logo
#

Latest news with #SaltTyphoon

Chinese hackers have seized control. How did we let this happen?
Chinese hackers have seized control. How did we let this happen?

Telegraph

time21 hours ago

  • Politics
  • Telegraph

Chinese hackers have seized control. How did we let this happen?

A civilisation that cannot defend itself really should not expect to survive, and after the latest cybersecurity news, I wonder how it can. An official advisory was recently sent out to the US military, warning that all forces must now assume their networks have been breached. The enemy is inside the house. What it means is that no system connected to the internet can be defended. Our own national cybersecurity agency asked UK businesses to make this presumption in 2020. The reason this hasn't been bigger news is that we've become fatalistic and weary, as one cybersecurity attack follows another. So when we discovered in early July that Chinese hackers had gained control of Microsoft servers at hundreds of US government agencies – including the US nuclear weapons agency – it was just another hacking story. What made this one noteworthy was that there wasn't immediately a fix or a patch, Microsoft admitted last Tuesday. Incredibly, confirmation of the US military's 'assume breach' alert had to be dragged out of the Department of Defense via Freedom of Information Act requests by a campaigning non-profit called Property of the People. These developments are the latest stage in an ongoing state-sponsored Chinese campaign, in which hacking has evolved from widespread commercial espionage a decade ago into something far more threatening. The latest phases, Salt Typhoon and now Volt Typhoon, are meticulous and sophisticated. They target not just government agencies like the National Guard, and China-critical MPs like Sir Iain Duncan Smith, but also private sector companies in the energy, telecoms, transport and water sectors. Ciaran Martin, former head of NCSC, the cybersecurity centre based at GCHQ, says that China's capabilities have been transformed. 'Now think of dozens or even hundreds of [individual] hacks at the same time – 'everything, everywhere, all at once' in the words of Jen Easterly, recently departed head of the US Cybersecurity and Infrastructure Security Agency.' Software attacks on our computer systems can create unique damage in ways that conventional warfare cannot. Let's consider two. While aerial bombing can produce spectacular instant results, targets can be disassembled prior to attack, and can be quickly rebuilt after the attack. Both happened with the recent attack on Iraq's nuclear facilities. But recovering from cyber attacks is much harder. Ask the British Library, which has still not restored all of its services. 'Printed catalogues and handlists are available in our Reading Rooms', it still advises visitors to its website. The attack took place in October 2023. A second way in which cyber attacks now present a unique challenge is the ability of Chinese hackers to 'live off the land' after they break through. Rather like special forces embedded behind enemy lines, hackers conceal themselves undetected for months or years. To the guardians of the network, they are just another innocent user. 'Both Salt and Volt Typhoon were in play for years before being detected,' writes Martin. 'And they are strategic compromises of the West on a scale hitherto unseen by any other cyber power.' Not only do we not know when the attack is over, we don't even know when it has begun. How did this happen? If I haven't depressed you enough, this is where it gets particularly troubling. Cybersecurity is a gnarly failure of accountability and regulation that spans decades of indifference, and implicates business complacency and government apathy. The internet protocols (IP) we use today are completely rotten. The great and the good of the IT and telecommunications industries spent the entire 1980s in international committees devising complex secure networking protocols, only to be met with mistrust and specifications no one really wanted. Fed up with waiting, we adopted today's protocols, which were cheap and simple to implement, but not secure. Now, the international standards bodies that might devise a successor to IP are dominated by China. When they fail, suppliers can hide behind licensing agreements and expensive lawyers. No one goes to prison for bad security design. Their customers – us – are guilty of negligence too. Salt Typhoon took advantage of a bug in Cisco routers that users had not bothered to fix for seven years. As a society, we rush to implement technologies without thinking too hard about externalities. Generative artificial intelligence (AI) opens up lots of new holes, and also lowers the bar so that even the technically unskilled can plant hacks. All in all, then, this may not seem a good time to force Britons to use a new government identity service. Especially when you know that 'red team' penetration testing proved in March that this could be penetrated by hostile foreign agents without them being detected. This is what Baroness Neville Jones calls 'a piece of critical infrastructure'. Chinese agents may already be 'living off the land' inside the One Login system, on which your government wallet has been built, and soon perhaps, your digital ID. But don't expect Peter Kyle, the Science and Technology Minister, to put the brakes on the One Login project when he's its biggest fan. To survive and prosper, we need serious and technically aware people in his position, who listen to the security professionals. Kyle appeared on Newsnight last week wearing jeans and a T-shirt and trainers, all of which were intended to signal to viewers his youthful love of digital technology. He is 54.

