{"id":58779,"date":"2025-06-09T02:34:05","date_gmt":"2025-06-09T02:34:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/"},"modified":"2025-06-09T02:34:05","modified_gmt":"2025-06-09T02:34:05","slug":"chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/","title":{"rendered":"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019"},"content":{"rendered":"<p>China\u2019s space agency has revealed its Tianwen 2 probe has unfurled a \u2018solar wing\u2019.<\/p>\n<p>The mission <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.theregister.com\/2025\/05\/29\/china_tianwen_2_probe_launch\/\">launched<\/a> in May on a course that will take it to remote rocks \u2013 the \u2018quasi moon\u2019 469219 Kamo\u02bboalewa and comet 311P.<\/p>\n<p>China\u2019s National Space Administration last Friday <a target=\"_blank\" href=\"https:\/\/www.cnsa.gov.cn\/n6758823\/n6758838\/c10680040\/content.html\">published<\/a> its first update on the mission and reported that after eight days in orbit the craft was three million kilometers from Earth. The update also mentions deployment of a \u201csolar wing\u201d \u2013 a circular array of flexible solar panels. Here\u2019s a pic of the wing which snapped by one of the probe\u2019s cameras.<\/p>\n<div class=\"CaptionedImage Border width_85\" readability=\"7\"><a href=\"https:\/\/regmedia.co.uk\/2025\/06\/08\/supplied_tianwen_2_solar_wing.jpg\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2025\/06\/08\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1\" alt=\"The Tianwen 2 probe's 'Solar Wing'\" title=\"The Tianwen 2 probe's 'Solar Wing'\" height=\"648\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">The Tianwen 2 probe&#8217;s &#8216;Solar Wing&#8217; &#8211; Click to enlarge<\/p>\n<\/div>\n<p>The image above is the first China has shared from the mission.<\/p>\n<p>May there be many more!<\/p>\n<h3 class=\"crosshead\">Hitachi tries turning its greybeards into AI agents<\/h3>\n<p>Japan\u2019s Hitachi Power Solutions is trying to capture the knowledge of its veteran workers so they can be preserved in an AI agent.<\/p>\n<p>According to Japanese outlet <a target=\"_blank\" href=\"https:\/\/asia.nikkei.com\/Business\/Technology\/Artificial-intelligence\/Hitachi-looks-to-pass-on-veteran-workers-expertise-to-AI-agent\">Nikkei<\/a>, the company first used logs and other data produce by its systems to train an AI, before interviewing its veteran workers and conducting ethnographic research.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>The result was a \u201cMaintenance Inquiry AI Agent\u201d that workers can query as they troubleshoot the company\u2019s kit.<\/p>\n<h3 class=\"crosshead\">China\u2019s censors \u2018delete first, review later\u2019<\/h3>\n<p>The army of censors China employs to keep its internet free of forbidden content are told to delete content before reviewing it, according to a <a target=\"_blank\" href=\"https:\/\/www.abc.net.au\/news\/2025-06-04\/beijing-ai-and-censors-erase-tiananmen-square-massacre\/105370772\">report<\/a> from the Australian Broadcasting Corporation (ABC).<\/p>\n<p>The broadcaster accessed leaked documents from inside Beijing\u2019s censorship operation and found documents that appear to be training material for censors. Those docs include instructions to remove content depicting state violence, and examples of forbidden text, images and video content.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>However censors may not need to consult those lists, as the leaked trove also included an internal memo suggesting a \u201cdelete first, review later\u201d approach to censorship.<\/p>\n<p>China\u2019s censors are always especially busy ahead the June 4th anniversary of the Tiananmen Square massacre. This year they may have been busier still, as Chinese anti-censorship organization GreatFire and the Human Rights Museum <a target=\"_blank\" href=\"https:\/\/en.greatfire.org\/blog\/2025\/jun\/instant-audience-breaks-through-chinas-great-firewall-commemorate-tiananmen-protests\">conducted<\/a> a project to make information about the massacre visible to Chinese netizens.<\/p>\n<h3 class=\"crosshead\">Equinix acquires Filipino datacenters<\/h3>\n<p>Equinix last week announced it had acquired three datacenters from Filipino company Total Information Management .<\/p>\n<p>The three facilities are all in Manila and have a combined capacity of 1,000 cabinets, and land for further expansion.