- Volt Typhoon targets US critical infrastructure with living-off-the-land techniques https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/ 15 comments netsec
Linking pages
- China hacked Japan’s classified defense cyber networks, officials say - The Washington Post https://www.washingtonpost.com/national-security/2023/08/07/china-japan-hack-pentagon/ 132 comments
- China-backed Volt Typhoon hackers have lurked inside US critical infrastructure for ‘at least five years’ | TechCrunch https://techcrunch.com/2024/02/07/china-backed-volt-typhoon-hackers-have-lurked-inside-us-critical-infrastructure-for-at-least-five-years/ 45 comments
- Chinese state hackers infect critical infrastructure throughout the US and Guam | Ars Technica https://arstechnica.com/information-technology/2023/05/chinese-state-hackers-infect-critical-infrastructure-throughout-the-us-and-guam/ 24 comments
- Chinese malware targeting critical infrastructure, Microsoft and U.S. government warn - CBS News https://www.cbsnews.com/news/chinese-malware-targeting-critical-infrastructure-microsoft-u-s-government-warn/ 5 comments
- U.S. assets in Guam and mainland U.S. hacked by China https://interestingengineering.com/innovation/cybersercurity-us-and-guam-hacked 3 comments
- Office of Public Affairs | U.S. Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure | United States Department of Justice https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical 3 comments
- Chinese hackers seek capabilities to disrupt communications between US and Asia in event of crisis, Microsoft says | CNN Politics https://www.cnn.com/2023/05/24/politics/china-hackers-guam-microsoft-taiwan/index.html 2 comments
- China hack hurt military communnications in confrontation over Taiwan - The Washington Post https://www.washingtonpost.com/technology/2023/05/24/china-hack-guam-taiwan/ 0 comments
- China Hacks US Critical Networks in Guam, Raising Cyberwar Fears | WIRED https://www.wired.com/story/china-volt-typhoon-hack-us-critical-infrastructure/ 0 comments
- Chinese hackers breach US critical infrastructure in stealthy attacks https://www.bleepingcomputer.com/news/security/chinese-hackers-breach-us-critical-infrastructure-in-stealthy-attacks/ 0 comments
- The highly secretive Five Eyes alliance has disrupted a China-backed hacker group – in an unusually public manner https://theconversation.com/the-highly-secretive-five-eyes-alliance-has-disrupted-a-china-backed-hacker-group-in-an-unusually-public-manner-206403 0 comments
- Threat Actor - MISP galaxy https://misp-galaxy.org/threat-actor/ 0 comments
- PRC: Not Stealthy, Just Annoying + FTC Win Masks Shaky Legal Foundations | Lawfare https://www.lawfaremedia.org/article/prc-not-stealthy-just-annoying-ftc-win-masks-shaky-legal-foundations 0 comments
- Chinese hacking operations have entered a far more dangerous phase, US warns - Defense One https://www.defenseone.com/technology/2024/02/chinese-hacking-operations-have-entered-far-more-dangerous-phase-us-warns/393843/ 0 comments
- Explainer: what is Volt Typhoon and why is it the ‘defining threat of our generation’? | Hacking | The Guardian https://www.theguardian.com/technology/2024/feb/13/volt-typhoon-what-is-it-how-does-it-work-chinese-cyber-operation-china-hackers-explainer 0 comments
- Volt Typhoon and the Disruption of the U.S. Cyber Strategy | Lawfare https://www.lawfaremedia.org/article/volt-typhoon-and-the-disruption-of-the-u.s.-cyber-strategy 0 comments
- Recent Botnet Takedowns Allow U.S. Government to Reach Into Private Devices | Lawfare https://www.lawfaremedia.org/article/recent-botnet-takedowns-allow-u.s.-government-to-reach-into-private-devices 0 comments
- Dmitri Alperovitch on the New Cold War with China https://www.spytalk.co/p/dmitri-alperovitch-on-the-new-cold 0 comments
Related searches:
Search whole site: site:www.microsoft.com
Search title: Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog
See how to search.