Przejdź do treści

Governance von 0-Day-Schwachstellen in der deutschen Cyber-Sicherheitspolitik

Security vulnerabilities in hardware and software are a global, collective cyber security problem. The advancing digitalisation of the living world, combined with digital arms races, increase vulnerability, especially in industrialised countries. At the same time, offensive cyber actors insist that the exploitation of so-called zero-day („0-day”) vulnerabilities is essential for military cyber operations, but also for the purpose of espionage and law enforcement.

A constructive approach to this offensive-defensive dilemma that states face when handling 0-day vulnerabilities has not yet been taken in German cyber security policy. The German government should develop a more proactive approach regarding vulnerabilities. It should rethink the practice of state acquisition and use of vulnerabilities, work towards shortening the lifetime of vulnerabilities, and reflect on the negative externalities of an offensive cybersecurity policy. Germany and the EU should cultivate a more open approach to vulnerabilities instead of prioritising secrecy. This includes the introduction of mandatory reporting programmes for private and public organisations, the provision of bug bounty platforms, and the regulation of vulnerability black markets.

More external publications

  • Research and Analysis
Hand and Glove: How Authoritarian Cyber Operations Leverage Non-state Capabilities

26 June 2025
In this article, Jakob Bund examines how authoritarian states like Russia, China, and North Korea increasingly harness non-state cyber actors to expand their capabilities, blur attribution, and complicate global responses. He argues that this growing fusion of state and criminal or contractor activity demands integrated threat assessments and response tools that can operate independently of political attribution.

Welcome to our Cyber Incident Dashboard!

For best results, please view on a desktop device.