Sitemap - 2025 - Natto Thoughts

The Many Arms of the MSS: Why Provincial Bureaus Matter in China’s Cyber Operations

Knownsec: The King of Vulnerability Missed Three Vulnerabilities of Its Own

China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs

A Researcher Came Knocking, and Taught China a Lesson in How to Manage Vulnerabilities and Researchers

Beyond the Aliases: Decoding Chinese Threat Group Attribution and the Human Factor

China’s Vulnerability Research: What’s Different Now?

Who is Salt Typhoon Really? Unraveling the Attribution Challenge

Salt Typhoon: New Joint Advisory Offers a Beacon Through the Storm but Stirs Up New Questions

No Ranges, No Bounties, No Contests: Forging Offensive Capabilities in China’s 2000s Hacker Scene

Few and Far Between: During China’s Red Hacker Era, Patriotic Hacktivism Was Widespread—Talent Was Not

When Privileged Access Falls into the Wrong Hands: Chinese Companies in Microsoft’s MAPP Program

HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem

Pick Your Innovation Path in AI: Chinese Edition

Butian Vulnerability Platform: Forging China's Next Generation of White Hat Hackers

Defense-Through-Offense Mindset: From a Taiwanese Hacker to the Engine of China’s Cybersecurity Industry

From Humble Beginnings: How a Vocational College Became a Vulnerability Powerhouse

From the World of “Hacker X Files” to the Whitewashed Business Sphere

Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S.

Indictments and Leaks: Different but Complementary Sources

Zhou Shuai: A Hacker’s Road to APT27

Where is i-SOON Now?

The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network

Sichuan Silence Information Technology and Guan Tianfeng: Your Criminal Our Hero

Salt Typhoon: the Other Shoe Has Dropped, but Consternation Continues

Chengdu: Teahouses, Hotpots, Universities and … Hackers