How overlapping APT groups and Chinese companies complicate attribution in state cyber operations| nattothoughts.substack.com
A year after the i-SOON leaks, a deep dive into the Pangu Team reveals new insight into the relationships between elite vulnerability researchers and government-contracted hackers| nattothoughts.substack.com
Chengdu’s leisure lifestyle, education and talent resources have contributed to the city becoming a hacking hub| nattothoughts.substack.com
Formerly very public, Sichuan Silence has gone quiet since 2020; but as part of a circle of Chengdu-based jack-of-all-trades infosec companies, it serves the state in cyber-enabled operations| nattothoughts.substack.com
Public knowledge of the Salt Typhoon intrusions has been driven by the media, while the government and private-sector cybersecurity companies appear to have agreed on keeping mum| nattothoughts.substack.com
China’s cyber range market booms, fueled by the state’s demand for developing capable cyber talent and improving the effectiveness of “attack and defense live-fire capability”| nattothoughts.substack.com
First i-SOON, then Integrity Tech: How many more Chinese information security companies lie behind Chinese state cyber threat campaigns?| nattothoughts.substack.com