Natto Thoughts
Subscribe
Sign in
Home
Notes
Archive
Leaderboard
About
Latest
Top
Discussions
When Privileged Access Falls into the Wrong Hands: Chinese Companies in Microsoft’s MAPP Program
Chinese companies face conflicting pressures between MAPP’s non-disclosure requirements and domestic policies that incentivize or mandate vulnerability…
Jul 31
•
Eugenio Benincasa
,
Dakota Cary
, and
Natto Team
11
Share this post
Natto Thoughts
When Privileged Access Falls into the Wrong Hands: Chinese Companies in Microsoft’s MAPP Program
Copy link
Facebook
Email
Notes
More
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
How one man’s career reveals the interconnected web of China’s state security apparatus, cybersecurity firms, and strategic industries
Jul 23
•
Natto Team
3
Share this post
Natto Thoughts
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
Copy link
Facebook
Email
Notes
More
Pick Your Innovation Path in AI: Chinese Edition
China’s advances in AI show the effects of a state approach of “introduce, digest, absorb, re-innovate” and years of debate on the balance between…
Jul 9
•
Natto Team
6
Share this post
Natto Thoughts
Pick Your Innovation Path in AI: Chinese Edition
Copy link
Facebook
Email
Notes
More
June 2025
Butian Vulnerability Platform: Forging China's Next Generation of White Hat Hackers
From 'Trouser Belt Project' to 'Patching the Sky': Qi An Xin’s Butian platform serves as cradle for nurturing new talent and smelter for refining…
Jun 25
•
Natto Team
7
Share this post
Natto Thoughts
Butian Vulnerability Platform: Forging China's Next Generation of White Hat Hackers
Copy link
Facebook
Email
Notes
More
Defense-Through-Offense Mindset: From a Taiwanese Hacker to the Engine of China’s Cybersecurity Industry
The belief that offense enables defense in cyberspace, first rooted in China’s 1990s hacker culture, has since permeated the country’s cyber ecosystem
Jun 11
•
Eugenio Benincasa
13
Share this post
Natto Thoughts
Defense-Through-Offense Mindset: From a Taiwanese Hacker to the Engine of China’s Cybersecurity Industry
Copy link
Facebook
Email
Notes
More
2
May 2025
From Humble Beginnings: How a Vocational College Became a Vulnerability Powerhouse
Qingyuan Polytechnic's focus on vulnerability studies highlights China's continued efforts in gathering vulnerability resources
May 28
•
Natto Team
5
Share this post
Natto Thoughts
From Humble Beginnings: How a Vocational College Became a Vulnerability Powerhouse
Copy link
Facebook
Email
Notes
More
From the World of “Hacker X Files” to the Whitewashed Business Sphere
Jiang Jintao’s journey from hacker to infosec entrepreneur illustrates the blend of ambition, skill, and changes in China's cybersecurity industry
May 14
•
Natto Team
5
Share this post
Natto Thoughts
From the World of “Hacker X Files” to the Whitewashed Business Sphere
Copy link
Facebook
Email
Notes
More
April 2025
Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S.
China’s security services have called out hackers of an alleged “Internet Army of Taiwan Independence” and of the U.S. National Security Agency…
Apr 16
•
Eugenio Benincasa
and
Natto Team
14
Share this post
Natto Thoughts
Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S.
Copy link
Facebook
Email
Notes
More
1
Indictments and Leaks: Different but Complementary Sources
A case study of the i-SOON indictment and leaks reveals that source information may vary but it is important to compare and evaluate information for…
Apr 2
•
Natto Team
7
Share this post
Natto Thoughts
Indictments and Leaks: Different but Complementary Sources
Copy link
Facebook
Email
Notes
More
March 2025
Zhou Shuai: A Hacker’s Road to APT27
US-sanctioned, allegedly APT27-associated actor Zhou Shuai represents a group of Chinese elite hackers who have become an important resource for Chinese…
Mar 19
•
Natto Team
10
Share this post
Natto Thoughts
Zhou Shuai: A Hacker’s Road to APT27
Copy link
Facebook
Email
Notes
More
Where is i-SOON Now?
i-SOON’s business struggles after the leak reflect the cruel reality of China’s hacker-for-hire industry
Mar 5
•
Natto Team
9
Share this post
Natto Thoughts
Where is i-SOON Now?
Copy link
Facebook
Email
Notes
More
February 2025
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network
A year after the i-SOON leaks, a deep dive into the Pangu Team reveals new insight into the relationships between elite vulnerability researchers and…
Feb 19
•
Eugenio Benincasa
12
Share this post
Natto Thoughts
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network
Copy link
Facebook
Email
Notes
More
2
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts