The Natto Team's take on the Chinese government’s attitude toward a second term Trump presidency and the potential cyber implications in 2025.
https://nattothoughts.substack.com/p/chinas-trump-cards-for-trump-20
The Natto Team's take on the Chinese government’s attitude toward a second term Trump presidency and the potential cyber implications in 2025.
https://nattothoughts.substack.com/p/chinas-trump-cards-for-trump-20
The Natto Team discovered that media outlets mistakenly cited the same authors earlier paper to evaluate the issues. The paper in question was published in September, soon hushed up, shows Chinese researchers may have discovered a class of quantum-annealing algorithm capable of attacking cryptography in a novel way.
https://nattothoughts.substack.com/p/chinas-quantum-tunneling-breakthrough
The Natto Team collaborated with researcher Eugenio Benincasa to examine China's cyber range market and its significance following the exposure of Flax Typhoon-linked company Integrity Technology.
https://nattothoughts.substack.com/p/business-priorities-of-chinese-cyber
Natto Thoughts examines Flax Typhoon and Integrity Technology and questions: how many more Chinese information security companies lie behind Chinese state cyber threat campaigns?
https://nattothoughts.substack.com/p/flax-typhoon-linked-company-integrity
As the Natto Team continues our ongoing research on Chinese threat groups, we discovered several other Chinese threat groups using similar reconnaissance techniques and tools to those APT41 used. We also came across reconnaissance techniques and scanning tools that were unique to some of the Chinese threat groups. In addition, like APT41, Chinese threat groups heavily use open-source and locally developed tools, whether well-known security tools or customized malware.
https://nattothoughts.substack.com/p/reconnaissance-scanning-tools-used
Say you, say me. Can it say together? The Natto Team is afraid to say probably not. Cyber attribution is complicated. It looks as if we have more questions than answers after all.
https://nattothoughts.substack.com/p/who-is-volt-typhoon-a-state-sponsored
APT41 and other Chinese malicious cyber actors can choose from numerous reconnaissance tools developed in China and abroad, including those developed for legitimate defensive purposes.
https://nattothoughts.substack.com/p/apt41s-reconnaissance-techniques
Well, no matter whether they use a front company or real business, China’s intelligence services need to get the job done. However, it is still necessary to distinguish the two.
https://nattothoughts.substack.com/p/front-company-or-real-business-in
Part2a of Natto Thoughts' Ransom-war series - Extortion Entrepreneurs and Their Patriotic Obligations: "Russian cybercriminals have made statements suggesting they see themselves as patriots and warriors for the Russian state against its enemies."
https://nattothoughts.substack.com/p/ransom-war-part-2a-extortion-entrepreneurs