“The central role of the MPS in organizing the competition, combined with past episodes that raised long-standing suspicions and the absence of transparent [coordinated vulnerability disclosure] rules, suggests a system oriented toward vulnerability retention and state control rather than on vendor notification or coordinated disclosure,” the threat intel firm noted.Related:$2.5 Million Offered at Upcoming ‘Matrix Cup’ Chinese Hacking ContestRelated:Singapore: Rootkits, Zero-Day Used in Chinese Attack on Major Telecom FirmsRelated:Notepad++ Supply Chain Hack Conducted by China via Hosting Provider

Related:$2.5 Million Offered at Upcoming ‘Matrix Cup’ Chinese Hacking ContestRelated:Singapore: Rootkits, Zero-Day Used in Chinese Attack on Major Telecom FirmsRelated:Notepad++ Supply Chain Hack Conducted by China via Hosting Provider

Related:Singapore: Rootkits, Zero-Day Used in Chinese Attack on Major Telecom FirmsRelated:Notepad++ Supply Chain Hack Conducted by China via Hosting Provider

Related:Notepad++ Supply Chain Hack Conducted by China via Hosting Provider

Eduard Kovacs (@EduardKovacs) is the managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Attendees will walk away with guidance for how to build robust identity defenses, unify them under a consistent security model, and ensure business operations move quickly without compromise.

SecurityWeek’s 2026 Ransomware Summit will discuss a roadmap for defending the enterprise, from mitigating root causes to mastering recovery, giving security teams the critical insights needed to navigate and neutralize today’s ransomware extortion threats.

Leilani Farol has joined Financial services firm First Horizon as SVP, CISO.

Pennsylvania has named Andy Ritter as CISO and Jim Sipe as executive deputy CIO.

Hayete Gallot has rejoined Microsoft as Executive Vice President, Security.

Source: SecurityWeek