BTC $59831.0676
ETH $3015.4573
BNB $566.4599
SOL $140.9834
XRP $0.5220
stETH $3005.3363
DOGE $0.1350
TON $5.3168
ADA $0.4610
AVAX $34.1621
TRX $0.1228
wstETH $3513.7983
DOT $7.2084
WETH $3015.9473
WBTC $59803.6422
BCH $438.9622
LINK $13.6917
MATIC $0.7220
UNI $7.1335
ICP $13.3736
LTC $80.8834
DAI $1.0004
IMX $2.2476
FDUSD $1.0022
CAKE $2.5561
RNDR $7.8325
NEAR $6.3289
ETC $26.0608
HBAR $0.1037
PEPE $0.0000
MNT $0.9999
FIL $5.9394
STX $2.1190
OKB $49.2303
ATOM $8.6578
WIF $2.8221
TAO $406.7622
VET $0.0354
MKR $2777.1963
KAS $0.1070
GRT $0.2542
USDE $0.9989
XMR $122.8785
FET $2.0407
XLM $0.1108
AR $34.0444
INJ $23.6785
BTC $59831.0676
ETH $3015.4573
BNB $566.4599
SOL $140.9834
XRP $0.5220
stETH $3005.3363
DOGE $0.1350
TON $5.3168
ADA $0.4610
AVAX $34.1621
TRX $0.1228
wstETH $3513.7983
DOT $7.2084
WETH $3015.9473
WBTC $59803.6422
BCH $438.9622
LINK $13.6917
MATIC $0.7220
UNI $7.1335
ICP $13.3736
LTC $80.8834
DAI $1.0004
IMX $2.2476
FDUSD $1.0022
CAKE $2.5561
RNDR $7.8325
NEAR $6.3289
ETC $26.0608
HBAR $0.1037
PEPE $0.0000
MNT $0.9999
FIL $5.9394
STX $2.1190
OKB $49.2303
ATOM $8.6578
WIF $2.8221
TAO $406.7622
VET $0.0354
MKR $2777.1963
KAS $0.1070
GRT $0.2542
USDE $0.9989
XMR $122.8785
FET $2.0407
XLM $0.1108
AR $34.0444
INJ $23.6785
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • The US government said what Chinese hackers have been using to attack critical US infrastructure since 2020


    Vulnerabilities in the most popular and used products still threaten US national security.

    The NSA, CISA and FBI have published the main vulnerabilities that Chinese hackers use to attack government systems and critical infrastructure networks.

    According to the bulletin, Chinese-sponsored hackers target US and allied systems, as well as technology companies, to gain access to sensitive data and steal intellectual property.

    3 federal agencies consider China's cyber activity one of the largest and most dynamic threats to US government and civilian networks.

    The bulletin also provides mitigations for each of the security flaws most commonly exploited by Chinese attackers, as well as detection techniques and vulnerable technologies that help defenders detect and block attack attempts.

    Since 2020, the following vulnerabilities have been most commonly exploited by Chinese government hackers, according to the NSA, CISA, and FBI.

    The NSA, CISA, and FBI also urged US and allied governments, critical infrastructure facilities, and private companies to take the following steps to protect against Chinese cyberattacks.

    Regularly install security patches;
    Use multi-factor authentication;
    Replace legacy network infrastructure that no longer receives updates.

    They also recommend moving to a "zero trust" model and ensuring robust logging of internet services to quickly detect attack attempts.

    Author DeepWeb
    The head of the German cybersecurity service may be fired due to ties with the Russian Federation
    Fortinet urged administrators to urgently update systems

    Comments 0

    Add comment