-
サマリー
あらすじ・解説
This is your Digital Dragon Watch: Weekly China Cyber Alert podcast.
Hey there, I'm Ting, and welcome to Digital Dragon Watch, your weekly dose of China cyber alerts. Let's dive right in because the past few days have been anything but quiet.
First off, a Chinese cybersecurity body, the National Computer Network Emergency Response Technical Team/Coordination Centre of China, has accused the United States of hacking and stealing business secrets from a research centre. This includes an advanced material design research unit targeted since August and another attack in May 2023, where a breach in Microsoft Exchange software was used to invade the email server of a large hi-tech enterprise specializing in smart energy and digital information[1].
But let's not forget, the US has been on high alert too. The Treasury Department recently sanctioned a Chinese cybersecurity company, Sichuan Silence Information Technology Company, Limited, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide, including many US critical infrastructure companies[4].
Meanwhile, the House Homeland Security Committee Republicans introduced legislation to combat growing cyber threats from the Chinese Communist Party (CCP) against US critical infrastructure. This bill aims to establish an interagency task force led by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) to address these threats, including those posed by state-sponsored cyber actors like 'Volt Typhoon'[2].
Speaking of Volt Typhoon, CISA, the National Security Agency (NSA), and the FBI have confirmed that these PRC state-sponsored cyber actors have compromised the IT environments of multiple critical infrastructure organizations, primarily in the Communications, Energy, Transportation Systems, and Water and Wastewater Systems Sectors[5].
So, what can you do to protect yourself? CISA recommends staying vigilant and using tools like the CyberSentry Program for threat detection and monitoring. It's also crucial to be aware of techniques like "living off the land," where cyber actors abuse tools already present in the environment to maintain anonymity.
In summary, the past week has seen significant China-related cybersecurity incidents, from accusations of US hacking to sanctions against Chinese cyber actors and legislative efforts to combat these threats. Stay safe out there, and keep your digital dragons at bay. That's all for now. Stay tuned for more updates from Digital Dragon Watch.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
Hey there, I'm Ting, and welcome to Digital Dragon Watch, your weekly dose of China cyber alerts. Let's dive right in because the past few days have been anything but quiet.
First off, a Chinese cybersecurity body, the National Computer Network Emergency Response Technical Team/Coordination Centre of China, has accused the United States of hacking and stealing business secrets from a research centre. This includes an advanced material design research unit targeted since August and another attack in May 2023, where a breach in Microsoft Exchange software was used to invade the email server of a large hi-tech enterprise specializing in smart energy and digital information[1].
But let's not forget, the US has been on high alert too. The Treasury Department recently sanctioned a Chinese cybersecurity company, Sichuan Silence Information Technology Company, Limited, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide, including many US critical infrastructure companies[4].
Meanwhile, the House Homeland Security Committee Republicans introduced legislation to combat growing cyber threats from the Chinese Communist Party (CCP) against US critical infrastructure. This bill aims to establish an interagency task force led by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) to address these threats, including those posed by state-sponsored cyber actors like 'Volt Typhoon'[2].
Speaking of Volt Typhoon, CISA, the National Security Agency (NSA), and the FBI have confirmed that these PRC state-sponsored cyber actors have compromised the IT environments of multiple critical infrastructure organizations, primarily in the Communications, Energy, Transportation Systems, and Water and Wastewater Systems Sectors[5].
So, what can you do to protect yourself? CISA recommends staying vigilant and using tools like the CyberSentry Program for threat detection and monitoring. It's also crucial to be aware of techniques like "living off the land," where cyber actors abuse tools already present in the environment to maintain anonymity.
In summary, the past week has seen significant China-related cybersecurity incidents, from accusations of US hacking to sanctions against Chinese cyber actors and legislative efforts to combat these threats. Stay safe out there, and keep your digital dragons at bay. That's all for now. Stay tuned for more updates from Digital Dragon Watch.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta