Loading...
Loading...
Browse all stories on DeepNewz
VisitWill a new international cybersecurity collaboration initiative involving the US and China be introduced by December 31, 2025?
Yes • 50%
No • 50%
Official announcements from involved governments or international organizations
White House Confirms Salt Typhoon Cyberespionage Targeting 9 Telecoms, Affecting Millions of Americans' Geolocation and Phone Calls
Dec 29, 2024, 12:37 AM
The White House has confirmed a major cyberespionage incident known as 'Salt Typhoon,' attributed to Chinese hackers, which has affected multiple U.S. telecom companies. The incident has resulted in the geolocation of millions of Americans and the recording of their phone calls. The victim count has increased to nine telecom companies, with AT&T and Verizon among those targeted. The White House has criticized the telecom sector for failing to implement basic cybersecurity measures, which contributed to the breach. In response, the administration has issued a threat-hunting and hardening guide to help telecoms secure their networks. AT&T has acknowledged the attack but stated that its networks are now clear of intrusion, noting that the hackers targeted a few individuals of foreign intelligence interest. The breach has raised concerns about national security and the potential manipulation of surveillance data by Chinese intelligence.
View original story
Yes • 50%
No • 50%
Stalemate • 25%
Escalation • 25%
Other • 25%
Resolution Reached • 25%
Escalation of cyber conflict • 25%
New cybersecurity agreement • 25%
Increased cyber sanctions • 25%
No significant change • 25%
Talks failed • 25%
No official talks • 25%
Talks ongoing • 25%
Resolution reached • 25%
Agreement reached • 25%
Discussions ended • 25%
Ongoing discussions • 25%
No agreement • 25%
Escalation of sanctions • 25%
Status quo maintained • 25%
Resolution through diplomatic talks • 25%
Military posturing • 25%
Deteriorated relations • 25%
No change • 25%
Improved relations • 25%
Severe diplomatic conflict • 25%
No • 50%
Yes • 50%
No • 50%
Yes • 50%
Yes • 50%
No • 50%
Insider threats • 25%
Other • 25%
Phishing attacks • 25%
Exploiting software vulnerabilities • 25%