<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Natto Thoughts]]></title><description><![CDATA[Stories, analysis and insights from the intersection of culture, technology, and security.
]]></description><link>https://www.nattothoughts.com</link><image><url>https://substackcdn.com/image/fetch/$s_!t3eQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png</url><title>Natto Thoughts</title><link>https://www.nattothoughts.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 26 Apr 2026 05:44:04 GMT</lastBuildDate><atom:link href="https://www.nattothoughts.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Natto Thoughts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nattothoughts@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nattothoughts@substack.com]]></itunes:email><itunes:name><![CDATA[Natto Team]]></itunes:name></itunes:owner><itunes:author><![CDATA[Natto Team]]></itunes:author><googleplay:owner><![CDATA[nattothoughts@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nattothoughts@substack.com]]></googleplay:email><googleplay:author><![CDATA[Natto Team]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Chinese Firm Claims AI-Driven Bug Discovery Near Claude Mythos Scale]]></title><description><![CDATA[Chinese companies could match the capabilities attributed to Claude Mythos within months, according to industry experts, reinforcing existing cyber offense asymmetries]]></description><link>https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability</link><guid isPermaLink="false">https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 22 Apr 2026 13:03:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TRDG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3e4f5-c84e-44fd-bace-cf37376dd738_660x377.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p>&#8220;Whoever masters automated vulnerability discovery technology holds the upper hand in cyber offense and defense&#8221; &#8211; Zhou Hongyi, Chairman and CEO, 360 Digital Security Group (2018)</p></blockquote><p>On April 7, 2026, artificial intelligence developer Anthropic <a href="https://www.anthropic.com/glasswing">introduced</a> its new general-purpose model Claude Mythos Preview to a restricted partnership of over 40 vetted organizations, including major technology and cybersecurity firms, as part of its defensive security initiative Project Glasswing. The company stated that the Claude Mythos model has identified thousands of high-severity vulnerabilities across widely used software, including major operating systems and web browsers. Crucially, in some cases it can autonomously develop exploits and chain vulnerabilities without human intervention. Anthropic has not released the system publicly, citing the risks associated with such capabilities and the need for further safeguards before deployment at scale.</p><p>While independent assessment remains limited and technical details are sparse, governments are already responding: U.S. officials have <a href="https://www.theguardian.com/technology/2026/apr/10/us-summoned-bank-bosses-to-discuss-cyber-risks-posed-by-anthropic-latest-ai-model">reportedly briefed</a> financial institutions on AI-enabled cyber risks, while German authorities <a href="https://web.archive.org/web/20260410201011/https://www.politico.eu/article/german-cyber-agency-braces-for-significant-disruption-from-anthropics-ai-hacking-tech/">have warned</a> of significant disruption and the capacity of such systems to transform vulnerability discovery.</p><p>Recent developments suggest that similar capabilities are being explored in China. In February 2026, Natto Thoughts <a href="https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps">described</a> how a team from 360 Digital Security Group (&#22855;&#34382;360, hereafter &#8220;360&#8221;), which won first place at the 2026 Tianfu Cup, a major Chinese exploit hacking contest,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> had relied extensively on AI-assisted discovery and exploitation, with its team lead stating that AI has evolved &#8220;from an auxiliary tool to the core engine of vulnerability discovery.&#8221; The team that placed third made similar claims. This raises a central question: have Chinese companies already developed systems with capabilities comparable to those claimed for Claude Mythos, and how might differences in institutional context shape their impact?</p><p>This analysis focuses on 360 as a primary case study, given its position as a leading cybersecurity company in China, its strong track record in top-tier vulnerability research, and the relative visibility of its recent AI-related disclosures.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a>  Recent disclosures describe internally developed multi-agent systems capable of identifying vulnerabilities, supporting exploit development, and automating parts of the research workflow that were previously manual, with claimed discovery at a scale approaching Anthropic&#8217;s description of Claude Mythos. Other firms appear to be pursuing similar approaches, though with more limited public information. The analysis then considers how such capabilities could translate into an asymmetric offensive advantage in China&#8217;s favor.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.nattothoughts.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Cybersecurity Strategy in China’s 15th Five-Year Plan]]></title><description><![CDATA[China&#8217;s high-level cyber strategy for the next five years continues the effort to build a cyber superpower, outlining more detailed requirements]]></description><link>https://www.nattothoughts.com/p/cybersecurity-strategy-in-chinas</link><guid isPermaLink="false">https://www.nattothoughts.com/p/cybersecurity-strategy-in-chinas</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 08 Apr 2026 14:03:21 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1597052145380-3e353db8f594?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMXx8Y2hpbmElMjBmaXZlJTIweWVhciUyMHBsYW58ZW58MHx8fHwxNzc1NTkwNDAwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On March 12, 2026, the National People&#8217;s Congress approved the &#8220;Outline of the 15<sup>th</sup> Five-Year Plan for National Economic and Social Development (<a href="https://npcobserver.com/2026/03/16/china-npc-2026-results-documents/#gd9060cf1876f">15<sup>th</sup> FYP</a>) of the People&#8217;s Republic of China&#8221; (&#20013;&#21326;&#20154;&#27665;&#20849;&#21644;&#22269;&#22269;&#27665;&#32463;&#27982;&#21644;&#31038;&#20250;&#21457;&#23637;&#31532;&#21313;&#20116;&#20010;&#20116;&#24180;&#35268;&#21010;&#32434;&#35201;) (15<sup>th</sup> FYP), the country&#8217;s highest-level development blueprint, which covers the years 2026 to 2030. Over the years, the Western cybersecurity <a href="https://cloud.google.com/blog/topics/threat-intelligence/apt41-dual-espionage-and-cyber-crime-operation">industry</a>, the <a href="https://www.judiciary.senate.gov/imo/media/doc/Krebs%20Responses%20to%20QFRs1.pdf">US government</a> and <a href="https://www.aspistrategist.org.au/wondering-where-chinas-cyber-effort-will-go-next-just-read-the-five-year-plan/">other</a> private and public organizations have reported that China&#8217;s cyber operation targets are closely aligned with its strategic plans, including the FYP. Therefore, examining the strategic objectives in the FYPs is necessary to identify the likely intelligence requirements of China&#8217;s cyber operations. Meanwhile, the Natto Team has observed that China has incorporated relevant cybersecurity strategies into its FYPs since the <a href="https://policy.asiapacificenergy.org/sites/default/files/11th%20Five-Year%20Plan%20%282006-2010%29%20for%20National%20Economic%20and%20Social%20Development%20%28EN%29.pdf">11th FYP</a> (2006&#8211;2010) &#8211; from &#8220;strengthening the information safety (or security) guarantee&#8221; in the 11<sup>th</sup> FYP to &#8220;strengthening network and information security&#8221; in the <a href="https://policy.asiapacificenergy.org/sites/default/files/12th%20Five-Year%20Plan%20%282011-2015%29%20for%20National%20Economic%20and%20Social%20Development%20%28EN%29.pdf">12<sup>th</sup> FYP</a>, t&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/cybersecurity-strategy-in-chinas">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Wargaming a China-Taiwan Conflict and Its Cyber Scenarios ]]></title><description><![CDATA[China&#8217;s use of cyber strategies in a conflict with Taiwan is likely to follow a methodical, gradual approach]]></description><link>https://www.nattothoughts.com/p/wargaming-a-china-taiwan-conflict</link><guid isPermaLink="false">https://www.nattothoughts.com/p/wargaming-a-china-taiwan-conflict</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 25 Mar 2026 14:03:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fcLj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This post is co-authored by the Natto Team and Robin Dimyanoglu from<a href="https://blog.predictivedefense.io/"> Predictive Defense.