Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China’s Tianfu Cup Resumes Amid Heightened Secrecy

China’s Tianfu Cup Resumes Amid Heightened Secrecy

Posted on February 13, 2026 By CWS

China’s prominent hacking competition, the Tianfu Cup, made its much-anticipated return in 2026 following a two-year break. This event, now under the auspices of the government, has become notably more confidential. Scheduled for January 29-30, the competition was orchestrated by the Ministry of Public Security (MPS), marking a shift from its previous structure.

Background of the Tianfu Cup

Initially established as an alternative to the globally recognized Pwn2Own competition, the Tianfu Cup has historically attracted attention for its generous payouts. In 2021, the event awarded $1.9 million for exploits targeting a range of technology, including Windows and iOS. However, in recent years, its focus has narrowed to domestic products from companies like Huawei and Xiaomi, with details about outcomes being sparse.

Targets and Techniques

This year’s competition included an extensive list of targets, encompassing popular smartphones such as the iPhone 17 and Samsung Galaxy S24 Ultra, as well as operating systems like Windows 11 and Ubuntu. Participants were challenged to achieve significant security breaches, including remote code execution and privilege escalation. Cloud platforms and cybersecurity solutions were also fair game, with a focus on accessing and controlling host systems.

In addition to traditional hacking targets, the 2026 Tianfu Cup introduced an AI category, which tasked competitors with exploiting AI systems like OpenLLM and LangChain. This reflects a broader trend in cybersecurity where artificial intelligence is both a tool and a target in the field.

Regulations and Implications

Although the prize pool was reduced to approximately $140,000, the implications of the competition’s findings remain significant. China’s regulatory framework mandates that any discovered vulnerabilities be reported directly to the government rather than disclosed publicly. This policy has previously been used to bolster the nation’s cyber capabilities, potentially at the expense of global security transparency.

According to cybersecurity firm Natto Thoughts, the competition’s lack of transparency and government involvement suggests a strategic focus on retaining vulnerabilities for state use. This approach raises concerns about the potential for these exploits to be used in cyber espionage, following patterns observed in earlier competitions.

As the Tianfu Cup continues to evolve, its role in the international cybersecurity landscape remains a topic of critical interest, particularly given China’s growing influence in technology and cybersecurity.

Security Week News Tags:AI in hacking, China, cyber espionage, Cybersecurity, government control, hacking contest, security threats, Tianfu Cup, vulnerability disclosure, zero-day vulnerabilities

Post navigation

Previous Post: CISA Highlights Notepad++ Vulnerability Amid Active Exploits
Next Post: Chrome 145 Fixes Critical Browser Vulnerabilities

Related Posts

Virtual Event Today: Attack Surface Management Summit Virtual Event Today: Attack Surface Management Summit Security Week News
The AI Arms Race: Deepfake Generation vs. Detection The AI Arms Race: Deepfake Generation vs. Detection Security Week News
New Firefox Protections Halve the Number of Trackable Users New Firefox Protections Halve the Number of Trackable Users Security Week News
Reclaiming Control: How Enterprises Can Fix Broken Security Operations Reclaiming Control: How Enterprises Can Fix Broken Security Operations Security Week News
Manpower Says Data Breach Stemming From Ransomware Attack Impacts 140,000 Manpower Says Data Breach Stemming From Ransomware Attack Impacts 140,000 Security Week News
263,000 Impacted by Esse Health Data Breach 263,000 Impacted by Esse Health Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in Next-Mdx-Remote Threatens React Servers
  • Chrome 145 Fixes Critical Browser Vulnerabilities
  • China’s Tianfu Cup Resumes Amid Heightened Secrecy
  • CISA Highlights Notepad++ Vulnerability Amid Active Exploits
  • Muddled Libra Exploits VMware vSphere in Cyber Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in Next-Mdx-Remote Threatens React Servers
  • Chrome 145 Fixes Critical Browser Vulnerabilities
  • China’s Tianfu Cup Resumes Amid Heightened Secrecy
  • CISA Highlights Notepad++ Vulnerability Amid Active Exploits
  • Muddled Libra Exploits VMware vSphere in Cyber Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News