Alleged Salt Typhoon hackers received Cisco training

Two individuals connected to China's Salt Typhoon hacking group reportedly underwent training at Cisco's networking academy. This revelation highlights potential vulnerabilities in global cybersecurity education programs. Separately, US lawmakers warn of inadequate safeguards in expanded wiretap authorities.

Recent investigations have uncovered that two people allegedly associated with China's notorious Salt Typhoon espionage operation previously participated in Cisco's well-established networking academy program. Salt Typhoon is known for its extensive cyber intrusions targeting US telecommunications firms and government entities. The academy, a prominent initiative by Cisco, provides technical training to aspiring network professionals worldwide, but this case raises questions about vetting processes for participants from various backgrounds.

In a related development on domestic surveillance, members of the US Congress have voiced growing concerns over the effectiveness of protections surrounding broadened wiretap capabilities. These warnings indicate that existing safeguards are not functioning as intended, potentially enabling intelligence agencies to gather extensive data on American citizens without sufficient oversight or legal boundaries. Lawmakers emphasize the need for stronger constraints to protect privacy rights amid evolving digital threats.

This intersection of international hacking and internal surveillance issues underscores ongoing tensions in cybersecurity policy. While details on the individuals' training specifics remain limited, the findings prompt discussions on how educational platforms can prevent exploitation by state-sponsored actors. Congressional alerts further spotlight the balance between national security and individual liberties in the US.

Articoli correlati

Stanford student Elsa Johnson testifies to Congress about alleged Chinese government-linked intimidation, including threats and surveillance.
Immagine generata dall'IA

Stanford student tells Congress she was targeted in alleged CCP-linked intimidation campaign

Riportato dall'IA Immagine generata dall'IA Verificato

Elsa Johnson, a Stanford University junior and editor-in-chief of The Stanford Review, testified in Congress that she believes she and her family were targeted by a Chinese government-linked effort to intimidate her, including online outreach, threatening messages and warnings from the FBI about possible physical surveillance.

Emails of US congressional staff have been hacked as part of the Salt Typhoon campaign attributed to Chinese hackers. The incident marks another appearance by these notorious actors in targeting sensitive communications. The breach was reported on January 8, 2026.

Riportato dall'IA

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Journalists reported mysterious phishing attempts by unknowns a few weeks ago. The Dutch secret service now holds Russia responsible for attacks on the messaging apps WhatsApp and Signal. The report explains how the attacks work and how users can protect themselves.

Riportato dall'IA

The FBI is probing allegations that its systems have been breached, with reports suggesting that wire taps and search warrants were hijacked. The agency has remained tight-lipped on the specifics of the incident. This development was reported on March 6, 2026.

The United States has warned Syria against relying on Chinese telecommunications technology, arguing it conflicts with US interests and threatens national security, according to three sources familiar with the matter. Washington urged Damascus, which is considering buying Chinese telecoms technology, to procure from the US or allied states. Syrian officials noted that infrastructure development projects are time-critical and they seek greater vendor diversity.

Riportato dall'IA

The EU Commission has presented a revised cybersecurity law to better fend off attacks and reduce dependencies on high-risk third countries. In particular focus: Chinese companies like Huawei and ZTE, which are to be effectively excluded from 5G rollout. This follows a recent hacker attack on the Eurail platform.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta