Cyber Threats
US sanctions Chinese firm behind sweeping Salt Typhoon telecom hacks
The Treasury Department also sanctioned an individual involved in recent Chinese hacks into its own systems.
Salt Typhoon breach was first detected on federal networks, CISA head says
Cybersecurity and Infrastructure Security Agency Director Jen Easterly said the group was first detected “before we understood it was Salt Typhoon.”
FBI deleted Chinese malware from 4,200 US computers
The malware’s command server appears to be based in Tokyo and was accessed by French authorities who helped craft the code needed to remove the infection.
Exclusive
GAO mulls cost evaluation of nationwide telecom hardware replacement
One major vulnerability exploited by China’s Salt Typhoon hacking unit is a Cisco hardware flaw that can’t be patched and requires physical replacement, according to a person with knowledge of the intrusions.
US sanctions Chinese company that helped facilitate espionage hacks
Integrity Technology Group, known to researchers as Flax Typhoon, contracted with China’s Ministry of State Security to carry out infiltrations into internet of things devices, the FBI previously said.
Is AI the missing piece for government agencies to achieve zero trust security?
Here are three factors to consider.
Chinese-sponsored hackers accessed Treasury documents in ‘major incident’
The incident comes in the final days of the Biden presidency and as officials work to root out China-tied hackers from U.S. telecommunications systems.
Major cyber news drops under the buzzer for 2024
A ninth U.S. telecommunications provider fell onto Salt Typhoon’s victim list, and the UN’s controversial cybercrime treaty was adopted.
How federal agencies can combat identity-related cyber threats and unmask cybercriminals
COMMENTARY | Identity-related threats remain a big problem in government.
Cybersecurity response: Not just an IT issue but an emergency preparedness priority
COMMENTARY | Government and private sector organizations have begun to recognize that physical and virtual assets must be protected from cyber threats in the same way as IT.
Hundreds of organizations were notified of potential Salt Typhoon compromise
Some of the exploited vulnerabilities have had fixes available for several years. One provider’s management system was protected with a basic numeric password.
Several Pentagon commands failed to keep good track of classified mobile devices, audit finds
The report comes amid an ongoing Chinese intrusion into U.S. telecom systems. Congress is also working to shore up device protections for servicemembers through the annual defense authorization bill.
Featured eBooks