{"id":13305,"date":"2024-02-13T05:37:28","date_gmt":"2024-02-13T04:37:28","guid":{"rendered":"http:\/\/costops.com\/index.php\/2024\/02\/13\/explainer-what-is-volt-typhoon-and-why-is-it-the-defining-threat-of-our-generation\/"},"modified":"2024-02-13T05:37:28","modified_gmt":"2024-02-13T04:37:28","slug":"explainer-what-is-volt-typhoon-and-why-is-it-the-defining-threat-of-our-generation","status":"publish","type":"post","link":"http:\/\/costops.com\/index.php\/2024\/02\/13\/explainer-what-is-volt-typhoon-and-why-is-it-the-defining-threat-of-our-generation\/","title":{"rendered":"Explainer: what is Volt Typhoon and why is it the \u2018defining threat of our generation\u2019?"},"content":{"rendered":"<p>FBI director has publicly identified the risk posed by a Chinese cyber operation that is believed to have compromised thousands of internet-connected devices<\/p>\n<p>Relations between the US and China \u2013 particularly over Beijing\u2019s threats to annex Taiwan \u2013 have plummeted in recent years, prompting growing concern about the potential for hostilities or all-out conflict. So recent revelations that a Chinese hacking network known as Volt Typhoon had been lying dormant inside US critical infrastructure <a href=\"https:\/\/www.theguardian.com\/technology\/2024\/feb\/08\/chinese-hack-us-transportation-infrastructure\">for as long as five years<\/a> have sparked considerable alarm.<\/p>\n<p>The network exploited US technological and security weaknesses. But rather than stealing secrets, US and allied intelligence services said it was focused on \u201cpre-positioning\u201d itself for future acts of sabotage.<\/p>\n<p> <a href=\"https:\/\/www.theguardian.com\/technology\/2024\/feb\/13\/volt-typhoon-what-is-it-how-does-it-work-chinese-cyber-operation-china-hackers-explainer\">Continue reading&#8230;<\/a><br \/>\n<img src=\"https:\/\/i.guim.co.uk\/img\/media\/b4a60fb59a988517de97b303ecda1983c415d637\/0_0_4000_2400\/master\/4000.jpg?width=140&amp;quality=85&amp;auto=format&amp;fit=max&amp;s=3368d8b0bc0dbc20fad9a269f6d66c26\" title=\"Explainer: what is Volt Typhoon and why is it the \u2018defining threat of our generation\u2019?\" \/>FBI director has publicly identified the risk posed by a Chinese cyber operation that is believed to have compromised thousands of internet-connected devices<br \/>\nRelations between the US and China \u2013 particularly over Beijing\u2019s threats to annex Taiwan \u2013 have plummeted in recent years, prompting growing concern about the potential for hostilities or all-out conflict. So recent revelations that a Chinese hacking network known as Volt Typhoon had been lying dormant inside US critical infrastructure for as long as five years have sparked considerable alarm.<br \/>\nThe network exploited US technological and security weaknesses. But rather than stealing secrets, US and allied intelligence services said it was focused on \u201cpre-positioning\u201d itself for future acts of sabotage. Continue reading&#8230;Technology | The Guardian<\/p>\n","protected":false},"excerpt":{"rendered":"<p>FBI director has publicly identified the risk posed by a Chinese cyber operation that is believed to have compromised thousands of internet-connected devices Relations between the US and China \u2013 particularly over Beijing\u2019s threats to annex Taiwan \u2013 have plummeted in recent years, prompting growing concern about the potential for hostilities or all-out conflict. So &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"http:\/\/costops.com\/index.php\/2024\/02\/13\/explainer-what-is-volt-typhoon-and-why-is-it-the-defining-threat-of-our-generation\/\"> <span class=\"screen-reader-text\">Explainer: what is Volt Typhoon and why is it the \u2018defining threat of our generation\u2019?<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":0,"featured_media":13306,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/posts\/13305"}],"collection":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/comments?post=13305"}],"version-history":[{"count":0,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/posts\/13305\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/media\/13306"}],"wp:attachment":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/media?parent=13305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/categories?post=13305"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/tags?post=13305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}