<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>Cyber Defense Researcher @ethz.ch. Former Italian govt, Pacific Forum and NYPD. LUISS &amp; Columbia University Alum.</description><link>https://bsky.app/profile/euben.bsky.social</link><title>@euben.bsky.social - Eugenio Benincasa</title><item><link>https://bsky.app/profile/euben.bsky.social/post/3lvddffnmhs2y</link><description>Can’t wait for this :)&#xA;&#xA;[contains quote post or other embedded content]</description><pubDate>01 Aug 2025 09:25 +0000</pubDate><guid isPermaLink="false">at://did:plc:dlzotm62ngtwv46wspnlbbvk/app.bsky.feed.post/3lvddffnmhs2y</guid></item><item><link>https://bsky.app/profile/euben.bsky.social/post/3lvblheflik2c</link><description>Microsoft is probing whether a MAPP leak let Chinese hackers exploit a SharePoint vuln pre-patch.&#xA;&#xA;In this new piece for Natto, &#xA;@dakotaindc.bsky.social, @meidanowski.bsky.social &amp; I dig into:&#xA;🏛️ China&#39;s vuln reporting rules&#xA;📉 Which firms joined/left MAPP since 2018&#xA;⚠️ The risks today’s members pose</description><pubDate>31 Jul 2025 16:44 +0000</pubDate><guid isPermaLink="false">at://did:plc:dlzotm62ngtwv46wspnlbbvk/app.bsky.feed.post/3lvblheflik2c</guid></item><item><link>https://bsky.app/profile/euben.bsky.social/post/3luhk5m26ec2v</link><description>1/ China’s cyber capabilities didn’t start top-down, they started with raw hacking talent. The new CSS/ETH report &#34;Before Vegas&#34; traces how informal talent shaped China’s cyber ecosystem, moving from online forums to industry leaders (link in thread).</description><pubDate>21 Jul 2025 08:11 +0000</pubDate><guid isPermaLink="false">at://did:plc:dlzotm62ngtwv46wspnlbbvk/app.bsky.feed.post/3luhk5m26ec2v</guid></item><item><link>https://bsky.app/profile/euben.bsky.social/post/3lrdsmum4p22m</link><description>To defend, one must first know how to attack” (未知攻，焉知防). This mindset, popularized by a Taiwanese hacker Lin in the 1990s, spread from China&#39;s red hackers to CTF teams. Today, it powers China&#39;s cyber industry.&#xA;&#xA;New piece for @nattothoughts.bsky.social &#xA;&#xA;https://nattothoughts.substack.com/p/defense-through-offense-mindset-from</description><pubDate>11 Jun 2025 16:17 +0000</pubDate><guid isPermaLink="false">at://did:plc:dlzotm62ngtwv46wspnlbbvk/app.bsky.feed.post/3lrdsmum4p22m</guid></item><item><link>https://bsky.app/profile/euben.bsky.social/post/3lmwyki4pb22h</link><description>In this piece with @nattothoughts.bsky.social&#39;s @meidanowski.bsky.social, we dug into China’s two naming-and-shaming campaigns over the past 30 days—targeting alleged Taiwanese and U.S. hackers amid escalating geopolitical tensions.&#xA;&#xA;https://nattothoughts.substack.com/p/wars-without-gun-smoke-china-plays</description><pubDate>16 Apr 2025 16:17 +0000</pubDate><guid isPermaLink="false">at://did:plc:dlzotm62ngtwv46wspnlbbvk/app.bsky.feed.post/3lmwyki4pb22h</guid></item><item><link>https://bsky.app/profile/euben.bsky.social/post/3lmtcgxqkdk24</link><description>It was a matter of time. Less than a month after outing alleged Taiwanese cyber operatives in an unprecedented move for both its tone and detail, China has done the same with alleged NSA operatives—for the first time. The language echoes that of Western reports, though less detailed.&#xA;&#xA;[contains quote post or other embedded content]</description><pubDate>15 Apr 2025 05:04 +0000</pubDate><guid isPermaLink="false">at://did:plc:dlzotm62ngtwv46wspnlbbvk/app.bsky.feed.post/3lmtcgxqkdk24</guid></item></channel></rss>