</a></em></p><div><hr></div><p>Since the start of his second term in January 2025, the Trump administration has <a href="https://www.axios.com/2026/03/02/trump-iran-war-military-strikes-maga">conducted</a> military actions or strikes in seven countries. The ouster of Venezuelan president Nicolas Maduro in January 2026 and the ongoing US-Israeli joint military operation against Iran makes it feel as if the threshold for war has been lowered. Leaders across the globe are likely drawing their own conclusions. Bill Bishop, a China expert at Sinocism, <a href="https://substack.com/@sinocism/note/c-221158202?utm_source=notes-share-action&amp;r=1fj33r">remarked</a>, &#8220;Maduro and now Ayatollah Ali Khamenei in two months. Would love to know what Xi really thinks about this,&#8221; referring to Chinese President Xi Jinping. Indeed, what does Xi think about these developments? In particular, how do they shape Xi&#8217;s views on Taiwan &#8220;reunification&#8221;? Have US military actions in seven countries influenced Xi&#8217;s perspective on using military force to achieve China&#8217;s goal of &#8220;reunification&#8221;&#8212;which he <a href="https://www.nattothoughts.com/i/141051336/what-are-xis-thoughts-on-taiwan-reunification-and-the-use-of-force-over-taiwan">considers</a> a &#8220;historical inevitability&#8221;?</p><p>A potential conflict between China and Taiwan would represent a globally significant inflection point. Drawing from the Center for Strategic and International Studies (CSIS) 2023 <a href="https://www.csis.org/analysis/first-battle-next-war-wargaming-chinese-invasion-taiwan">report</a> <strong>The First Battle of the Next War: Wargaming a Chinese Invasion of Taiwan</strong>, this piece aims to conduct a reality check on a likely scenario of China-Taiwan conflict presented in the CSIS report, and examines the challenges and possible cyber implications of such a scenario and how organizations across sectors could be exposed, whether directly or indirectly.</p><p>Based on war games involving a simulated invasion, the CSIS study provides insights under clearly defined assumptions, including participating actors and their roles, mobilization timelines, ammunition availability and the type of operations conducted. While no single study can predict outcomes, its transparent methodology and multi-scenario approach provide a useful analytical foundation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fcLj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fcLj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png 424w, https://substackcdn.com/image/fetch/$s_!fcLj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png 848w, https://substackcdn.com/image/fetch/$s_!fcLj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png 1272w, https://substackcdn.com/image/fetch/$s_!fcLj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fcLj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc577850-d184-4217-869e-4c78b24a7a25_1280x853.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:90833,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nattothoughts.com/i/192025448?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fcLj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png 424w, https://substackcdn.com/image/fetch/$s_!fcLj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png 848w, https://substackcdn.com/image/fetch/$s_!fcLj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png 1272w, https://substackcdn.com/image/fetch/$s_!fcLj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc577850-d184-4217-869e-4c78b24a7a25_1280x853.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Credit: Wikimedia Commons</figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.nattothoughts.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/wargaming-a-china-taiwan-conflict">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Faux Amis: How France Stands Apart in Europe’s High-Risk University Cyber Partnerships with China]]></title><description><![CDATA[France hosts the EU&#8217;s densest cluster of cyber partnerships with Chinese defense-linked universities, raising exposure to dual-use knowledge transfer, EU funding access, and institutional influence]]></description><link>https://www.nattothoughts.com/p/faux-amis-how-france-stands-apart</link><guid isPermaLink="false">https://www.nattothoughts.com/p/faux-amis-how-france-stands-apart</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 11 Mar 2026 14:02:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LHZ9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdb67213-5a3f-474a-9d27-2e20244316ea_686x997.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In September 2025, Intelligence Online <a href="https://www.intelligenceonline.com/asia-pacific/2025/09/16/french-engineering-schools-call-off-partnership-with-chinese-military-linked-beihang-university,110522377-art">reported</a> that France&#8217;s National Institute of Applied Sciences (Institut National des Sciences Appliqu&#233;es, INSA) network of engineering schools had cancelled plans to establish a joint institute in Beijing with Beihang University (&#21271;&#20140;&#33322;&#31354;&#33322;&#22825;&#22823;&#23398;). The project had received initial clearance from relevant French ministries. Yet internal opposition within several INSA boards ultimately led to its cancellation just weeks before launch. According to the report, concerns centered on academic freedom and &#8220;the nature&#8221; of Beihang itself, which has been identified by a range of <a href="https://www.justice.gov/usao-ndca/pr/justice-department-declines-prosecution-company-self-disclosed-export-control-offenses">governments</a>, <a href="https://sciencebusiness.net/news/Horizon-Europe/read-details-five-eu-research-projects-involving-chinas-military-linked-universities?utm_source=chatgpt.com">research bodies</a>, and <a href="https://unitracker.aspi.org.au/universities/beihang-university?utm_source=chatgpt.com">policy institutions</a> as closely integrated into China&#8217;s defense research system and linked to the People&#8217;s Liberation Army.</p><p>The episode reflects growing awareness in parts of the European Union (EU) about the strategic implications of university partnerships with Chinese institutions embedded in the country&#8217;s defense research system. However, it remains an isolated institutional reversal, with similar collaborations persisting in a number of countries. In December 2025, Beihang itself <a href="https://ev.buaa.edu.cn/info/1022/2880.htm">claimed </a>to have &#8220;elevated European cooperation to new heights.&#8221;</p><p>Over the past decade, university cooperation between some EU member states and China has expanded rapidly across several fields. Many of these exchanges generate legitimate academic and economic benefits. However, some partner institutions are not simply civilian universities.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> They are formally authorized to conduct classified weapons equipment research and are structurally embedded in China&#8217;s military and defense industrial system, raising concerns about dual-use knowledge transfer &#8211; research with both civilian and military applications &#8211; access to EU funding streams, and long-term institutional exposure and influence aligned with defense research agendas.