Qingyuan Polytechnic's focus on vulnerability studies highlights China's continued efforts in gathering vulnerability resources| nattothoughts.substack.com
A case study of the i-SOON indictment and leaks reveals that source information may vary but it is important to compare and evaluate information for unique insights.| nattothoughts.substack.com
US-sanctioned, allegedly APT27-associated actor Zhou Shuai represents a group of Chinese elite hackers who have become an important resource for Chinese state cyber operations.| nattothoughts.substack.com
i-SOON’s business struggles after the leak reflect the cruel reality of China’s hacker-for-hire industry| nattothoughts.substack.com
A year after the i-SOON leaks, a deep dive into the Pangu Team reveals new insight into the relationships between elite vulnerability researchers and government-contracted hackers| nattothoughts.substack.com
Even before DeepSeek's debut sparked pride among Chinese netizens, US sanctions on Sichuan Silence developer Guan Tianfeng triggered online vows to "march forward" in cyberpower competition| nattothoughts.substack.com
Chengdu’s leisure lifestyle, education and talent resources have contributed to the city becoming a hacking hub| nattothoughts.substack.com
China’s cyber range market booms, fueled by the state’s demand for developing capable cyber talent and improving the effectiveness of “attack and defense live-fire capability”| nattothoughts.substack.com
First i-SOON, then Integrity Tech: How many more Chinese information security companies lie behind Chinese state cyber threat campaigns?| nattothoughts.substack.com
Some ransomware attacks serve both financial and political motives and may play a role in Russia's ongoing "hybrid warfare" against the West| nattothoughts.substack.com
Chinese hackers’ lax operations security; why Chinese officials have to rely on contractors; why i-SOON might not fear blowback from the leak; and how the name-and-shame strategy seems to be failing.| nattothoughts.substack.com