The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber attacks mounted by the China-linked Salt Typhoon actors to breach major global telecommunications providers as part of a cyber espionage campaign. The attackers exploited a critical Cisco IOS XE software (CVE-2023-20198, CVSS score: 10.0) to access configuration files from three network devices registered to a Canadian telecommunications company in mid-February 2025. The threat actors are also said to have modified at least one of the files to configure a Generic Routing Encapsulation (GRE) tunnel, enabling traffic collection from the network. The name of the targeted company was not disclosed. https://lnkd.in/dzQMvdRb
FBI and CCCS warn of cyber attacks by China-linked actors
More Relevant Posts
-
🚨 Cyber Byte: F5 Breach Linked to Chinese State-Actors Raises Alarms 🔓 What Happened? Security sources say U.S. network equipment vendor F5 suffered a breach lasting at least 12 months, attributed to Chinese state-linked attackers, according to a Bloomberg/Reuters report. F5 claims the intrusion did not disrupt operations, but the unauthorized access reportedly targeted vulnerabilities in F5 products used across many critical infrastructures. ⚠️ Why It Matters: F5 devices are widely deployed to manage traffic and access in large networks. A compromise could allow attackers to manipulate or intercept traffic, inject backdoors, or pivot inside networks. The scale and stealth of the campaign suggest a long game, not a quick smash-and-grab. 🛡️ What You Should Do Now: Immediately audit your F5 deployments—check for unusual configurations or unexpected changes Ensure your F5 firmware is up to date, and tighten administrative access Monitor traffic for signs of interception or lateral movement Isolate critical segments if suspicious behavior is detected This breach underscores the growing risk of supply-chain and vendor-level attacks. Stay vigilant. #cybersecurity #cyberbyte #cyber #veteranowned #veteran #smallbusiness
To view or add a comment, sign in
-
A HIGH severity Use After Free (UAF) vulnerability (CVE-2025-58287, CVSS 7.8) impacts Huawei HarmonyOS versions 5.0.1 & 5.1.0, specifically in the office service. Exploitation could lead to serious data leaks and operational disruption—especially for organizations in finance, government, or critical infrastructure. 🛡️ No patch is available yet. Mitigate risk by restricting local access, enforcing endpoint security, educating users against phishing, and closely monitoring for unusual activity. Disable the vulnerable office service when possible and engage with Huawei for updates. Don’t wait — act now to strengthen defenses. https://lnkd.in/d3ngxzec #OffSeq #Huawei #Cybersecurity #Vulnerability #DataProtection
To view or add a comment, sign in
-
-
Over 12 BILLION DOLLARS per year. That is what cyber espionage is costing Australians, according to the Australian Security Intelligence Organisation. Don't miss BlackBerry's Christine Gadsby at SXSW Sydney today at 1pm, where she will be talking about this and the new trends in today's Australian Signals Directorate Annual Cyber Threat report, indicating the rise of malicious espionage actors targeting the telecommunications sector globally. Find out what is happening, and how organisations and individuals can keep conversations, group chats and government secrets, safe: 📍 ICC, Parkside 2 🕐 1:00 PM – 2:00 PM 🎤 Mobile Espionage: The Hidden Threats in Our Communications
To view or add a comment, sign in
-
-
🚨 Cyber Threat Digest – Last 24hrs: • F5 breach exposes over 266,000 BIG-IP devices to remote attacks after source code and vulnerability data stolen by nation-state actors—critical infrastructure at risk. • China-linked Salt Typhoon group exploits Citrix NetScaler flaw in global cyber-attack, targeting telecom and tech sectors with advanced persistence techniques. • 131 malicious Chrome extensions hijack WhatsApp Web sessions to launch large-scale spam campaign against Brazilian users—browser extension risk highlighted. Sources: TechRadar, Infosecurity Magazine, The Hacker News #cybersecurity #infosec #cybercrime #security
To view or add a comment, sign in
-
-
The Communications Security Establishment (CSE) defines a threat actor as a group or individual aiming, with malicious intent, to gain unauthorized access to or affect victims' data devices, systems, and networks. A CSE report indicates that nations like China, Russia, and Iran are increasingly behind cyberthreats to Canada. Attributing a cyber incident is difficult and time consuming, requiring significant resources. Investigating cyberthreat activity involves many considerations in the attribution process. #cybersecurity #threatactors #cyberthreats #attribution #datasecurity
To view or add a comment, sign in
-
The UK is seeking industry feedback on proposed updates to its Telecommunications Security Code of Practice, reflecting new risks presented from; - eSIM - SIM-swap attacks, Network APIs, The consultation is open until 22 October 2025 #TelecomSecurity #TelecomPrivacy #eSIM #TelcoAPI www.venetoprivacy.ie
To view or add a comment, sign in
-
The UK is seeking industry feedback on proposed updates to its Telecommunications Security Code of Practice, reflecting new risks presented from: -eSIMs, -SIM-swap attacks -Network APIs The consultation is open until 22 October 2025 #TelecomsSecurity #TelecomsPrivacy #eSIM #TelcoAPI www.venetoprivacy.ie
To view or add a comment, sign in
-
🔐 Are your CCTV recordings truly secure? Weak video encryption can put your privacy at serious risk! 🚨 🔍 Concerned about privacy in your CCTV system? Weak encryption in DVR/NVR setups can leave sensitive footage vulnerable 📉. Ensure you’re using advanced cybersecurity protocols and updated firmware for full protection 🔒. #CCTVSecurity #VideoEncryption #CyberPrivacy #SurveillanceTech #SmartSecurity #DataProtection #SecureNetwork #PrivacyMatters LIL bit Solution To address video encryption and privacy issues in CCTV NVR/DVR systems, upgrade to devices with strong AES encryption, enable secure login credentials, and keep firmware updated. These steps ensure safer recordings, defend against cyber threats, and provide reliable surveillance security for homes or businesses using SEO-based protective measures.
To view or add a comment, sign in
-
-
“Insider threats are a growing concern in cyber security, stemming from both unintentional actions, such as falling for phishing scams, as well as actions with deliberate malicious intent. Research from Spy Cloud found that 56% of organizations experienced an insider threat incident in the past year, with 60% of HR security still being manual - leaving huge exposure gaps for insider threats to sneak in.” #Cyberinsurance
To view or add a comment, sign in
-
🚨 Cyber Threat Update – Week 40 This week: 🔥 Cisco patches zero-days in ASA and Secure Firewall—perimeter risk rising. 🎭 Fake Teams installers deliver Oyster backdoor via malvertising. 📱 Klopatra trojan hits Spain and Italy—steals banking credentials. 👨💻 North Korean IT operatives apply for remote jobs to spy from within. 📩 Oracle-themed phishing campaign spreads panic and malware. 🛢️ Plus: U.S. tariffs, Iran sanctions, and rising hybrid threats at sea. 📺 Watch the full update on CyberSecTV. Powered by QuoIntelligence. #CyberThreatUpdate #APT #Phishing #Espionage #CyberSecurity #ThreatIntelligence #CyberSecTV
To view or add a comment, sign in