Space Force Vice Chief and White House's Alexei Bulazel Among Experts Speaking at 16
Space Force Vice Chief and White House's Alexei Bulazel Among Experts Speaking at 16

Business Wire

time7 days ago

  • Business
  • Business Wire

Space Force Vice Chief and White House's Alexei Bulazel Among Experts Speaking at 16

WASHINGTON--(BUSINESS WIRE)--Gen. Michael A. Guetlein, the Vice Chief of Space Operations, U.S. Space Force, and Alexei Bulazel, Special Assistant to the President and NSC Senior Director for Cyber, White House, are confirmed to speak at the 16th Annual Billington CyberSecurity Summit, being held September 9-12, 2025 at the Walter E. Washington Convention Center. Both speakers will address topics related to the event's theme: Cyber and AI Frontiers: Strategies for a Secure and Smarter Government. Designed to address the nation's pressing cyber needs, the four-day event includes over 50 panel discussions, breakout sessions, and fireside chats that explore topics such as quantum computing, the Salt Typhoon attack, Zero Trust, and AI. Share 'Cyber threats are growing and evolving as technology does. Understanding our adversaries and the risks they pose is critical to protecting our nation and allies. We are pleased that General Guetlein and Mr. Bulazel will share their unique insights with summit attendees,' explained Thomas K. Billington, CEO and Founder, Billington CyberSecurity, a leading cyber education company for executives. Gen. Guetlein will speak at a fireside titled: The Intersection of Space and Cyber in which he will discuss the growing interconnectivity between cyber and space and how the U.S. Space Force is looking to protect it. Bulazel will lay out the Trump Administration's key cyber strategic objectives and highlight the Administration's policy implementation plans during a fireside entitled Cyber Priorities of the White House National Security Council. Designed to address the nation's pressing cyber needs, the four-day event includes over 50 panel discussions, breakout sessions, and fireside chats that explore topics such as quantum computing, the Salt Typhoon attack, legacy systems, cloud attack methodologies, advanced cyber hacker insights, and Zero Trust. These topics are part of this year's tracks which include: Application Security Artificial Intelligence Cloud Security Data Protection Foundational Security/Security by Design Identity Management Industrial Control Systems/Operational Technology/IOT Future of Cyber Threat/Cyber Threat Intelligence Risk Management and Compliance Security Operations Consulting Supply Chain Considerations Other summit headliners include: Gen. Dan Caine, Chairman, the Joint Chiefs of Staff, DoD Leonel Garciga, Chief Information Officer, US Army Katherine 'Katie' Arrington, Performing the Duties of Chief Information Officer, DOD Richard Horne, CEO, National Cyber Security Centre (NCSC), United Kingdom Rajiv Gupta, Head, Canadian Cyber Security Centre Lt. Gen. Paul T. Stanton, Commander of the Joint Force, Headquarters-Department of Defense Information Network and Director, DISA (Invited Pending Agency Approva l) Lt. Gen. Michelle McGuinness, Australia's National Cyber Security Coordinator Jennifer Link, CISO, CIA James Kemp Jennings Roche, CISO, DoD Cyber Crime Center Adarryl Roberts, CIO, DLA Dr. Kelly Fletcher, CIO, Department of State (Invited Pending Agency Approval) Jane Rathbun, CIO, U.S. Department of the Navy Presented by a variety of sponsors, including Lead Underwriters: Amazon Web Services, CISCO, and Leidos, the summit will also include a host of receptions to help attendees meet and engage with other conference attendees and speakers and has over 150 cyber-focused vendor booths where attendees can see demos and learn about innovative technologies. Learn more or register at Attendee tickets for government and military are complimentary. Credentialed working media are free and encouraged to register in advance to cover the event at About Billington CyberSecurity Founded in 2010, Billington CyberSecurity is the leading cyber education company for executives, hosting high-caliber summits and workshops that explore key cyber issues that advance the cybersecurity of the U.S. government, its allied partners, and critical infrastructure. These events convene senior most government officials and industry partners, highlighted by its signature conference—the annual Billington CyberSecurity Summit held each fall—which attracts more than 3,500 attendees and 250 speakers.

