Microsoft is probing whether a MAPP leak let Chinese hackers exploit a SharePoint vuln pre-patch.
In this new piece for Natto,
@dakotaindc.bsky.social, @meidanowski.bsky.social & I dig into:
๐๏ธ China's vuln reporting rules
๐ Which firms joined/left MAPP since 2018
โ ๏ธ The risks todayโs members pose
31.07.2025 16:44 โ ๐ 5 ๐ 3 ๐ฌ 1 ๐ 0
1/ Chinaโs cyber capabilities didnโt start top-down, they started with raw hacking talent. The new CSS/ETH report "Before Vegas" traces how informal talent shaped Chinaโs cyber ecosystem, moving from online forums to industry leaders (link in thread).
21.07.2025 08:11 โ ๐ 14 ๐ 8 ๐ฌ 1 ๐ 0
We often questioned how they achieved their current status regarding China developing its cyber offensive capabilities. The Natto Team appreciates @euben.bsky.social for investigating the origin of the defense-through-offense approach.
11.06.2025 16:53 โ ๐ 2 ๐ 2 ๐ฌ 0 ๐ 0
From Humble Beginnings: How a Vocational College Became a Vulnerability Powerhouse
Qingyuan Polytechnic's focus on vulnerability studies highlights China's continued efforts in gathering vulnerability resources
The Natto Team explores the development of China's vulnerability research and discovery skills, starting from the vocational college level.
Thanks to @euben.bsky.social @dakotaindc.bsky.social Kristin Del Rosso for their previous research on the topic
nattothoughts.substack.com/p/when-a-voc...
28.05.2025 16:46 โ ๐ 11 ๐ 7 ๐ฌ 0 ๐ 1
Where is i-SOON Now?
i-SOONโs business struggles after the leak reflect the cruel reality of Chinaโs hacker-for-hire industry
As the Natto Team was going to publish this piece, US Department of Justice unsealed an indictment charging eight i-SOON employees and highlighting the importance of companies like i-SOON in China's cyberthreat landscape.
nattothoughts.substack.com/p/where-is-i...
05.03.2025 17:32 โ ๐ 4 ๐ 3 ๐ฌ 0 ๐ 0
We appreciate that more and more threat intelligence researchers value the importance of cultural component in APT research. @techy.detectionengineering.net
28.02.2025 03:05 โ ๐ 6 ๐ 2 ๐ฌ 0 ๐ 0
Chasing Chengdu404, Sichuan Silence....and NoSugar Technology !?
On the ground research on US sanctioned cyber security companies in China.
We are glad to see that some curious minds like us want to find out more about Chinese APTs associated companies in reality. They actually paid a visit to them.
substack.com/home/post/p-...
18.02.2025 17:58 โ ๐ 3 ๐ 2 ๐ฌ 0 ๐ 0
1000 subscribers. You did it. Natto Thoughts has its first thousand subscribers. Nattothoughts.substack.com
Thank you for your support. The Natto Team appreciates it.
17.12.2024 15:31 โ ๐ 7 ๐ 2 ๐ฌ 0 ๐ 2
Threat Research @ Recorded Future. Previously @ Security Research Labs. He/Him. ๐ณ๏ธโ๐
Threat Intel / CTI / OT / ICS / Critical Infra stuff along with other things. I genuinely care, and wish others did too.
Website: pylos.co
Training/Consulting: paralus.co
โ Cybersecurity reporter
โ
Newsletters at Risky Business
#infosec #cybersecurity
https://risky.biz
China-Focused Consultant @SentinelOne | Nonresident Fellow @ACGlobalChina | Adjunct @Georgetown | Unprofessional Cook | โค๏ธ๐๐
https://linktr.ee/dakotaindc
Cyber Defense Researcher @ethz.ch. Former Italian govt, Pacific Forum and NYPD. LUISS & Columbia University Alum.
Creator of Detection Engineering Weekly (https://detectionengineering.net), Sec Research/Intel/Detection @ Datadog
Threat intel @ Intel 471 (@intel471.bsky.social). Personal account. Interests: Cybercrime, cyber threat intelligence, OSINT, data breaches, photography. Also produce Intel 471's "Cybercrime Exposed" podcast. #Australia
Security researcher @ Cisco Talos. / Ex-Google TAG / Black Hat & HITCON review board / Organiser of Rhacklette.
official Bluesky account (check username๐)
Bugs, feature requests, feedback: support@bsky.app