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><p>Cyber-related disciplines are particularly sensitive. Fields such as software engineering, telecommunications, computer science, and information security cultivate inherently dual-use skills. These capabilities support civilian digital infrastructure and defensive cybersecurity, but also enable cyber espionage &#8211; including intellectual property theft &#8211; offensive cyber operations, and applications such as secure military communications and strategic command systems. Such capabilities can be deployed remotely in both peacetime and conflict.</p><p>Within this landscape, France stands out. Among EU member states, it has the highest concentration of cyber partnerships involving Chinese institutions that hold state secrecy clearance or maintain formal ties to China&#8217;s defense establishment. This piece maps EU&#8211;China cyber-related joint degree partnerships, identifies institutional risk factors including security clearance status and defense affiliation, and examines the French case in depth. Beihang University&#8217;s School of Cyber Science and Technology serves as a central case study, including analysis of its state and defense industry ties and a review of research activities and affiliations of nearly 80 faculty members.</p><p><strong>The Appendix identifies EU&#8211;China cyber-related partnerships and their disciplinary focus, highlights relevant risk factors, and explains the methodology used to assess institutional affiliations and involvement in classified research.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.nattothoughts.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/faux-amis-how-france-stands-apart">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[China’s National Research Center for Information Technology Security: Is It Part of the PLA Cyberspace Force?]]></title><description><![CDATA[Under &#8220;Two signboards&#8221; arrangement, the NITSC offers services to public, Party, government, and military entities, under the guise of a civilian name.]]></description><link>https://www.nattothoughts.com/p/chinas-national-research-center-for</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chinas-national-research-center-for</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 25 Feb 2026 15:02:37 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1097b850-6b2f-4aa4-8b64-b9fc82d9ab40_624x100.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the years, the Natto Team has published a substantial amount of <a href="https://www.nattothoughts.com/p/flax-typhoon-linked-company-integrity">research</a> on the role of China&#8217;s private sector in building the country&#8217;s cyber capabilities. The private sector, particularly the cybersecurity industry, has become an indispensable resource for the Chinese government in conducting advanced technological cybersecurity research, supporting offensive cyber operations, and defending the country&#8217;s critical infrastructure. However, we recognize that no matter how important the private sector&#8217;s role is, the government and military must have their own affiliated entities to conduct cybersecurity research and development, respond to cyber incidents, protect critical infrastructure, perform security testing and product evaluation, and carry out cyber operations. Glimpses of their activity come to light, such as the 2020 US <a href="https://www.justice.gov/archives/opa/pr/chinese-military-personnel-charged-computer-fraud-economic-espionage-and-wire-fraud-hacking">indictment </a>of members of the PLA 54th Research Institute for the &#8220;brazen criminal heist&#8221; of information from US credit reporting agency Equifax.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> What more can we learn about entities directly affiliated with government agencies like the Ministry of State Security (MSS) or the People&#8217;s Liberation Army (PLA)? What capabilities do they possess that contribute to China&#8217;s emergence as &#8220;<a href="https://www.bloomsburycollections.com/monograph-detail?docid=b-9798881817602&amp;pdfid=9798881817602.ch-8.pdf&amp;tocid=b-9798881817602-chapter8#b-9798881817602-0002782">Cyber Superpower</a>&#8221;?</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6K3p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6K3p!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png 424w, https://substackcdn.com/image/fetch/$s_!6K3p!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png 848w, https://substackcdn.com/image/fetch/$s_!6K3p!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png 1272w, https://substackcdn.com/image/fetch/$s_!6K3p!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6K3p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png" width="624" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:624,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:82103,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nattothoughts.com/i/188980727?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6K3p!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png 424w, https://substackcdn.com/image/fetch/$s_!6K3p!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png 848w, https://substackcdn.com/image/fetch/$s_!6K3p!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png 1272w, https://substackcdn.com/image/fetch/$s_!6K3p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d6bf41-bb7b-4604-bf52-52bbf6f90a74_624x100.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">NITSC website banner. Source: NITSC</figcaption></figure></div><p>In this post, the Natto Team explores an example of a Chinese government and military-affiliated entity&#8212;the <strong>National Research Center for Information Technology Security (NITSC)</strong> (&#22269;&#23478;&#20449;&#24687;&#25216;&#26415;&#23433;&#20840;&#30740;&#31350;&#20013;&#24515;). We examine its organizational structure, affiliations, and capabilities, then reveal its military connections. Lastly, we present questions for further research.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.nattothoughts.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/chinas-national-research-center-for">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Tianfu Cup Returns Under MPS Leadership as AI Takes Center Stage]]></title><description><![CDATA[After a two-year hiatus, the Tianfu Cup returns under MPS lead, combining AI-assisted vulnerability discovery and exploitation, a new competition track, and less transparency in vulnerability handling]]></description><link>https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps</link><guid isPermaLink="false">https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 11 Feb 2026 14:02:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5R9h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Tianfu Cup (&#22825;&#24220;&#26479;), China&#8217;s premier exploit hacking competition,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> has returned to Chengdu, Sichuan Province, for its sixth edition, held from January 29 to 30, 2026. This time, under the organizational lead of China&#8217;s Ministry of Public Security (MPS), China&#8217;s domestic law-enforcement authority. Launched in 2018 after Chinese authorities <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/capture-the-red-flag-an-inside-look-into-chinas-hacking-contest-ecosystem/">barred</a> domestic researchers from participating in international exploit competitions, such as Canada&#8217;s Pwn2Own, the Tianfu Cup emerged as a domestic alternative for high-end vulnerability research and exploitation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5R9h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5R9h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 424w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 848w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 1272w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5R9h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png" width="1280" height="555" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:555,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:687976,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5R9h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 424w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 848w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 1272w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">2026 Tianfu Cup homepage. Screenshot by the Natto Team, taken on January 31, 2026, of the Tianfu Cup 2026 website.</figcaption></figure></div><p>After skipping three editions in 2022, 2024, and 2025, the competition has now reappeared, although the reasons for this hiatus and revival remain unclear. The event was <a href="https://archive.ph/gwwpl">first announced </a>on China&#8217;s MPS website on January 16. On January 19, the Tianfu Cup&#8217;s account on the social media platform X appears to have briefly posted about the competition before deleting the post shortly thereafter. The following day, the event&#8217;s website (hxxps://tianfucup[.]cn) became inaccessible from outside China. By February 2, following the conclusion of the contest, the site appeared to have been taken offline entirely and remains inaccessible as of this writing. The Natto Team was nonetheless able to access the website for this piece, which includes screenshots of relevant information, as well as MPS and private company press releases that remain accessible.</p><p>Building on earlier analyses of past Tianfu Cup events by the <a href="https://www.nattothoughts.com/p/tianfu-cup-2023-still-a-thing">Natto Team</a> and the <a href="https://css.ethz.ch/en/center/CSS-news/2024/06/from-vegas-to-chengdu-hacking-contests-bug-bounties-and-chinas-offensive-cyber-ecosystem.html">From Vegas to Chengdu report </a>from the Center for Security Studies at ETH Zurich, this piece examines what has changed with the Tianfu Cup&#8217;s return and why it matters. It analyzes the shift from a commercially led competition to one organized almost entirely by the MPS, specifically the Sichuan Provincial Public Security Bureau. It then looks at the structure of the 2026 edition and its two tracks, including evidence of AI-assisted techniques being used in vulnerability discovery and exploitation. Finally, it explores what remains the most consequential and unresolved question: where vulnerabilities discovered at the Tianfu Cup are likely to end up, and what this suggests about China&#8217;s evolving approach to vulnerability retention and state control.</p><p><strong>A complete list of competition targets, as disclosed on the 2026 Tianfu Cup website, is reproduced in the appendix at the end of this piece.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Natto Thoughts is a reader-supported publication. To receive new posts and support the Natto Team&#8217;s work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Provincial Tasking, Cross-Provincial Execution: A Case-Based Look at How China Scales Cyber Operations ]]></title><description><![CDATA[How decentralized MSS and MPS tasking and market-enabled, cross-provincial execution by commercial firms shape the scale of China&#8217;s cyber operations]]></description><link>https://www.nattothoughts.com/p/provincial-tasking-cross-provincial</link><guid isPermaLink="false">https://www.nattothoughts.com/p/provincial-tasking-cross-provincial</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 28 Jan 2026 15:02:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ubPc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c0b561-2e01-4c38-8600-398f7d87e69b_918x533.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In a previous piece, we<a href="https://nattothoughts.substack.com/p/the-many-arms-of-the-mss-why-provincial"> argued</a> that provincial Ministry of State Security (MSS) bureaus function as key organizational nodes in China&#8217;s cyber operations &#8211; acting as operational nerve centers with their own internal priorities, resources, and institutional logics.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> But this decentralization does not mean that cyber operations are siloed at the provincial level.</p><p>Disclosures from a 2024 leak, together with a March 2025 U.S. indictment involving Anxun (<a href="https://www.nattothoughts.com/p/i-soon-another-company-in-the-apt41">i-SOON</a>) Information Technology Co., Ltd (&#23433;&#27957;&#20449;&#24687;&#25216;&#26415;&#26377;&#38480;&#20844;&#21496;), which has been linked to Chinese state-sponsored cyber campaigns, <a href="https://www.justice.gov/opa/pr/justice-department-charges-12-chinese-contract-hackers-and-law-enforcement-officers-global">indicate</a> that a single commercial actor can be tasked by, actively seek contract opportunities from, or perform work for, a large number of provincial MSS and Ministry of Public Security (MPS) bureaus. This case provides rare visibility into how a single firm can support multiple, distinct provincial mandates and supply the operational capacity through which intrusions are carried out at near-national scale.</p><p>Building on this, this piece examines how companies allegedly linked to APT activity &#8211; concentrated in a small number of provinces &#8211; enable cross-provincial operational scaling, even as provincial bureaus remain the primary source of tasking and authority. It begins by briefly distinguishing legitimate businesses from front companies, then traces how earlier cyber operations were likely predominantly organized around provincially bounded, bureau-executed models centered on front companies.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> Next, it shows how market maturity enabled greater collaboration between government agencies and legitimate firms, and concludes by examining why these firms are concentrated in a handful of provinces.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Natto Thoughts is a reader-supported publication. To receive new posts and support the Natto Team&#8217;s work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.nattothoughts.com/p/provincial-tasking-cross-provincial">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[China’s 2025 Top 20 Cybersecurity Companies: Which “Dark Horses” Will Emerge to Prominence in 2026? ]]></title><description><![CDATA[Annual ranking reveals hyper-competitive, innovation-focused top performers &#8211; some familiar and some not so well known, with extensive government ties]]></description><link>https://www.nattothoughts.com/p/chinas-2025-top-20-cybersecurity</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chinas-2025-top-20-cybersecurity</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 14 Jan 2026 15:03:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RwhR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b597dc-7c82-41bd-9db6-ab262a67d0c7_623x849.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As we enter 2026, the geopolitical landscape appears more uncertain than ever. Ongoing conflicts, such as the Russia-Ukraine war, remain unresolved, while <a href="https://www.aei.org/articles/bracing-for-china-shock-2-0/">competition</a> among major world powers is intensifying. In such a climate, strength and capability are paramount. China&#8217;s cybersecurity industry <a href="https://web.archive.org/web/20251007173305/https:/www.ciids.cn/list_15/5033.html">recognizes</a> its special expertise as &#8220;the fundamental cornerstone for safeguarding national security.&#8221; Among the more than five thousand cybersecurity companies in China, which ones stand out as top providers of quality products and services, significantly contributing to China&#8217;s national security? The &#8220;2025 Top 20 Chinese Cybersecurity Enterprises (2025&#24180;&#20013;&#22269;&#32593;&#32476;&#23433;&#20840;&#21069;&#20108;&#21313;&#23478;&#20225;&#19994;)&#8221; list featured in the annual &#8220;China Internet Company Comprehensive Capability Index (CICCI) (&#20013;&#22269;&#20114;&#32852;&#32593;&#20225;&#19994;&#32508;&#21512;&#23454;&#21147;&#25351;&#25968;)&#8221; <a href="https://web.archive.org/web/20260108023343/https:/www.isc.org.cn/article/27470949623525376.html">report</a> published at the end of December 2025 by the <a href="https://web.archive.org/web/20250211023130/https:/www.isc.org.cn/article/15315.html">Internet Society of China</a> (ISC)&#8212;an industry association affiliated with the Chinese Ministry of Industry and Information Technology (MIIT)&#8212;offers a fresh perspective on the leading players in China&#8217;s cybersecurity industry as we begin our 2026 research focused on this sector.