<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Natto Thoughts: Hacking Contests & Training]]></title><description><![CDATA[This section examines the structured mechanisms through which China identifies, develops, and retains offensive cyber talent – from hacking competitions that funnel vulnerabilities upward to the state, to cyber ranges that simulate attack-defense environments for training and capability development.]]></description><link>https://www.nattothoughts.com/s/hacking-contests-and-training</link><image><url>https://substackcdn.com/image/fetch/$s_!t3eQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png</url><title>Natto Thoughts: Hacking Contests &amp; Training</title><link>https://www.nattothoughts.com/s/hacking-contests-and-training</link></image><generator>Substack</generator><lastBuildDate>Wed, 13 May 2026 13:52:27 GMT</lastBuildDate><atom:link href="https://www.nattothoughts.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Natto Thoughts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nattothoughts@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nattothoughts@substack.com]]></itunes:email><itunes:name><![CDATA[Natto Team]]></itunes:name></itunes:owner><itunes:author><![CDATA[Natto Team]]></itunes:author><googleplay:owner><![CDATA[nattothoughts@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nattothoughts@substack.com]]></googleplay:email><googleplay:author><![CDATA[Natto Team]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Tianfu Cup Returns Under MPS Leadership as AI Takes Center Stage]]></title><description><![CDATA[After a two-year hiatus, the Tianfu Cup returns under MPS lead, combining AI-assisted vulnerability discovery and exploitation, a new competition track, and less transparency in vulnerability handling]]></description><link>https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps</link><guid isPermaLink="false">https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 11 Feb 2026 14:02:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5R9h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Tianfu Cup (&#22825;&#24220;&#26479;), China&#8217;s premier exploit hacking competition,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> has returned to Chengdu, Sichuan Province, for its sixth edition, held from January 29 to 30, 2026. This time, under the organizational lead of China&#8217;s Ministry of Public Security (MPS), China&#8217;s domestic law-enforcement authority. Launched in 2018 after Chinese authorities <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/capture-the-red-flag-an-inside-look-into-chinas-hacking-contest-ecosystem/">barred</a> domestic researchers from participating in international exploit competitions, such as Canada&#8217;s Pwn2Own, the Tianfu Cup emerged as a domestic alternative for high-end vulnerability research and exploitation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5R9h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5R9h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 424w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 848w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 1272w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5R9h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png" width="1280" height="555" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:555,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:687976,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5R9h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 424w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 848w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 1272w, https://substackcdn.com/image/fetch/$s_!5R9h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73caeb4b-09f3-4459-bd6e-74f6af4cba5d_1280x555.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">2026 Tianfu Cup homepage. Screenshot by the Natto Team, taken on January 31, 2026, of the Tianfu Cup 2026 website.</figcaption></figure></div><p>After skipping three editions in 2022, 2024, and 2025, the competition has now reappeared, although the reasons for this hiatus and revival remain unclear. The event was <a href="https://archive.ph/gwwpl">first announced </a>on China&#8217;s MPS website on January 16. On January 19, the Tianfu Cup&#8217;s account on the social media platform X appears to have briefly posted about the competition before deleting the post shortly thereafter. The following day, the event&#8217;s website (hxxps://tianfucup[.]cn) became inaccessible from outside China. By February 2, following the conclusion of the contest, the site appeared to have been taken offline entirely and remains inaccessible as of this writing. The Natto Team was nonetheless able to access the website for this piece, which includes screenshots of relevant information, as well as MPS and private company press releases that remain accessible.</p><p>Building on earlier analyses of past Tianfu Cup events by the <a href="https://www.nattothoughts.com/p/tianfu-cup-2023-still-a-thing">Natto Team</a> and the <a href="https://css.ethz.ch/en/center/CSS-news/2024/06/from-vegas-to-chengdu-hacking-contests-bug-bounties-and-chinas-offensive-cyber-ecosystem.html">From Vegas to Chengdu report </a>from the Center for Security Studies at ETH Zurich, this piece examines what has changed with the Tianfu Cup&#8217;s return and why it matters. It analyzes the shift from a commercially led competition to one organized almost entirely by the MPS, specifically the Sichuan Provincial Public Security Bureau. It then looks at the structure of the 2026 edition and its two tracks, including evidence of AI-assisted techniques being used in vulnerability discovery and exploitation. Finally, it explores what remains the most consequential and unresolved question: where vulnerabilities discovered at the Tianfu Cup are likely to end up, and what this suggests about China&#8217;s evolving approach to vulnerability retention and state control.</p><p><strong>A complete list of competition targets, as disclosed on the 2026 Tianfu Cup website, is reproduced in the appendix at the end of this piece.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Natto Thoughts is a reader-supported publication. To receive new posts and support the Natto Team&#8217;s work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Business Priorities of Chinese Cyber Range Providers Go Hand in Hand with State Cyber Capability Development ]]></title><description><![CDATA[China&#8217;s cyber range market booms, fueled by the state&#8217;s demand for developing capable cyber talent and improving the effectiveness of &#8220;attack and defense live-fire capability&#8221;]]></description><link>https://www.nattothoughts.com/p/business-priorities-of-chinese-cyber</link><guid isPermaLink="false">https://www.nattothoughts.com/p/business-priorities-of-chinese-cyber</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 09 Oct 2024 16:02:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f7b4593-80e3-4749-a3ea-0765065f20a0_680x434.