<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Natto Thoughts: Vulnerability Research]]></title><description><![CDATA[This section analyzes how China's vulnerability research ecosystem has matured – tracking the expanding range of actors involved, the platforms and institutions that organize their work, and the policy and market dynamics driving an increasingly systematic approach to bug discovery.]]></description><link>https://www.nattothoughts.com/s/vulnerability-research</link><image><url>https://substackcdn.com/image/fetch/$s_!t3eQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png</url><title>Natto Thoughts: Vulnerability Research</title><link>https://www.nattothoughts.com/s/vulnerability-research</link></image><generator>Substack</generator><lastBuildDate>Tue, 19 May 2026 11:28:31 GMT</lastBuildDate><atom:link href="https://www.nattothoughts.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Natto Thoughts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nattothoughts@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nattothoughts@substack.com]]></itunes:email><itunes:name><![CDATA[Natto Team]]></itunes:name></itunes:owner><itunes:author><![CDATA[Natto Team]]></itunes:author><googleplay:owner><![CDATA[nattothoughts@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nattothoughts@substack.com]]></googleplay:email><googleplay:author><![CDATA[Natto Team]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[A Researcher Came Knocking, and Taught China a Lesson in How to Manage Vulnerabilities and Researchers]]></title><description><![CDATA[A TCL TV vulnerability disclosure drove home the message: to protect its economic and political clout, China must heed global vulnerability researchers' warnings and cultivate Chinese researchers]]></description><link>https://www.nattothoughts.com/p/what-a-narrative-control-failure</link><guid isPermaLink="false">https://www.nattothoughts.com/p/what-a-narrative-control-failure</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 05 Nov 2025 17:02:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AAVj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff4cd9a2-2dcf-46a9-b9b3-60054797b9f9_1125x886.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the last few days of October 2025 in Asia, <a href="https://www.youtube.com/watch?v=6wU7nfqJ2SI">gift-giving</a> between top political leaders has drawn a lot of attention&#8212;and <a href="https://www.youtube.com/watch?v=1KdW6wjfTCY&amp;t=56s">laughter</a>. One moment, which surprised many of us, was when Chinese President Xi Jinping showed humor during his gift exchange with South Korean President Lee Jae Myung. It is rare to see a Chinese leader &#8220;<a href="https://www.nytimes.com/2025/11/02/world/asia/xi-jinping-china-south-korea-spying.html">speaking off the cuff in public</a>.&#8221; On this occasion, President Xi joked about backdoors in cellphones&#8212;yes, <a href="https://csrc.nist.gov/glossary/term/backdoor">backdoors</a> that can monitor or access the information in mobile devices.</p><p>During his first <a href="https://web.archive.org/web/20251104150038/https:/www.fmprc.gov.cn/eng/xw/zyxw/202511/t20251101_11745458.html">state visit</a> to South Korea after 11 years, Xi presented two Chinese-made Xiaomi brand smartphones&#8212;the world&#8217;s <a href="https://counterpointresearch.com/en/insights/global-smartphone-share">third-largest</a> smartphone brand&#8212;to South Korean President Lee Jae Myung. When Lee asked delightedly about the quality of communication and the security of the phone, Xi smiled and said, &#8220;You can check if there is a backdoor.&#8221;</p><p>President Xi is undoubtedly fully aware that the United States and its allies have warned that Chinese technology may contain <a href="https://selectcommitteeontheccp.house.gov/media/press-releases/gallagher-urges-us-navy-exchange-remove-ccp-linked-computers-stores">backdoors</a>&#8212;what the &#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/what-a-narrative-control-failure">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[China’s Vulnerability Research: What’s Different Now?]]></title><description><![CDATA[China&#8217;s bug-hunting scene is maturing - more players, bigger prizes, tighter structure, and a growing focus on domestic products, driven by profit, prestige, and national security.]]></description><link>https://www.nattothoughts.com/p/chinas-vulnerability-research-whats</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chinas-vulnerability-research-whats</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 08 Oct 2025 16:02:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gTJn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30c8e2fa-589c-4ffe-bb6d-4e2b530c40f0_936x484.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the past two decades, China&#8217;s vulnerability research ecosystem has undergone a dramatic transformation. <a href="https://nattothoughts.substack.com/p/no-ranges-no-bounties-no-contests">In the early 2000s</a>, it was a fragmented landscape of free databases and easily accessible, low-cost exploits. Over time, it evolved toward commercialization, with organized vulnerability markets and institutional research labs emerging within major tech and cybersecurity companies.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> By the mid-2010s, Chinese hackers were <a href="https://ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/cyber-report-2024-from-vegas-to-chengdu.pdf">competing &#8211; and excelling &#8211;</a> in global exploit hacking contests<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> and bug bounty programs<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> to identify weak spots in Western products.