The Register on MSN13d
China's Silk Typhoon, tied to US Treasury break-in, now hammers IT and govt targetsUpdated Silk Typhoon, the Chinese government crew believed to be behind the December US Treasury intrusions, has been abusing ...
The Chinese snoops gained initial access via a buggy FortiGate 300D firewall, according to Lawler. Fortinet patched this flaw ...
Silk Typhoon exploits zero-day vulnerabilities, stolen API keys, and cloud services to infiltrate IT supply chains and ...
The Justice Department claims 10 alleged hackers and two Chinese government officials took part in a wave of cyberattacks ...
Silk Typhoon APT caught using IT supply chain entry points to conduct reconnaissance, siphon data, and move laterally on ...
The threat group’s tactics mark a shift from direct exploits to lateral movement through privileged access obtained by compromising IT services suppliers and third-party partners.
NATSEC-TECH THURSDAY — March 13, 2025: Every Thursday’s edition of Threat Status highlights the intersection between national ...
It's now clear the LEWLD was one of those their targets. Groups like Volt Typhoon, "don’t always go for high-profile ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results