</p><p>The Natto Team believes that understanding these Chinese cybersecurity companies is essential for grasping how China develops its cyber capabilities. Since launching Natto Thoughts in 2023, our team has investigated several Chinese cybersecurity companies involved in state-sponsored or state-linked cyber operations. Our <a href="https://nattothoughts.substack.com/p/a-look-back-at-the-top-5-natto-thoughts">findings</a> suggest that China has established a highly effective and state-aligned system, notably integrating the private sector&#8212;Chinese cybersecurity companies&#8212;in building its cyber capabilities.</p><p>In this post, the Natto Team examines the overall development of China&#8217;s cybersecurity sector and the top cybersecurity companies of 2025 based on the ISC&#8217;s CICCI reports, which analyze these companies&#8217; key performance indicators, innovation and research and development (R&amp;D) capabilities, business and market coverage, and how their core functions align with China&#8217;s national priorities.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.nattothoughts.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/chinas-2025-top-20-cybersecurity">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[A Look Back at the Top 5 Natto Thoughts Reports in 2025]]></title><description><![CDATA[From attack&#8211;defense thinking to vulnerability research and exposed threat actors, we explored key aspects of China&#8217;s cyber ecosystem]]></description><link>https://www.nattothoughts.com/p/a-look-back-at-the-top-5-natto-thoughts</link><guid isPermaLink="false">https://www.nattothoughts.com/p/a-look-back-at-the-top-5-natto-thoughts</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Tue, 06 Jan 2026 15:03:16 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="4272" height="2848" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2848,&quot;width&quot;:4272,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a pile of paper with a pen on top of it&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a pile of paper with a pen on top of it" title="a pile of paper with a pen on top of it" srcset="https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1633180888652-c561b86040f1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1M3x8d29yayUyMGhhcmR8ZW58MHx8fHwxNzY3NzE2MjMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@jessica45">Jessica G.</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Natto Thoughts had a great year in 2025, experiencing strong growth in both readership and collaboration. The Natto Team would like to thank our readers for making our in-depth explorations of China&#8217;s evolving cyber ecosystem our most-viewed reports of the year. Your support drives our research. We also want to thank <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Eugenio Benincasa&quot;,&quot;id&quot;:5401290,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09a1f79e-07d1-4938-9147-e0df8440802f_800x800.jpeg&quot;,&quot;uuid&quot;:&quot;db8822bb-c731-4687-94d5-77593bfe9a7a&quot;}" data-component-name="MentionToDOM"></span> and <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Dakota Cary&quot;,&quot;id&quot;:88878145,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f14100c6-832f-4739-84c8-88b8137c5382_400x400.jpeg&quot;,&quot;uuid&quot;:&quot;af4734c9-6d88-43d6-af03-db21b098d6dd&quot;}" data-component-name="MentionToDOM"></span> for their research collaboration efforts. Three of the top five reports resulted from this partnership.</p><p>Collectively, these five reports provide a comprehensive overview of how China has formally institutionalized its cyber capabilities, resulting in a highly effective and state-aligned system&#8212;particularly highlighting the integrated role of the private sector.</p><p>Here are the highlights from the top 5 reports:</p><ul><li><p>&#8220;<strong><a href="https://nattothoughts.substack.com/p/defense-through-offense-mindset-from">Defense-Through-Offense Mindset: From a Taiwanese Hacker to the Engine of China&#8217;s Cybersecurity Industry</a></strong>&#8220;: This report demonstrated how the guiding philosophy, &#8220;To defend, one must first know how to attack&#8221; (&#20197;&#25915;&#20026;&#38450;), originated in 1990&#8230;</p></li></ul>
      <p>
          <a href="https://www.nattothoughts.com/p/a-look-back-at-the-top-5-natto-thoughts">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Many Arms of the MSS: Why Provincial Bureaus Matter in China’s Cyber Operations]]></title><description><![CDATA[Provincial bureaus of the Chinese Ministry of State Security likely operate with their own tasking priorities, resources, and local ecosystems for cyber operations]]></description><link>https://www.nattothoughts.com/p/the-many-arms-of-the-mss-why-provincial</link><guid isPermaLink="false">https://www.nattothoughts.com/p/the-many-arms-of-the-mss-why-provincial</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Tue, 16 Dec 2025 17:01:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6kZQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6kZQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6kZQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6kZQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6kZQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6kZQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6kZQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2518525,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nattothoughts.substack.com/i/181387803?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6kZQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6kZQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6kZQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6kZQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58ef68a6-8dd7-4c7a-b9e5-7a76a62e2ae5_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To defend systems, one must first pinpoint the source of malicious activity. Most cyber threat intelligence (CTI) firms focus on tactical and operational attribution: tactical attribution identifies and clusters technical details such as malware used, attack methods, or indicators of compromise, while operational attribution uses characteristics of activity clusters to infer group profiles and assigns labels like &#8220;APT&#8221; or &#8220;UNC.&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Strategic attribution goes further by identifying the real-world individuals or entities behind an intrusion.</p><p>Some CTI experts <a href="https://www.robertmlee.org/the-problems-with-seeking-and-avoiding-true-attribution-to-cyber-attacks/">debate</a> the conditions under which strategic attribution is appropriate, while others <a href="https://www.uclalawreview.org/wp-content/uploads/securepdfs/2020/09/Eichensehr-67-3.pdf">highlight</a> the technical challenges of identifying threat actors, the political motivations behind public disclosure, and the legal standards required to assign responsibility. The Natto Team and <a href="https://www.amazon.com/Attribution-Advanced-Persistent-Threats-cyber-espionage/dp/3662613123">other</a> researchers believe that &#8211; compared to &#8220;cluster-based&#8221; tactical and operational attribution &#8211; the strategic identification of real-world individuals and o&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/the-many-arms-of-the-mss-why-provincial">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Knownsec: The King of Vulnerability Missed Three Vulnerabilities of Its Own]]></title><description><![CDATA[The leak incident involving Chinese cybersecurity firm Knownsec shows the company&#8217;s seemingly transparent crisis management strategy and underscores its position in the industry, but mysteries remain.]]></description><link>https://www.nattothoughts.com/p/knownsec-the-king-of-vulnerability</link><guid isPermaLink="false">https://www.nattothoughts.com/p/knownsec-the-king-of-vulnerability</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 03 Dec 2025 17:02:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aJNH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a758e8-4f22-496d-a243-f6ae1908801d_535x710.