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code><em>This post is co-authored by the Natto Team and <a href="https://www.linkedin.com/in/eugenio-benincasa-07a9517a/">Eugenio Benincasa</a>, a senior researcher at the Center for Security Studies at the Swiss Federal Institute of Technology Zurich (ETH Zurich). The report by Benincasa and <a href="https://www.linkedin.com/in/dakotacary/">Dakota Cary</a>, Strategic Advisory Consultant at SentinelOne, titled &#8220;<strong><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/capture-the-red-flag-an-inside-look-into-chinas-hacking-contest-ecosystem/">Capture The (Red) Flag: An Inside Look into China&#8217;s Hacking Contest Ecosystem</a></strong>,&#8221; is published by the Atlantic Council in October. The report examines over 120 hacking contests in China since 2004 and delves into the key elements of China&#8217;s hacking contest ecosystem, such as growth enablers, competition hosts, and cyber range providers, while highlighting specific contests associated with China&#8217;s government security agencies.</em></code></pre><p>In September 2024, the FBI announced the seizure of a botnet operated by Integrity Technology (Integrity Tech), a Chinese information technology company linked to cyber threat group Flax Typhoon, which targeted critical infrastructure globally, including in the U.S. and Taiwan. The Integri&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/business-priorities-of-chinese-cyber">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Matrix Cup: Cultivating Top Hacking Talent, Keeping Close Hold on Results]]></title><description><![CDATA[Matrix Cup aligns with China&#8217;s strategy to enhance its offensive and defensive cyber capabilities by increasing the volume of vulnerabilities available domestically and fostering young hacking talent.]]></description><link>https://www.nattothoughts.com/p/the-matrix-cup-cultivating-top-hacking</link><guid isPermaLink="false">https://www.nattothoughts.com/p/the-matrix-cup-cultivating-top-hacking</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 24 Jul 2024 16:01:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dH6l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb07d9b0b-ffd2-4aa8-b5b3-559adae9be7f_936x740.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code><em>The Natto Team is honored to invite <a href="https://css.ethz.ch/en/center/people/eugenio-benincasa.html">Eugenio Benincasa</a>, a senior researcher at the Center for Security Studies at the Swiss Federal Institute of Technology Zurich (ETH Zurich), to co-author this post. Eugenio&#8217;s report &#8220;<strong><a href="https://css.ethz.ch/en/publications/risk-and-resilience-reports/details.html?id=/f/r/o/m/from_vegas_to_chengdu_hacking_contests_b">From Vegas to Chengdu: Hacking Contests, Bug Bounties, and China&#8217;s Offensive Cyber Ecosystem</a></strong>&#8221; is a must-read to understand how China's &nbsp;offensive cyber ecosystem thrives by leveraging civilian hackers who excel in major hacking competitions and bug bounty programs.</em></code></pre><p>China&#8217;s brand-new hacking contest, <a href="https://web.archive.org/web/20240514095142/https://matrixcup.net/page/race/home/">Matrix Cup</a> (&#30697;&#38453;&#26479;), was inaugurated in May 2024 in Qingdao, Shandong Province, and introduced as a &#8220;high-profile and large-scale cybersecurity competition in the Eastern Hemisphere.&#8221; This is no exaggeration. Organized by 360 Digital Security Group and Beijing Huayunan Information Technology Co. (also known as VUL.AI), the Matrix Cup brings together China&#8217;s highly influential actors from academia and the private sector, featuring various types of challenges and offering substanti&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/the-matrix-cup-cultivating-top-hacking">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Tianfu Cup 2023: Still a Thing]]></title><description><![CDATA[China&#8217;s premier hacking competition returns with a more inward-looking focus but sustained interest in Western tech majors&#8217; vulnerabilities.]]></description><link>https://www.nattothoughts.com/p/tianfu-cup-2023-still-a-thing</link><guid isPermaLink="false">https://www.nattothoughts.com/p/tianfu-cup-2023-still-a-thing</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Thu, 16 Nov 2023 23:04:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!r7RD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><a href="https://www.tianfucup.com">Tianfu Cup (TFC) 2023</a>, China&#8217;s prestigious answer to the annual hacking competition <a href="https://en.wikipedia.org/wiki/Pwn2Own">Pwn2Own</a>, took place from October 31 to November 1 in Chengdu, Sichuan Province this year. Compared to <a href="https://www.forbes.com/sites/daveywinder/2021/10/18/iphone-13-pro-hacked-chinese-hackers-suddenly-break-ios-1502-security/">last</a>, this year&#8217;s competition generated little overseas media coverage or chatter among overseas security researchers. Nevertheless, Natto Team observed some noteworthy changes and features in this year&#8217;s Tianfu Cup.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r7RD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r7RD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png 424w, https://substackcdn.com/image/fetch/$s_!r7RD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png 848w, https://substackcdn.com/image/fetch/$s_!r7RD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png 1272w, https://substackcdn.com/image/fetch/$s_!r7RD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r7RD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png" width="596" height="334" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:334,&quot;width&quot;:596,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:211614,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!r7RD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png 424w, https://substackcdn.com/image/fetch/$s_!r7RD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png 848w, https://substackcdn.com/image/fetch/$s_!r7RD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png 1272w, https://substackcdn.com/image/fetch/$s_!r7RD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6f36080-947e-4fa4-b283-ed4ee33d894f_596x334.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Screenshot by the author, taken November 15 2023 of Tianfu Cup 2023 website. Source: Tianfu Cup</em></figcaption></figure></div><h1>What is the Tianfu Cup and How Did it Catch Western Media Attention Previously?&nbsp;</h1><p>Tianfu Cup, officially described as a&nbsp; hacking competition and international cybersecurity summit, was born in 2018 at a time of upheaval in China&#8217;s approach to information security research.&nbsp; China had <a href="https://cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/">prohibited</a> its own security researchers from participating in international hacking competition, and <a href="https://archive.ph/PwKpN#">Chinese industry experts</a> proposed to the government that vulnerabilities should be considered as national strategic re&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/tianfu-cup-2023-still-a-thing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>