Tag
China hacking

How China’s ‘Salt Typhoon’ Hackers Broke Into US Telecoms
By Mercy A. Kuo
Insights from Jonathan Pelson.

Understanding China’s Intelligence Strategy
By Mercy A. Kuo
Insights from Matthew Brazil.

Online Dump of Chinese Hacking Documents Offers Rare Window Into Pervasive State Surveillance
By Frank Bajak and Dake Kang
The documents, purportedly from the private security firm I-Soon, discuss hacking activity and tools to spy on both Chinese and foreigners.

China Calls Hacking Report ‘Far-Fetched’
By Associated Press
The Mandiant report accused a “China-nexus threat actor” of infiltrating the email systems of a wide range of government agencies, trade offices, and academic organizations.

Report: Chinese State-sponsored Hacking Group Highly Active
By David Rising
Insikt Group says RedGolf has close overlaps with groups tracked by other security companies under the names APT41 and BARIUM, suggesting a close affiliation.

A Recent Chinese Hack Is a Wake-up Call for the Security of the World’s Software Supply Chain
By John Speed Meyers
The almost unnoticed hack of MiMi points to a growing trend of software supply chain attacks, including by the Chinese government.

The Hacker and the State: Cyberattacks and the New Normal of Geopolitics
By Mercy A. Kuo
Insights from Ben Buchanan.

Security Firm Says Chinese Hackers Intercepted Text Messages
By Associated Press
FireEye did not specify the victims of the espionage, but said some were “high-value” targets.

US Slaps Cyberespionage Charges on 2 Chinese Intelligence Officers
By Shannon Tiezzi
The move signals that, trade war truce aside, serious tensions remain in the economic relationship.

Waiting for China’s Data Protection Law
By George G. Chen and Tiffany G. Wong
The lack of a unified legal framework may hamper China’s ongoing digitalization drive.

Evaluating China’s Cyber Power
By Greg Austin
China's approach to a nationally framed cyber power is self-defeating.

US, China Open New High-Level Cyber Talks
By Shannon Tiezzi
The dialogue on cybercrime announced during Xi's visit to the U.S. holds its first round of talks.
Page 1 of 2