How China's growing cyber-hacking capabilities have raised alarm around the world
How China's growing cyber-hacking capabilities have raised alarm around the world

Straits Times

time19-07-2025

  • Politics
  • Straits Times

How China's growing cyber-hacking capabilities have raised alarm around the world

Find out what's new on ST website and app. China's government has consistently denied that they have sponsored such attacks. - In October 2024, US authorities said that a China-linked cyber group called Salt Typhoon was targeting critical American infrastructure, including major telecommunications operators. The aim was to obtain private communications of US President Donald Trump and his then running mate JD Vance, as well as communications made by staffers of Ms Kamala Harris's presidential campaign in 2024.

Copper for a smarter you? Study finds this mineral may boost brain health as you age
Copper for a smarter you? Study finds this mineral may boost brain health as you age

Time of India

time17-07-2025

  • Health
  • Time of India

Copper for a smarter you? Study finds this mineral may boost brain health as you age

Copper may not be the first thing that comes to mind when considering brain health, but this could change. A recent study discovered a surprising link between copper-rich diets and improved cognitive function in older adults. Researchers believe there could be a "sweet spot" for daily copper consumption. What did the study actually find? Explore courses from Top Institutes in Select a Course Category Artificial Intelligence PGDM Degree Design Thinking MCA Finance Digital Marketing MBA CXO healthcare others Data Science Data Science Cybersecurity Public Policy Operations Management Data Analytics Healthcare Leadership Technology Project Management Product Management Others Management Skills you'll gain: Duration: 7 Months S P Jain Institute of Management and Research CERT-SPJIMR Exec Cert Prog in AI for Biz India Starts on undefined Get Details A new study from China's Hebei Medical University links higher copper intake in older adults to better cognitive function. While the results are preliminary, they provide new insights into aging and brain health. Researchers analyzed data from over 2,400 seniors in the United States and discovered that those who consumed approximately 1.22 mg of copper per day performed better on brain tests. More research is needed to confirm this link. ALSO READ: Salt Typhoon breach triggers nationwide alert — are US military networks compromised? Live Events The recent study found a significant correlation between older adults' diets and improved cognitive function. In a study conducted by a team from Hebei Medical University in China, which examined diet and health data for 2,420 adults in the United States who were 60 years of age or older, it was discovered that a higher copper intake was associated with improved cognitive function, as per a report by Science Alert. Although there was a threshold point beyond which more copper doesn't appear to provide any additional benefits, people with higher copper intakes scored significantly higher than those with lower copper intakes across a number of measures. How reliable are the results? "The current study indicates a potential association between dietary copper intake and enhanced cognitive function in American older adults, particularly among those with a history of stroke," the authors of the paper write. "An ideal copper intake level was proposed by dose-response analysis, with an inflection point of roughly 1.22 mg daily. Nevertheless, additional longitudinal research is required to validate these results. And that addresses some of the study's main shortcomings. ALSO READ: Harvest Rosemary the right way — keep your plant thriving all year with these easy tips The researchers estimated the participants' copper intake by asking them twice to report everything they had eaten in the previous 24 hours. Only a moment in time is provided, and self-reporting biases may be introduced. Studies that track participants over a number of years and take more precise measurements of their copper intake would be necessary to conduct additional research. Therefore, we cannot claim that there is a clear cause-and-effect link in this case. But the statistical strength of the association justifies more research. Furthermore, it is consistent with other research that found copper to be beneficial to the brain. We are aware that it guards against harm and facilitates neuronal communication and energy production in the brain. Therefore, the study's findings are not shocking. They do, however, assist in determining a "sweet spot" for copper consumption and quantifying the benefits of copper across a sizable aged population and a variety of cognitive tests. "Though copper is necessary for proper functioning of the brain, and deficiencies can lead to neurological disorders, excessive copper can be toxic, leading to oxidative stress and neurodegeneration," the investigators write. Where do we get copper in our diets? The daily dosage of 1.22 mg is comparable to a bowl of lentils or a handful of walnuts. Unbelievably, a variety of foods, such as oysters, potatoes, dark chocolate, wheat bran, and mushrooms, contain copper. Micronutrients like magnesium, iron, selenium, zinc, and copper are gaining attention due to their potential role in maintaining cognitive function as people age. This is in addition to what has already been found in research on diet and good aging. Though diet is by no means the only component, it is evident that our diet has a significant impact on the health of our brains. Improvements in the prevention and treatment of the brain issues that typically accompany aging can be facilitated by research such as this. FAQs How much copper could improve brain function? The study found that taking approximately 1.22 mg per day provided the most benefit. Where do I get copper from food? Lentils, dark chocolate, walnuts, and mushrooms are excellent sources.

