<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Threat Intelligence on Kemetmüller</title><link>https://xn--kemetmller-feb.com/tags/threat-intelligence/</link><description>Recent content in Threat Intelligence on Kemetmüller</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Christoph Kemetmüller</copyright><atom:link href="https://xn--kemetmller-feb.com/tags/threat-intelligence/index.xml" rel="self" type="application/rss+xml"/><item><title>2025 Top 20 Chinese Cybersecurity Enterprises</title><link>https://xn--kemetmller-feb.com/blog/2025-top-20-chinese-cybersecurity-enterprises/</link><pubDate>Wed, 11 Feb 2026 22:43:03 +0100</pubDate><guid>https://xn--kemetmller-feb.com/blog/2025-top-20-chinese-cybersecurity-enterprises/</guid><description>&lt;h2 class="relative group"&gt;Introduction
 &lt;div id="introduction" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#introduction" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;On December 29, 2025, the &lt;a href="https://www.isc.org.cn/article/27460980540829696.html" target="_blank" rel="noreferrer"&gt;Internet Society of China&lt;/a&gt; (中国互联网协会, ISC — an industry association affiliated with MIIT) published the &lt;em&gt;China Internet Enterprise Comprehensive Strength Index (2025)&lt;/em&gt;. Buried in &lt;a href="https://www.isc.org.cn//profile//2025/12/29/f531871d-ded7-4502-bb26-6d829f12707a.pdf" target="_blank" rel="noreferrer"&gt;Appendix 3&lt;/a&gt; of the 39-page report is the &lt;strong&gt;2025 Top 20 Chinese Cybersecurity Enterprises (2025年中国网络安全前二十家企业)&lt;/strong&gt; — the officially sanctioned, publicly celebrated face of Chinese cybersec.&lt;/p&gt;</description></item><item><title>Anatomy of the One Fox Toolkit</title><link>https://xn--kemetmller-feb.com/blog/anatomy-of-the-one-fox-toolkit/</link><pubDate>Wed, 11 Feb 2026 21:25:10 +0100</pubDate><guid>https://xn--kemetmller-feb.com/blog/anatomy-of-the-one-fox-toolkit/</guid><description>&lt;h2 class="relative group"&gt;Introduction
 &lt;div id="introduction" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#introduction" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;When EclecticIQ analyzed a 2023 Cobalt Strike intrusion&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; at Taiwan&amp;rsquo;s Directorate General of Highways (MOTC), the most useful artifact wasn&amp;rsquo;t the malware. It was a filesystem path leaked in the C2 logs:&lt;/p&gt;
&lt;div class="highlight-wrapper"&gt;&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-text" data-lang="text"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;C:\Users\Test\Desktop\ONE-FOX集成工具箱_V1.0魔改版_by狐狸\gui_other\Cobalt_Strike_4.5\plugin\TaoWu\script\lazagne.exe&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;</description></item></channel></rss>