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On November 5, 2025, a Chinese-language blog called <a href="https://archive.li/NNsWb#selection-347.3-347.169">Mrxn&#8217;s Blog</a> published a &#8220;massive&#8221; leak of information from Knownsec (&#30693;&#36947;&#21019;&#23431;), a Chinese cybersecurity company. Mrxn claimed that the leak included 12,000 confidential documents, such as &#8220;China&#8217;s state-level cyber weapons, internal tool systems, and global target lists.&#8221; The blog provided sample screenshots of the leak and noted that the leaked information first appeared on the code-sharing platform GitHub, which subsequently removed it &#8220;for violating its terms of service.&#8221; The <a href="https://netaskari.substack.com/p/knownsec-breach-what-we-know-so-far">NETASKARI</a> Substack was among the first outlets to report in English on Mrxn&#8217;s blog post about the leak. <a href="https://netaskari.substack.com/p/knownsec-breach-what-we-know-so-far">NETASKARI</a>&#8217;s author, a freelance journalist based in Amsterdam, The Netherlands, provided a summary and analysis of the limited available leaked documents&#8212;including screenshots of product brochures, data collection lists, and a Knownsec company profile&#8212;and concluded there was no &#8220;smoking gun&#8221; or evidence of state-of-the-art tools used by Chinese state hackers. H&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/knownsec-the-king-of-vulnerability">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs ]]></title><description><![CDATA[Private-sector attack-defense labs form a core pillar of how China builds, sustains, and operationalizes cyber capability for commercial purposes and state-linked cyber operations.]]></description><link>https://www.nattothoughts.com/p/chinas-cybersecurity-companies-advancing</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chinas-cybersecurity-companies-advancing</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 19 Nov 2025 17:03:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Aq32!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90fba30-e414-44b3-bb8b-c597c0e2e90f_720x405.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Western governments are grappling with how private-sector offensive cyber capabilities should fit into state operations. This raises a number of practical <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/cyber-privateers-the-return-of-the-hack-back-debate">questions</a>: If a state tasked a company with carrying out cyber operations against an adversary, who inside those organizations would actually carry out offensive work?<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> How would these units be structured for government tasks? And how would offensive activity coexist with a company&#8217;s day-to-day R&amp;D and commercial operations?</p><p>In China, these questions are far less abstract. Private companies have been core contributors to national cyber capability building for years, supported by both policy and institutional design. They develop many of the tools, techniques, and forms of expertise that underpin defensive security products and can also be leveraged for state-sponsored cyber operations. The clearest organizational expression of this approach is companies&#8217; widespread use of <strong>attack-defense labs (&#25915;&#38450;&#23454;&#39564;&#23460;)</strong>, internal units that merge defensiv&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/chinas-cybersecurity-companies-advancing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[A Researcher Came Knocking, and Taught China a Lesson in How to Manage Vulnerabilities and Researchers]]></title><description><![CDATA[A TCL TV vulnerability disclosure drove home the message: to protect its economic and political clout, China must heed global vulnerability researchers' warnings and cultivate Chinese researchers]]></description><link>https://www.nattothoughts.com/p/what-a-narrative-control-failure</link><guid isPermaLink="false">https://www.nattothoughts.com/p/what-a-narrative-control-failure</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 05 Nov 2025 17:02:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AAVj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff4cd9a2-2dcf-46a9-b9b3-60054797b9f9_1125x886.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the last few days of October 2025 in Asia, <a href="https://www.youtube.com/watch?v=6wU7nfqJ2SI">gift-giving</a> between top political leaders has drawn a lot of attention&#8212;and <a href="https://www.youtube.com/watch?v=1KdW6wjfTCY&amp;t=56s">laughter</a>. One moment, which surprised many of us, was when Chinese President Xi Jinping showed humor during his gift exchange with South Korean President Lee Jae Myung. It is rare to see a Chinese leader &#8220;<a href="https://www.nytimes.com/2025/11/02/world/asia/xi-jinping-china-south-korea-spying.html">speaking off the cuff in public</a>.&#8221; On this occasion, President Xi joked about backdoors in cellphones&#8212;yes, <a href="https://csrc.nist.gov/glossary/term/backdoor">backdoors</a> that can monitor or access the information in mobile devices.</p><p>During his first <a href="https://web.archive.org/web/20251104150038/https:/www.fmprc.gov.cn/eng/xw/zyxw/202511/t20251101_11745458.html">state visit</a> to South Korea after 11 years, Xi presented two Chinese-made Xiaomi brand smartphones&#8212;the world&#8217;s <a href="https://counterpointresearch.com/en/insights/global-smartphone-share">third-largest</a> smartphone brand&#8212;to South Korean President Lee Jae Myung. When Lee asked delightedly about the quality of communication and the security of the phone, Xi smiled and said, &#8220;You can check if there is a backdoor.&#8221;</p><p>President Xi is undoubtedly fully aware that the United States and its allies have warned that Chinese technology may contain <a href="https://selectcommitteeontheccp.house.gov/media/press-releases/gallagher-urges-us-navy-exchange-remove-ccp-linked-computers-stores">backdoors</a>&#8212;what the &#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/what-a-narrative-control-failure">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Beyond the Aliases: Decoding Chinese Threat Group Attribution and the Human Factor]]></title><description><![CDATA[Examining the overlap between APT27, HAFNIUM, and Silk Typhoon through recent U.S. government disclosures, and why understanding the humans behind the keyboard is important for cyber defenders]]></description><link>https://www.nattothoughts.com/p/beyond-the-aliases-decoding-chinese</link><guid isPermaLink="false">https://www.nattothoughts.com/p/beyond-the-aliases-decoding-chinese</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 22 Oct 2025 16:02:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!A03O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d29aed0-9fdf-49e1-82b3-bdf222dd2f0d_1553x497.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Since March 2025, the U.S. government has exposed Chinese hackers and entities linked to threat groups publicly tracked as <strong>APT27</strong>, <strong>HAFNIUM</strong>, <strong>Silk Typhoon</strong>, and other threat group monikers. Among these named Advanced Persistent Threat (APT) groups, technical analysis and observed intrusion activities from the cybersecurity community have provided group tracking criteria and measures to mitigate harm and to eradicate malware from systems and networks. Because cybersecurity firms often use different threat models, have their own standards for clustering intrusions, and closely guard their <a href="https://www.proofpoint.com/us/threat-reference/telemetry">telemetry data</a>&#8212;often not sharing with others&#8212;we see threat groups labeled with a number of &#8220;a.k.a.&#8221; (also known as) group names. For example, the <a href="https://malpedia.caad.fkie.fraunhofer.de/actor/apt27">profile of APT27</a> on Malpedia, a community-curated online malware encyclopedia and resource, lists 16 a.k.a. group names. How do these a.k.a. groups overlap? How are they different from one another? The answers are not always clear.</p><p>Additionally, when law enforceme&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/beyond-the-aliases-decoding-chinese">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[China’s Vulnerability Research: What’s Different Now?]]