Sitemap - 2024 - Natto Thoughts
Bluesky Should Outsmart China's Public Opinion Monitoring Tools to Safeguard Public Discourse
Sichuan Silence Information Technology: Great Sounds are Often Inaudible
Salt Typhoon: Churning Up a Storm of Consternation
China’s Trump Cards for Trump 2.0
Ransom-War in Real Time, Final Case Study: Tumultuous 2021
It's Not Magic: Making Your Choice is Powerful
The Red Dragon Searches for Pearls Through Quantum Tunneling – But You’ve Got the Wrong Paper
Ransom-War and Russian Political Culture: Trust, Corruption, and Putin's Zero-Sum Sovereignty
Chinese Threat Groups That Use Ransomware and Ransomware Groups That Use Chinese Names
RansomWar in Real Time, Case Study 2: Louisiana and Norsk Hydro, 2019
Ransom-War In Real Time, Case Study 1: Conti, EvilCorp and Cozy Bear
Reconnaissance Scanning Tools Used by Chinese Threat Actors and Those Available in Open Source
Matrix Cup: Cultivating Top Hacking Talent, Keeping Close Hold on Results
Ransom-War Part 4b: Ransomware Diplomacy
RansomWar Part 4a: CyberCriminals as “Combat Resource” and Bargaining Chip
Enjoy Your July 4 Holiday if You Celebrate
Who Has the Best Scanning Tools in China?
Ransom-War Part 3: Inflict Maximum Damage
Who is Volt Typhoon? A State-sponsored Actor? Or Dark Power?
APT41’s Reconnaissance Techniques and Toolkit: Nmap and What Else?
Front Company or Real Business in China’s Cyber Operations
Ransom-War, Part 2b: Profits Versus Patriotism
Ransom-War, Part 2a: Extortion Entrepreneurs and Their Patriotic Obligations
Ransom-War: Russian Extortion Operations as Hybrid Warfare, Part One
Too Many Toads: Lost in Translation
Intrusion Truth Methods: How Can They Get It Right Again and Again?
Natto Thoughts is One Year Old
i-SOON Leak: Unanswered Questions and What Now?
Leaks Expose Chinese, Russian and German Security Fears
i-SOON Operations: A View from Kazakhstan
i-SOON: “Significant Superpower” or Just Getting the Job Done?
i-SOON: Kicking off the Year of the Dragon with Good Luck … or Not
Wazawaka & Co., Part 2: Patriotic Hacker
When “Volt Typhoon” Blows Over: Cases of China’s Offensive Cyber Operation