</p><p>As this ecosystem has evolved, the Chinese state moved to harness the vulnerability research for national priorities through both formal and informal channels. From the <strong>top down</strong>, it imposed institutional mechanisms such as direct oversight of researchers and regulations that mandate or incentivize reporting to state-run entities. From the<strong> bottom up</strong>, informal networks among prominent researchers, who exchange insights and acquisition o&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/chinas-vulnerability-research-whats">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Butian Vulnerability Platform: Forging China's Next Generation of White Hat Hackers]]></title><description><![CDATA[From 'Trouser Belt Project' to 'Patching the Sky': Qi An Xin&#8217;s Butian platform serves as cradle for nurturing new talent and smelter for refining seasoned hackers&#8217; skills]]></description><link>https://www.nattothoughts.com/p/butian-vulnerability-platform-forging</link><guid isPermaLink="false">https://www.nattothoughts.com/p/butian-vulnerability-platform-forging</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 25 Jun 2025 16:01:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!65V-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90294473-1641-498e-8329-372cbbfbe419_5198x4528.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In our<a href="https://nattothoughts.substack.com/p/defense-through-offense-mindset-from"> previous posting</a>, Natto Thoughts pointed out the Chinese cyberdefense mindset that, in order to protect one's own business or country, one needs to develop offensive skills. In other postings, the Natto Team has profiled various<a href="https://nattothoughts.substack.com/p/when-a-vocational-college-becomes"> institutes</a>,<a href="https://nattothoughts.substack.com/p/business-priorities-of-chinese-cyber"> cyber ranges</a>,<a href="https://nattothoughts.substack.com/p/the-pangu-teamios-jailbreak-and-vulnerability"> vulnerability research labs</a>, and<a href="https://nattothoughts.substack.com/p/the-matrix-cup-cultivating-top-hacking"> hacking competitions</a> that companies sponsor in order to nurture China's defensive talent through "attack-defense live-fire exercises" (&#25915;&#38450;&#23454;&#25112;&#28436;&#20064;) and other offensive skills. One prominent entity that brings these all together and has helped set the standard for this type of training is the<a href="https://www.butian.net/"> Butian (or Bu Tian) Vulnerability Response Platform</a> (&#34917;&#22825;&#28431;&#27934;&#21709;&#24212;&#24179;&#21488;) (Butian Platform). It appears designed to coopt would-be black-hat criminal hackers and young students and mold them into socially useful white-hat hackers, training them to defend China. Along the way, they also develop skills that can be used offensively against China's enemies. The term &#8220;white hat talent&#8221; (&#30333;&#24125;&#20154;&#25165;) has been frequently used in the Chin&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/butian-vulnerability-platform-forging">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[From Humble Beginnings: How a Vocational College Became a Vulnerability Powerhouse]]></title><description><![CDATA[Qingyuan Polytechnic's focus on vulnerability studies highlights China's continued efforts in gathering vulnerability resources]]></description><link>https://www.nattothoughts.com/p/when-a-vocational-college-becomes</link><guid isPermaLink="false">https://www.nattothoughts.com/p/when-a-vocational-college-becomes</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 28 May 2025 16:01:52 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/eff95e67-3463-4994-ad62-e66bdbd1f376_443x123.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In one of the <a href="https://nattothoughts.substack.com/p/i-soon-kicking-off-the-year-of-the">famously leaked chat messages</a> among members of i-SOON &#8211; the Chinese information security company allegedly linked to the <a href="https://www.fbi.gov/wanted/cyber/aquatic-panda-cyber-threat-actors">AQUATIC PANDA</a> threat group &#8211; group leader <a href="https://nattothoughts.substack.com/i/142403030/alternative-route-to-recruit">&#8220;Shutdown&#8221; declared</a> in 2020, &#8220;People who have attack and defense live-fire capabilities do not need degrees from elite universities.&#8221; He called for recruiting talented students from less-prestigious technical or regional educational institutions. One such institution rocketed to prominence on May 16 of this year. Qingyuan Polytechnic &#8211; a vocational school from a third-tier city<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> &#8211; was one of three higher education institutes honored as Outstanding Universities of the Year for Cooperation at the <a href="https://www.cnnvd.org.cn/home/childHome">China National Vulnerability Database of Information Security</a> (CNNVD)&#8217;s <a href="https://www.secrss.com/articles/78809">2024 Annual Work Review and Outstanding Recognition Conference</a>.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> The other recipients were Beihang University (&#21271;&#20140;&#33322;&#31354;&#33322;&#22825;&#22823;&#23398;) and Guangzhou University (&#24191;&#24030;&#22823;&#23398;), both well-known four-year universities.</p><p>At the conference, a number of prominent information securi&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/when-a-vocational-college-becomes">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>