Qingyuan Polytechnic's focus on vulnerability studies highlights China's continued efforts in gathering vulnerability resources| nattothoughts.substack.com
Jiang Jintao’s journey from hacker to infosec entrepreneur illustrates the blend of ambition, skill, and changes in China's cybersecurity industry| nattothoughts.substack.com
A case study of the i-SOON indictment and leaks reveals that source information may vary but it is important to compare and evaluate information for unique insights.| nattothoughts.substack.com
A year after the i-SOON leaks, a deep dive into the Pangu Team reveals new insight into the relationships between elite vulnerability researchers and government-contracted hackers| nattothoughts.substack.com
Chengdu’s leisure lifestyle, education and talent resources have contributed to the city becoming a hacking hub| nattothoughts.substack.com
China’s cyber range market booms, fueled by the state’s demand for developing capable cyber talent and improving the effectiveness of “attack and defense live-fire capability”| nattothoughts.substack.com
Who are the mysterious hacker whisperers Intrusion Truth? What kinds of tradecraft have they used? What can cyber threat analysts learn from them?| nattothoughts.substack.com
Chinese hackers’ lax operations security; why Chinese officials have to rely on contractors; why i-SOON might not fear blowback from the leak; and how the name-and-shame strategy seems to be failing.| nattothoughts.substack.com
Chat logs in the i-SOON leak show China’s hacker-for-hire industry is subject to Chinese business culture: in the race for profits, survival depends on who you know and who you wine and dine with.| nattothoughts.substack.com
CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security| blog.bushidotoken.net