Alleged Salt Typhoon hackers received Cisco training

Two individuals connected to China's Salt Typhoon hacking group reportedly underwent training at Cisco's networking academy. This revelation highlights potential vulnerabilities in global cybersecurity education programs. Separately, US lawmakers warn of inadequate safeguards in expanded wiretap authorities.

Recent investigations have uncovered that two people allegedly associated with China's notorious Salt Typhoon espionage operation previously participated in Cisco's well-established networking academy program. Salt Typhoon is known for its extensive cyber intrusions targeting US telecommunications firms and government entities. The academy, a prominent initiative by Cisco, provides technical training to aspiring network professionals worldwide, but this case raises questions about vetting processes for participants from various backgrounds.

In a related development on domestic surveillance, members of the US Congress have voiced growing concerns over the effectiveness of protections surrounding broadened wiretap capabilities. These warnings indicate that existing safeguards are not functioning as intended, potentially enabling intelligence agencies to gather extensive data on American citizens without sufficient oversight or legal boundaries. Lawmakers emphasize the need for stronger constraints to protect privacy rights amid evolving digital threats.

This intersection of international hacking and internal surveillance issues underscores ongoing tensions in cybersecurity policy. While details on the individuals' training specifics remain limited, the findings prompt discussions on how educational platforms can prevent exploitation by state-sponsored actors. Congressional alerts further spotlight the balance between national security and individual liberties in the US.

Awọn iroyin ti o ni ibatan

Emails of US congressional staff have been hacked as part of the Salt Typhoon campaign attributed to Chinese hackers. The incident marks another appearance by these notorious actors in targeting sensitive communications. The breach was reported on January 8, 2026.

Ti AI ṣe iroyin

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Journalists reported mysterious phishing attempts by unknowns a few weeks ago. The Dutch secret service now holds Russia responsible for attacks on the messaging apps WhatsApp and Signal. The report explains how the attacks work and how users can protect themselves.

Ti AI ṣe iroyin

The FBI is probing allegations that its systems have been breached, with reports suggesting that wire taps and search warrants were hijacked. The agency has remained tight-lipped on the specifics of the incident. This development was reported on March 6, 2026.

 

 

 

Ojú-ìwé yìí nlo kuki

A nlo kuki fun itupalẹ lati mu ilọsiwaju wa. Ka ìlànà àṣírí wa fun alaye siwaju sii.
Kọ