Flax Typhoon targeted critical infrastructure in the U.S. and abroad, and Black Lotus Labs researchers observed a “large scanning effort” targeting U.S. military and government.
Benjamin Franklin writing his Autobiography. Franklin’s creation of a volunteer fire department has sparked an idea amongst the cybersecurity community. (Photo by Culture Club/Getty Images)
A picture taken on Feb. 28, 2023, shows the logo of TP-Link, a manufacturer of computer networking products, and its app Aginet, at the Mobile World Congress, the telecom industry’s biggest annual gathering, in Barcelona. (Photo by PAU BARRENA/AFP via Getty Images)
The top representatives from the chamber’s U.S.-China competition committee want an investigation into TP-Link Technologies and an assessment of its national security risks.
Jen Easterly, director of the Homeland Security Department’s Cybersecurity and Infrastructure Security Agency, testifies during a hearing by the House (Select) Strategic Competition Between the United States and the Chinese Communist Party Committee on Capitol Hill on January 31, 2024 in Washington, DC. (Photo by Kevin Dietsch/Getty Images)
Members of the People’s Liberation Army flag honour guard march in Tiananmen Square after the closing session of the NPC, or National People’s Congress at the Great Hall of the People on March 11, 2024 in Beijing, China. (Photo by Kevin Frayer/Getty Images)
Commander of the U.S. Cyber Command Army Gen. Paul Nakasone, Jen Easterly, Director of the Homeland Security Department’s Cybersecurity and Infrastructure Security Agency, and FBI Director Christopher Wray testify before the House (Select) Strategic Competition Between the United States and the Chinese Communist Party Committee on Capitol Hill on January 31, 2024 in Washington, DC. The Committee heard from intelligence officials on China’s Cyber threat to the United States. (Photo by Kevin Dietsch/Getty Images)
Wray indicated the FBI sees China as a more imminent threat to U.S. infrastructure as hacking groups like Volt Typhoon position resources for disruption ahead of a…
FBI, NSA and CISA officials warn that Volt Typhoon actors are "pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions."