave 📖 In recent weeks, threat-intel circles have observed a striking evolution in the tactics of north korean hackers . A Reddit “past week in brief” summary highlighted the Lazarus group’s pivot from...... 🕒 Published: 2025-10-17 📂 Category: Cybersecurity 🔗 Read more: https://lnkd.in/dmdzywB3 🚀✨ #northkorea #etherhiding #smartcontracts
To view or add a comment, sign in
-
-
Maryland’s top cybersecurity official on Tuesday announced on social media that the state has launched a vulnerability disclosure program, providing white-hat hackers an official avenue to share security issues they discover on the state’s websites and other online properties. https://lnkd.in/e-32EDeQ
To view or add a comment, sign in
-
-
As cyber threats grow, traditional defensive measures have become insufficient against sophisticated tactics. Should private entities "hack back" instead? Guest author John Carlin traces the legal contours of offensive cyber to help answer. The cyber response of hacking back incorporates a counterattack designed to proactively engage with, disable, or collect evidence about an attacker. The legality and permissible scope of these tactics, especially when adopted by private actors, is an open question. Carlin lays out what the law says about hacking back, and more, in a new thought piece on our website. Read it here: https://ow.ly/W0QI50XaHah #AspenCyber #OffensiveCyber
To view or add a comment, sign in
-
-
The latest in our series "Playing Offense": John Carlin goes into the weeds of how to properly understand "hacking back". As with most policy discussions, one of the most important things we can do is take a very messy, misunderstood concept and break it down into its fundamental parts. The piece illustrates not only a taxonomy for understanding what the different types of "hack backs" are, but also the different risks and implications associated with each. Hope you'll give it a read!
As cyber threats grow, traditional defensive measures have become insufficient against sophisticated tactics. Should private entities "hack back" instead? Guest author John Carlin traces the legal contours of offensive cyber to help answer. The cyber response of hacking back incorporates a counterattack designed to proactively engage with, disable, or collect evidence about an attacker. The legality and permissible scope of these tactics, especially when adopted by private actors, is an open question. Carlin lays out what the law says about hacking back, and more, in a new thought piece on our website. Read it here: https://ow.ly/W0QI50XaHah #AspenCyber #OffensiveCyber
To view or add a comment, sign in
-
-
The new Measures for the Administration of the Reporting of Cybersecurity Incidents issued by the Cyberspace Administration of China (CAC) takes effect on 1 November 2025. Depending on the severity of the breach, network operators in China face shortened requirements for notification to the CAC. Tow Lu Lim, Jason Leung and Ryan Choy summarise essential components of the Measures and answer the most concerned questions in this legal update, including: When and how should a network operator report a cybersecurity incident? What are the consequences of failure to report? What should multi-national corporations with a China presence do? Learn more: https://lnkd.in/gztrFz-s #Cybersecurity #Reporting #China
To view or add a comment, sign in
-
-
A new era of cybersecurity regulation is dawning in Greater China. With the mainland's CAC Measures enforcing 1-hour reporting from Nov 2025 and Hong Kong's first cybersecurity law, the Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653), taking effect shortly after in Jan 2026, the compliance landscape is shifting rapidly. Navigating these parallel but distinct regimes requires deep local expertise. Our market leading cybersecurity team led by Tow Lu Lim is equipped to handle the entire spectrum. We have the on-the-ground knowledge to ensure your operations are compliant, resilient, and secure across the region. Great analysis from my colleagues Tow Lu Lim, Jason Leung, and Ryan Choy on the changes in PRC. A must read update. #Cybersecurity #GreaterChina #HKCybersecurityLaw #CAC #Compliance #CriticalInfrastructure #HongKong #China Johnson Stokes & Master
The new Measures for the Administration of the Reporting of Cybersecurity Incidents issued by the Cyberspace Administration of China (CAC) takes effect on 1 November 2025. Depending on the severity of the breach, network operators in China face shortened requirements for notification to the CAC. Tow Lu Lim, Jason Leung and Ryan Choy summarise essential components of the Measures and answer the most concerned questions in this legal update, including: When and how should a network operator report a cybersecurity incident? What are the consequences of failure to report? What should multi-national corporations with a China presence do? Learn more: https://lnkd.in/gztrFz-s #Cybersecurity #Reporting #China
To view or add a comment, sign in
-
-
Maryland’s top cybersecurity official on Tuesday announced on social media that the state has launched a vulnerability disclosure program, providing white-hat hackers an official avenue to share security issues they discover on the state’s websites and other online properties. https://lnkd.in/esagcUQF
To view or add a comment, sign in
-
-
Did you know that the average person has more than 100 passwords at any given time? Here’s an easy-to-implement pro tip for handling all those logins: a password manager can help you create strong, unique passwords for each account you have. At the statewide level, initiatives by DIR and the Texas Cyber Command are helping Texas strengthen digital defenses—ensuring both individuals and government entities are better protected from evolving cyber threats. Learn more: https://lnkd.in/dyJEv3XC #CybersecurityAwarenessMonth #SecureOurWorld #PasswordSecurity #CyberTip #DIRisIT #TXCC
To view or add a comment, sign in
-
More from this author
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development