Canโt wait for this :)
01.08.2025 09:25 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0@euben.bsky.social
Cyber Defense Researcher @ethz.ch. Former Italian govt, Pacific Forum and NYPD. LUISS & Columbia University Alum.
Canโt wait for this :)
01.08.2025 09:25 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Available here: nattothoughts.substack.com/p/when-privi...
31.07.2025 16:44 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0Microsoft is probing whether a MAPP leak let Chinese hackers exploit a SharePoint vuln pre-patch.
In this new piece for Natto,
@dakotaindc.bsky.social, @meidanowski.bsky.social & I dig into:
๐๏ธ China's vuln reporting rules
๐ Which firms joined/left MAPP since 2018
โ ๏ธ The risks todayโs members pose
New: Microsoft is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in SharePoint before they were patched, enabling a global campaign of cyberattacks, according to people familiar: www.bloomberg.com/news/article...
25.07.2025 18:34 โ ๐ 7 ๐ 10 ๐ฌ 1 ๐ 0In the latest Hooked!, editor @katharinegk.bsky.social ties together some fascinating recent research from @benread.bsky.social , @euben.bsky.social, @winnona.bsky.social, and others on private sector elements of Chinese offensive cyber: bindinghook.com/articles-hoo...
25.07.2025 08:31 โ ๐ 6 ๐ 2 ๐ฌ 0 ๐ 0Before Vegas โ The โRed Hackersโ Who Shaped Chinaโs Cyber Ecosystem (Center for Security Studies at ETH Zรผrich): css.ethz.ch/content/dam/...
21.07.2025 11:39 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 06/ Sincerely grateful to the all-star team of experts who shared their insights and feedback: Scott Henderson (Google Mandiant), Adam Kozy (SinaCyber), @meidanowski.bsky.social (@nattothoughts.bsky.social), @thegrugq.bsky.social, @Chris St.Myers (SentinelOne), & Charles Li and Zha0 (TeamT5)
21.07.2025 08:11 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 05/ The key lesson: what begins in anonymous forums can end in boardrooms and on digital battlefields. Overlooking civilian hacking talent is a strategic risk.
21.07.2025 08:11 โ ๐ 2 ๐ 2 ๐ฌ 1 ๐ 0@kimzetter.bsky.social's excellent piece for Wired unpacks the state-linked side of the story, covering the report and Adam Kozyโs research: www.wired.com/story/china-...
21.07.2025 08:11 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 03/ Some Red 40 hackers have carried out operations on behalf of Chinaโs military and intelligence services. Their informal networks, formed during their teens or twenties as members of the same hacking groups, exemplify tool sharing and collab that underpins Chinaโs APTs MO.
21.07.2025 08:11 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 02/ It identifies 40 prominent red hackers โ โThe Red 40โ โ who shaped Chinaโs cyber ecosystem from the ground up. It tells the story of how these individuals transitioned from online forums to becoming part of a tightly integrated ecosystem.
Full report:
css.ethz.ch/en/center/CS...
1/ Chinaโs cyber capabilities didnโt start top-down, they started with raw hacking talent. The new CSS/ETH report "Before Vegas" traces how informal talent shaped Chinaโs cyber ecosystem, moving from online forums to industry leaders (link in thread).
21.07.2025 08:11 โ ๐ 13 ๐ 8 ๐ฌ 1 ๐ 0haha haven't spent too much time around here
20.07.2025 21:06 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Thank you ๐ really appreciate it!
20.07.2025 21:05 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Thank you! Iโd definitely add Alex Josieโs โSpies and Liesโ to the book list
20.07.2025 13:07 โ ๐ 4 ๐ 0 ๐ฌ 2 ๐ 0Thank you! Looking forward to hearing your thoughts on it
19.07.2025 02:03 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0Fully agree, Patrick. I also love his work. He was very kind to review the report and provide feedback before publication ๐
19.07.2025 01:51 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0How did China's top APT hackers come to be? Many were early "Honkers" - patriotic hackers who in late 90s launched low-skill cyberattacks against nations deemed disrespectful to China. But once Honkers developed their skills, PLA/MSS came calling. Based on great research by bsky.app/profile/eube...
18.07.2025 15:48 โ ๐ 58 ๐ 31 ๐ฌ 0 ๐ 1How has China advanced its AI development to its current state? No single innovation path in AI can be considered definitive.
nattothoughts.substack.com/p/debating-c...
I wrote on the arrest in Italy of Xu Zewei, an alleged Chinese hacker, perhaps the first case where America has sought to extradite a Chinese hacker for mainly or exclusively cyber operationsโin this case theft of Covid research during the pandemic. www.economist.com/china/2025/0...
11.07.2025 06:27 โ ๐ 71 ๐ 12 ๐ฌ 0 ๐ 0โalignment with CCP priorities offers privileged access to state resources, regulatory favor, and expanded commercial opportunities [to hackers]."
NEW Phenomenal report on Chinese civil military fusion and cyber militias by Kieran Green: margin.re/mobilizing-c...
๐จ NEW PAPER on the 0day Supply Chain ๐จ:
I gathered open source data & interviewed Gov employees, VR and china researchers to figure out what the zero day marketplace looks like in the U.S. and how it compares to China.
key findings below โฌ๏ธ- 0/๐งต โจwww.atlanticcouncil.org/in-depth-res...
I think European countries are struggling even to allow government teams to do this kind of work, so extending it to broader private sector involvement seems unlikely to me as things stand
13.06.2025 20:13 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0I agree they should rethink current approaches, starting from talent development.
13.06.2025 12:14 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0To defend, one must first know how to attackโ (ๆช็ฅๆป๏ผ็็ฅ้ฒ). This mindset, popularized by a Taiwanese hacker Lin in the 1990s, spread from China's red hackers to CTF teams. Today, it powers China's cyber industry.
New piece for @nattothoughts.bsky.social
nattothoughts.substack.com/p/defense-th...
The Natto Team explores the development of China's vulnerability research and discovery skills, starting from the vocational college level.
Thanks to @euben.bsky.social @dakotaindc.bsky.social Kristin Del Rosso for their previous research on the topic
nattothoughts.substack.com/p/when-a-voc...
The Natto Team continues finding stories of Chinese hackers fascinating as they reveal the motivations behind cyber operations and the evolution of China's information security industry.
nattothoughts.substack.com/p/stories-of...
In their latest for #BindingHook, Massimo Marotti, Matteo E. Bonfanti, and Giovanni Faleg of the Italian National Cybersecurity Agency reflect on the process of forming the new #G7CybersecurityWorkingGroup: bindinghook.com/articles-hoo...
12.05.2025 06:51 โ ๐ 4 ๐ 1 ๐ฌ 0 ๐ 0Fascinating to see reference to GRU unit 20728 from FR relative to Russia's offensive cyber program -- as far as I'm aware, a first from a Western service?
www.diplomatie.gouv.fr/fr/dossiers-...