Salt Typhoon breach triggers nationwide alert — are US military networks compromised?
Salt Typhoon breach triggers nationwide alert — are US military networks compromised?

Time of India

time17-07-2025

  • Time of India

Salt Typhoon breach triggers nationwide alert — are US military networks compromised?

A major cyber espionage breach has rocked the United States National Guard network. A group with ties to China called Salt Typhoon quietly accessed sensitive data for almost a year. Experts say that the breach could put national security at stake. How long did the hackers go undetected? Reportedly a Chinese hacking group called Salt Typhoon broke into a US National Guard network and stole important data without being found for months. Explore courses from Top Institutes in Select a Course Category Technology others healthcare Management MBA CXO Cybersecurity Design Thinking Data Analytics PGDM Data Science Public Policy Degree Product Management MCA Leadership Operations Management Finance Artificial Intelligence Digital Marketing Data Science Healthcare Others Project Management Skills you'll gain: Duration: 12 Weeks MIT xPRO CERT-MIT XPRO Building AI Prod India Starts on undefined Get Details The group gained access to sensitive military and law enforcement data by breaching the compromised network and hiding there for nearly a year, according to the US Department of Defense (DoD). The identity of the affected National Guard unit remained unclear. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Average Cost To Rent A Private Jet May Surprise You (View Prices) Private Jet I Search Ads Learn More Undo What could the stolen data be used for? The Department of Defense warns that this could trigger additional attacks and jeopardize the nation's infrastructure. Experts say that all military systems should immediately adopt advanced cybersecurity models. The DoD report describes a lengthy campaign that "extensively compromised" the National Guard network between March 2024 and December of last year. It was made public in response to a FOI request made by the nonprofit Property of the People, as per a report by IT Pro. Live Events Now, US troops are being told that their networks might not be safe anymore. It is thought that the Salt Typhoon gathered and stole private information as part of the breach, including configuration files for state government and critical national infrastructure (CNI) organizations. ALSO READ: DOJ recommends one-day sentence for officer in Breonna Taylor raid, sparking outrage The DoD cautioned that this information could be used to enable subsequent Salt Typhoon hacks of these units. It also contained network diagrams and administrator credentials for these networks. In the past, Salt Typhoon has "enabled cyber intrusion elsewhere" by using stolen network configuration files, according to the DoD report. In fact, 1,462 configuration files linked to 70 US government and CNI identities across 12 sectors were stolen between January 2023 and March 2024. This included companies in the fields of wastewater, transportation, energy, and communication. The success of Salt Typhoon, according to the report, "could undermine local cybersecurity efforts to protect critical infrastructure." What's being done to prevent future breaches? The incident is the most recent in a series of well-publicized attacks by the group, which also includes attacks on Verizon and AT&T, two US telecom companies. White House officials issued a warning in December of last year, claiming that the group had access to and had recorded key US political figures' private conversations. ALSO READ: Steve Miller Band abruptly cancels 2025 Tour, fans left scratching their heads Public sector CTO Gary Barlet cautions that government agencies need to adopt Zero Trust more quickly and advance their breach containment strategy, and that all US forces must now assume their networks are compromised. There have been multiple cases in the public and private sectors in recent years where lateral movement has compromised sensitive data, so this is not the first breach of DoD systems. FAQs What types of data did Salt Typhoon steal? They viewed credentials, network diagrams, and infrastructure configuration files. What's the big deal with this breach? It jeopardizes military readiness and may enable future cyberattacks on critical systems.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store