></title><description><![CDATA[China&#8217;s bug-hunting scene is maturing - more players, bigger prizes, tighter structure, and a growing focus on domestic products, driven by profit, prestige, and national security.]]></description><link>https://www.nattothoughts.com/p/chinas-vulnerability-research-whats</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chinas-vulnerability-research-whats</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 08 Oct 2025 16:02:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gTJn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30c8e2fa-589c-4ffe-bb6d-4e2b530c40f0_936x484.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the past two decades, China&#8217;s vulnerability research ecosystem has undergone a dramatic transformation. <a href="https://nattothoughts.substack.com/p/no-ranges-no-bounties-no-contests">In the early 2000s</a>, it was a fragmented landscape of free databases and easily accessible, low-cost exploits. Over time, it evolved toward commercialization, with organized vulnerability markets and institutional research labs emerging within major tech and cybersecurity companies.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> By the mid-2010s, Chinese hackers were <a href="https://ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/cyber-report-2024-from-vegas-to-chengdu.pdf">competing &#8211; and excelling &#8211;</a> in global exploit hacking contests<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> and bug bounty programs<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> to identify weak spots in Western products.</p><p>As this ecosystem has evolved, the Chinese state moved to harness the vulnerability research for national priorities through both formal and informal channels. From the <strong>top down</strong>, it imposed institutional mechanisms such as direct oversight of researchers and regulations that mandate or incentivize reporting to state-run entities. From the<strong> bottom up</strong>, informal networks among prominent researchers, who exchange insights and acquisition o&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/chinas-vulnerability-research-whats">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Who is Salt Typhoon Really? Unraveling the Attribution Challenge]]></title><description><![CDATA[How overlapping APT groups and Chinese companies complicate attribution in state cyber operations]]></description><link>https://www.nattothoughts.com/p/who-is-salt-typhoon-really-unraveling</link><guid isPermaLink="false">https://www.nattothoughts.com/p/who-is-salt-typhoon-really-unraveling</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 24 Sep 2025 16:08:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gpjA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Our <a href="https://nattothoughts.substack.com/p/salt-typhoon-new-joint-advisory-offers">previous post</a> about Salt Typhoon provided an initial commentary on the <a href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Joint Cybersecurity Advisory</a> on Salt Typhoon issued on August 27, 2025. The advisory identified three Chinese companies - <strong><a href="https://nattothoughts.substack.com/i/155370638/sichuan-juxinhes-area-of-focus-communication-system-services-aligns-with-salt-typhoon-targeting">Sichuan Juxinhe Network Technology Co. Ltd</a></strong>. (&#22235;&#24029;&#32858;&#20449;&#21644;&#32593;&#32476;&#31185;&#25216;&#26377;&#38480;&#20844;&#21496;), <strong><a href="https://nattothoughts.substack.com/i/173242203/beijing-huanyu-tianqiong-as-a-front-company-changing-business-scopes-to-meet-client-needs">Beijing Huanyu Tianqiong Information Technology Co., Ltd</a></strong><a href="https://nattothoughts.substack.com/i/173242203/beijing-huanyu-tianqiong-as-a-front-company-changing-business-scopes-to-meet-client-needs">.</a> (&#21271;&#20140;&#23536;&#23431;&#22825;&#31353;&#20449;&#24687;&#25216;&#26415;&#26377;&#38480;&#20844;&#21496;), and <strong><a href="https://nattothoughts.substack.com/i/173242203/sichuan-zhixin-ruijie-as-a-real-business-lacking-a-company-webpage-but-engaged-in-dedicated-contract-work">Sichuan Zhixin Ruijie Network Technology Co., Ltd</a>.</strong> (&#22235;&#24029;&#26234;&#20449;&#38160;&#25463;&#32593;&#32476;&#31185;&#25216;&#26377;&#38480;&#20844;&#21496;) - as suppliers of products and services to Salt Typhoon and other overlapping groups such as OPERATOR PANDA, RedMike, UNC5807, and GhostEmperor. After examining these three Chinese companies and their possible roles in Salt Typhoon-related cyber operations, we presented a few questions worth further exploration. In this post, we will address questions about the involvement of Chinese companies in state-sponsored cyber operations and share some observations on threat attribution from the joint advisory.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gpjA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gpjA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png 424w, https://substackcdn.com/image/fetch/$s_!gpjA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png 848w, https://substackcdn.com/image/fetch/$s_!gpjA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png 1272w, https://substackcdn.com/image/fetch/$s_!gpjA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gpjA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png" width="645" height="469" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:469,&quot;width&quot;:645,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:291965,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nattothoughts.substack.com/i/174415649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gpjA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png 424w, https://substackcdn.com/image/fetch/$s_!gpjA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png 848w, https://substackcdn.com/image/fetch/$s_!gpjA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png 1272w, https://substackcdn.com/image/fetch/$s_!gpjA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06d2d4d7-087f-4451-99af-0a8bf74fb309_645x469.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>First, an update: The Company Webpage of Sichuan Zhixin Ruijie is Found</h1><p>Previously, the&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/who-is-salt-typhoon-really-unraveling">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Salt Typhoon: New Joint Advisory Offers a Beacon Through the Storm but Stirs Up New Questions]]></title><description><![CDATA[Analysis of newly identified Salt Typhoon-linked companies casts light on the complex ecosystem of front companies and real businesses supporting Chinese state cyber operations]]></description><link>https://www.nattothoughts.com/p/salt-typhoon-new-joint-advisory-offers</link><guid isPermaLink="false">https://www.nattothoughts.com/p/salt-typhoon-new-joint-advisory-offers</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 10 Sep 2025 16:03:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ctsD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ctsD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ctsD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ctsD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ctsD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ctsD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ctsD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2082888,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nattothoughts.substack.com/i/173242203?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ctsD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ctsD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ctsD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ctsD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8f16a8d-9f17-4b85-89bd-91fbc76f7be6_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: ChatGPT image</figcaption></figure></div><p>On August 27, 2025, the United States and 22 government agencies from 13 countries issued a <a href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Cybersecurity Advisory</a> entitled, &#8220;<strong>Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System</strong>.&#8221; The advisory outlined the tactics, techniques, and procedures (TTPs) employed by advanced persistent threat (APT) actors whose activity partially overlaps with activity grouped under names such as Salt Typhoon, OPERATOR PANDA, RedMike, UNC5807, and GhostEmperor.</p><p>The document identified three Chinese companies&#8212;<strong>Sichuan Juxinhe Network Technology Co. Ltd.</strong> (&#22235;&#24029;&#32858;&#20449;&#21644;&#32593;&#32476;&#31185;&#25216;&#26377;&#38480;&#20844;&#21496;), <strong>Beijing Huanyu Tianqiong Information Technology Co., Ltd</strong>. (&#21271;&#20140;&#23536;&#23431;&#22825;&#31353;&#20449;&#24687;&#25216;&#26415;&#26377;&#38480;&#20844;&#21496;), and <strong>Sichuan Zhixin Ruijie Network Technology Co., Ltd</strong>. (&#22235;&#24029;&#26234;&#20449;&#38160;&#25463;&#32593;&#32476;&#31185;&#25216;&#26377;&#38480;&#20844;&#21496;)&#8212;that have supported these APT activities globally since at least 2021. These organizations reportedly supplied cyber-related products and services to China&#8217;s intelligence entities, including units within the People&#8217;s Liberat&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/salt-typhoon-new-joint-advisory-offers">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[No Ranges, No Bounties, No Contests: Forging Offensive Capabilities in China’s 2000s Hacker Scene]]></title><description><![CDATA[China&#8217;s early hacking training grounds weren&#8217;t classrooms or hacking contests, but online forums, real-world targets, and freely shared offensive tools and vulnerabilities.]]></description><link>https://www.nattothoughts.com/p/no-ranges-no-bounties-no-contests</link><guid isPermaLink="false">https://www.nattothoughts.com/p/no-ranges-no-bounties-no-contests</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 27 Aug 2025 16:03:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!e5af!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9d148bf-4455-43f7-baed-71935072398e_1600x857.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code>This post is adapted from the Cyberdefense Report <a href="https://ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/before-vegas-cyberdefense-report.pdf">"Before Vegas: The &#8216;Red Hackers&#8217; Who Shaped China&#8217;s Cyber Ecosystem,"</a> published in July 2025 by the Center for Security Studies (CSS) at ETH Zurich, Switzerland.</code></pre><p>In our <a href="https://nattothoughts.substack.com/p/few-and-far-between-during-chinas">last piece</a>, we showed how truly elite offensive cyber talent has always been scarce, even within China&#8217;s massive hacker communities of the 2000s. But how did this small circle of talent actually develop offensive capabilities? In China, these fall under the broader category of &#8220;live-fire&#8221; capabilities (&#23454;&#25112;&#33021;&#21147;),<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> i.e. the ability to apply tools and techniques such as penetration testing, security operations, and incident response. As we discussed <a href="https://nattothoughts.substack.com/p/the-matrix-cup-cultivating-top-hacking">here</a>, <a href="https://nattothoughts.substack.com/p/business-priorities-of-chinese-cyber">here</a>, and <a href="https://nattothoughts.substack.com/p/butian-vulnerability-platform-forging">here</a>, hacking contests, bug bounty platforms, and cyber ranges have become core pillars of China&#8217;s modern live-fire talent pipeline. Today, these mechanisms are deeply institutionalized across universities, companies, and state-backed initiatives, serving as the backbone for identifying and training skilled operators.</p>
      <p>
          <a href="https://www.nattothoughts.com/p/no-ranges-no-bounties-no-contests">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Few and Far Between: During China’s Red Hacker Era, Patriotic Hacktivism Was Widespread—Talent Was Not]]></title><description><![CDATA[Inside the small, elite circles that powered China&#8217;s massive hacker communities in the late 1990s and 2000s.]]></description><link>https://www.nattothoughts.com/p/few-and-far-between-during-chinas</link><guid isPermaLink="false">https://www.nattothoughts.com/p/few-and-far-between-during-chinas</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 13 Aug 2025 16:02:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ypOm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae33562e-3979-4d38-85d7-8a1fc151b346_490x490.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code>This post is excerpted from the Cyberdefense Report <a href="https://css.ethz.ch/en/center/CSS-news/2025/07/before-vegas-the-red-hackers-who-shaped-chinas-cyber-ecosystem.html">"Before Vegas: The &#8216;Red Hackers&#8217; Who Shaped China&#8217;s Cyber Ecosystem,"</a> published in July 2025 by the Center for Security Studies (CSS) at ETH Zurich, Switzerland.</code></pre><p>Truly elite offensive cyber talent has always been rare. Despite the growth of cybersecurity communities worldwide, and the emergence of extensive and structured talent pipelines in countries like China &#8211; examined in Natto pieces<a href="https://nattothoughts.substack.com/p/the-matrix-cup-cultivating-top-hacking"> 1</a>,<a href="https://nattothoughts.substack.com/p/when-a-vocational-college-becomes"> 2</a> and<a href="https://nattothoughts.substack.com/p/debating-chinas-ai-path-alternative"> 3</a> &#8211; which have made high-quality talent more widely available, truly exceptional individuals remain scarce and highly sought after.</p><p>As early as 2013, the<a href="https://www.airuniversity.af.edu/CASI/Display/Article/2485204/plas-science-of-military-strategy-2013/"> Science of Military Strategy</a>&#8212;a foundational text published by the PLA Academy of Military Science&#8212;noted that while cyber warfare benefits from a &#8220;broad mass base,&#8221; the traditional Chinese military ideal of &#8220;all people are soldiers&#8221; does not translate to cyberspace. Instead, it emphasized that only an &#8220;<a href="https://www.bloomsburycollections.com/monograph-detail?docid=b-9798881817602&amp;pdfid=9798881817602.ch-8.pdf&amp;tocid=b-9798881817602-chapter8">extremely lean</a>&#8221; cohort possessed the capabilities required for high-level cyber operations.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/few-and-far-between-during-chinas">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[When Privileged Access Falls into the Wrong Hands: Chinese Companies in Microsoft’s MAPP Program]]></title><description><![CDATA[Chinese companies face conflicting pressures between MAPP&#8217;s non-disclosure requirements and domestic policies that incentivize or mandate vulnerability disclosure to the state.]]></description><link>https://www.nattothoughts.com/p/when-privileged-access-falls-into</link><guid isPermaLink="false">https://www.nattothoughts.com/p/when-privileged-access-falls-into</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Thu, 31 Jul 2025 16:32:47 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b07d2c53-6b69-4554-9a0c-034eafed25b7_614x837.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On July 25, 2025, Bloomberg <a href="https://www.bloomberg.com/news/articles/2025-07-25/microsoft-sharepoint-hack-probe-on-whether-chinese-hackers-found-flaw-via-alert?srnd=undefined">reported </a>that Microsoft is investigating whether a leak from its Microsoft Active Protections Program (MAPP) allowed Chinese hackers to exploit a SharePoint vulnerability before a patch was released. Microsoft attributed the campaign &#8211; dubbed &#8220;ToolShell&#8221; after the custom remote access trojan used &#8211; to three China-linked threat actors: Linen Typhoon, Violet Typhoon, and Storm-2603. The attackers reportedly compromised over 400 organizations worldwide, including the U.S. National Nuclear Security Administration.</p><p>Launched in 2008, MAPP is designed to reduce the time between the discovery of a vulnerability and the deployment of patches. By giving trusted security vendors early access to technical details about upcoming patches, Microsoft enables them to release protections (such as antivirus signatures and intrusion detection rules) in sync with its monthly updates. The program, however, relies on strict compliance with non-disclosure agreements and the secure &#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/when-privileged-access-falls-into">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>