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>The newest of the three, named MN2, provides 500 cabinets of capacity.<\/p>\n<p>\u201cAcquiring these data centers enables Equinix to immediately support local and global customers looking to expand into the Philippines,\u201d the company said.<\/p>\n<h3 class=\"crosshead\">Samsung adopts Cline AI coding tool<\/h3>\n<p>Korean media <a target=\"_blank\" href=\"https:\/\/en.yna.co.kr\/view\/AEN20250608001000320\">report<\/a> that Samsung\u2019s Device eXperience division has adopted the Cline AI coding assistant.<\/p>\n<p>The division creates Samsung\u2019s mobile devices, home appliances, and televisions.<\/p>\n<p>Cline works alongside Microsoft\u2019s VS Code, making its adoption a nice hint about how Samsung creates its products.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_offbeat\/science&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33aEaQZkql0LMTreVyEmMYgAAAAoA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>If your next Samsung isn\u2019t so great, maybe blame vibe coding?<\/p>\n<h3 class=\"crosshead\">AWS opens Taiwan region<\/h3>\n<p>Amazon Web Services last week opened a region in Taiwan.<\/p>\n<p>The ap-east-2 region offers three availability zones \u2013 a sensible precaution given Taiwan frequently experiences earthquakes that <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.theregister.com\/2025\/01\/21\/taiwan_earthquake_tsmc\/\">disrupt tech companies<\/a>. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2025\/06\/09\/chinas_asteroidandcomet_hunter_probe_unfurls\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PLUS: Hitachi turns greybeards into AI agents; Tiananmen anniversary censorship; AWS in Taiwan; and more! China\u2019s space agency has revealed its Tianwen 2 probe has unfurled a \u2018solar wing\u2019.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-58779","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-09T02:34:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regmedia.co.uk\/2025\/06\/08\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019\",\"datePublished\":\"2025-06-09T02:34:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/\"},\"wordCount\":542,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/regmedia.co.uk\\\/2025\\\/06\\\/08\\\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/\",\"name\":\"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/regmedia.co.uk\\\/2025\\\/06\\\/08\\\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1\",\"datePublished\":\"2025-06-09T02:34:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/regmedia.co.uk\\\/2025\\\/06\\\/08\\\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1\",\"contentUrl\":\"https:\\\/\\\/regmedia.co.uk\\\/2025\\\/06\\\/08\\\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/","og_locale":"en_US","og_type":"article","og_title":"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-06-09T02:34:05+00:00","og_image":[{"url":"https:\/\/regmedia.co.uk\/2025\/06\/08\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019","datePublished":"2025-06-09T02:34:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/"},"wordCount":542,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/#primaryimage"},"thumbnailUrl":"https:\/\/regmedia.co.uk\/2025\/06\/08\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/","url":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/","name":"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/#primaryimage"},"thumbnailUrl":"https:\/\/regmedia.co.uk\/2025\/06\/08\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1","datePublished":"2025-06-09T02:34:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/#primaryimage","url":"https:\/\/regmedia.co.uk\/2025\/06\/08\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1","contentUrl":"https:\/\/regmedia.co.uk\/2025\/06\/08\/supplied_tianwen_2_solar_wing.jpg?x=648&amp;y=648&amp;infer_y=1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/chinas-asteroid-and-comet-hunter-probe-unfurls-a-solar-wing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"China\u2019s asteroid-and-comet hunter probe unfurls a \u2018solar wing\u2019"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58779"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58779\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}