{"id":38085,"date":"2020-11-08T16:25:12","date_gmt":"2020-11-08T16:25:12","guid":{"rendered":"http:\/\/552f5c00-4870-40d3-869c-28b66c69b3c8"},"modified":"2020-11-08T16:25:12","modified_gmt":"2020-11-08T16:25:12","slug":"windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/","title":{"rendered":"Windows 10, iOS, Chrome, and many others fall at China&#8217;s top hacking contest"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/11\/08\/013fecaa-0bc2-4067-894a-1a05b9dd93d0\/tianfu-cup-winners.jpg\" class alt=\"tianfu-cup-winners.jpg\"><\/span><figcaption readability=\"1\"><span class=\"caption\" readability=\"2\"><\/p>\n<p>Tianfu Cup winners: The 360 Government and Enterprise Security Vulnerability Research Institute<\/p>\n<p><\/span><span class=\"credit\"> Image: Tianfu Cup <\/span><\/figcaption><\/figure>\n<p>Many of today&#8217;s top software programs have been hacked using new and never-before-seen exploits at this year&#8217;s edition of the Tianfu Cup \u2014 China&#8217;s largest and most prestigious hacking competition.<\/p>\n<p>Held in the city of Chengdu, in central China, the third edition of the Tianfu Cup ended earlier today.<\/p>\n<p>&#8220;Many mature and hard targets have been pwned on this year&#8217;s contest,&#8221; organizers said today. Successful exploits were confirmed against:<\/p>\n<ul>\n<li>iOS 14 running on an iPhone 11 Pro<\/li>\n<li>Samsung Galaxy S20<\/li>\n<li>Windows 10 v2004 (April 2020 edition)<\/li>\n<li>Ubuntu<\/li>\n<li>Chrome<\/li>\n<li>Safari<\/li>\n<li>Firefox<\/li>\n<li>Adobe PDF Reader<\/li>\n<li>Docker (Community Edition)<\/li>\n<li>VMWare EXSi (hypervisor)<\/li>\n<li>QEMU (emulator &amp; virtualizer)<\/li>\n<li>TP-Link and ASUS router firmware<\/li>\n<\/ul>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/\" class=\"lazy\" alt=\"tianfu-cup-results.jpg\" height=\"auto\" width=\"1200\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2020\/11\/08\/1850270a-737e-420a-a899-9f95fac9379b\/resize\/1200xauto\/5569cb820b1e6d540ec6af030335b408\/tianfu-cup-results.jpg\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2020\/11\/08\/1850270a-737e-420a-a899-9f95fac9379b\/resize\/1200xauto\/5569cb820b1e6d540ec6af030335b408\/tianfu-cup-results.jpg\" class alt=\"tianfu-cup-results.jpg\" height=\"auto\" width=\"1200\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Tianfu Cup <\/span><\/figcaption><\/figure>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/\" class=\"lazy\" alt=\"tianfu-cup-products.jpg\" height=\"auto\" width=\"1200\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2020\/11\/08\/d180360a-3399-4102-a898-ee7633ff9a30\/resize\/1200xauto\/3b8ea83fa5a2f29fa05b901ed81a2072\/tianfu-cup-products.jpg\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2020\/11\/08\/d180360a-3399-4102-a898-ee7633ff9a30\/resize\/1200xauto\/3b8ea83fa5a2f29fa05b901ed81a2072\/tianfu-cup-products.jpg\" class alt=\"tianfu-cup-products.jpg\" height=\"auto\" width=\"1200\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Tianfu Cup <\/span><\/figcaption><\/figure>\n<p>Fifteen teams of Chinese hackers participated in this year&#8217;s edition. Contestants had three tries of five minutes each to hack into a selected target with an original exploit.<\/p>\n<p>For each successful attack, researchers received monetary rewards that varied depending on the target they chose and the vulnerability type.<\/p>\n<p>All exploits were reported to the software providers, per contest regulations, modeled after the rules of the more established Pwn2Own hacking competition that has been taking place in the west since the late 2000s.<\/p>\n<p>Patches for all the bugs demonstrated over the weekend will be provided in the coming days and weeks, as it usually happens after every TianfuCup and Pwn2Own contest.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/chrome-edge-safari-hacked-at-elite-chinese-hacking-contest\/\" target=\"_blank\" rel=\"noopener noreferrer\">Just like last year<\/a>, the winning team came from Chinese tech giant Qihoo 360. Named the &#8220;<strong>360 Enterprise Security and Government and (ESG) Vulnerability Research Institute<\/strong>,&#8221; the winners accounted for almost two-thirds of the entire prize pool, going home with $744,500 of the total $1,210,000 awarded this year.<\/p>\n<p>Ranking second and third were the AntFinancial Lightyear Security Lab and security researcher Pang.<\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/\" class=\"lazy\" alt=\"tianfu-cup-rankings.jpg\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/11\/08\/cb35a8a2-848d-4cfa-9e73-038e86da1e35\/tianfu-cup-rankings.jpg\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/11\/08\/cb35a8a2-848d-4cfa-9e73-038e86da1e35\/tianfu-cup-rankings.jpg\" class alt=\"tianfu-cup-rankings.jpg\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Tianfu Cup <\/span><\/figcaption><\/figure>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Winning hacker team pockets $744,500 at the Tianfu Cup, China&#8217;s top hacking contest.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38086,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-38085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Windows 10, iOS, Chrome, and many others fall at China&#039;s top hacking contest 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows 10, iOS, Chrome, and many others fall at China&#039;s top hacking contest 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-08T16:25:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Windows 10, iOS, Chrome, and many others fall at China&#8217;s top hacking contest\",\"datePublished\":\"2020-11-08T16:25:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/\"},\"wordCount\":317,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/\",\"name\":\"Windows 10, iOS, Chrome, and many others fall at China's top hacking contest 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg\",\"datePublished\":\"2020-11-08T16:25:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows 10, iOS, Chrome, and many others fall at China&#8217;s top hacking contest\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows 10, iOS, Chrome, and many others fall at China's top hacking contest 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/","og_locale":"en_US","og_type":"article","og_title":"Windows 10, iOS, Chrome, and many others fall at China's top hacking contest 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-08T16:25:12+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Windows 10, iOS, Chrome, and many others fall at China&#8217;s top hacking contest","datePublished":"2020-11-08T16:25:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/"},"wordCount":317,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/","url":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/","name":"Windows 10, iOS, Chrome, and many others fall at China's top hacking contest 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg","datePublished":"2020-11-08T16:25:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Windows 10, iOS, Chrome, and many others fall at China&#8217;s top hacking contest"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38085"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38085\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38086"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}