insidecybersecurity.com Open in urlscan Pro
72.52.240.31  Public Scan

Submitted URL: https://insidecybersecurity.com/node/15521
Effective URL: https://insidecybersecurity.com/daily-news/cisa-partners-issue-advisory-detailing-volt-typhoon-tactics-mitigations-targeted-us
Submission: On February 12 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST /antibot

<form class="antibot" action="/antibot" method="post" id="user-login-form" accept-charset="UTF-8">
  <div>
    <div class="form-item form-item-name form-type-textfield form-group"> <label class="control-label" for="edit-name">Username <span class="form-required" title="This field is required.">*</span></label>
      <input tabindex="1" class="form-control form-text required" type="text" id="edit-name" name="name" value="" size="15" maxlength="60">
    </div>
    <div class="form-item form-item-pass form-type-password form-group"> <label class="control-label" for="edit-pass">Password <span class="form-required" title="This field is required.">*</span></label>
      <input tabindex="1" class="form-control form-text required" type="password" id="edit-pass" name="pass" size="15" maxlength="128">
    </div>
    <div class="form-item form-item-remember-me form-type-checkbox checkbox"> <label class="control-label" for="edit-remember-me"><input tabindex="1" type="checkbox" id="edit-remember-me" name="remember_me" value="1" checked="checked"
          class="form-checkbox">Remember me</label>
    </div>
    <ul>
      <li><a href="/user/register" title="Create a new user account.">Create new account</a></li>
      <li><a href="/user/password" title="Request new password via e-mail.">Request new password</a></li>
    </ul><input type="hidden" name="form_build_id" value="form-LpzxW58uR1ef2NMfj05jqXsCjHMSkI_oefIZ_tHABHk">
    <input type="hidden" name="form_id" value="user_login_block">
    <input type="hidden" name="antibot_key" value="">
    <div class="form-actions form-wrapper form-group" id="edit-actions"><button tabindex="1" type="submit" id="edit-submit" name="op" value="Log in" class="btn btn-primary form-submit icon-before"><span class="icon glyphicon glyphicon-log-in"
          aria-hidden="true"></span> Log in</button>
    </div>
  </div>
</form>

Text Content

Skip to main content
 * HOME
 * FEATURES
   * Daily News
   * Inside CISA
   * Cyber Congress
   * Cyber Reg Watch
   * Voices
 * TOPICS
   * 5G
   * Artificial lntelligence
   * Biden's Executive Order
   * Biden's National Security Memorandum
   * Botnets
   * China
   * Cloud
   * CMMC
   * Coronavirus
   * CSF 2.0
   * Cyber-Physical
   * Data Breach
   * Defense
   * Deterrence
   * Elections
   * Framework
   * FTC Cyber Rules
   * GDPR
   * Incident Reporting Law
   * Info-Sharing
   * Insurance
   * International
   * Internet of Things
   * Liability
   * National Cyber Strategy
   * Privacy
   * SEC Cyber Rules
   * Small Business
   * Software
   * Solarium
   * States
   * Supply Chain
   * Ukraine Crisis
   * Vulnerability Disclosure
   * Workforce
   * Zero Trust
 * SPECIALS
   * RSA Conference 2023
   * Previewing CSF 2.0
   * Biden Cyber Executive Order
   * Supply Chain Risk Webinar
   * RSA Conference 2020
   * CISA Annual Cyber Summit
   * Archives
 * ABOUT/PRICING
 * FREE TRIAL

 * Log in



February 12, 2024


Daily News


CISA, PARTNERS ISSUE ADVISORY DETAILING ‘VOLT TYPHOON’ TACTICS, MITIGATIONS
TARGETED AT U.S. CRITICAL INFRASTRUCTURE ENTITIES

By Sara Friedman / February 7, 2024
 * 
 * Share

The Cybersecurity and Infrastructure Security Agency has released guidance with
federal agency partners detailing actions U.S. critical infrastructure entities
should take to address potential compromises related to People’s Republic of
China state-sponsored actor “Volt Typhoon.”

“CISA and its U.S. Government partners have confirmed that this group of PRC
state-sponsored cyber actors has compromised entities across multiple critical
infrastructure sectors in cyberspace, including communications, energy,
transportation, and water and wastewater, in the United States and its
territories,” CISA says in a...

--------------------------------------------------------------------------------

You must have JavaScript enabled to use this form.


LOG IN TO ACCESS THIS CONTENT.

Username *
Password *
Remember me
 * Create new account
 * Request new password

Log in




NOT A SUBSCRIBER? SIGN UP FOR 30 DAYS FREE ACCESS TO EXCLUSIVE NEWS AND ANALYSIS
ON CYBERSECURITY REGULATIONS AND MORE.

FEATURES
 * Daily News
 * Inside CISA
 * Voices
 * Cyber Reg Watch
 * Special Reports
 * Documents

ABOUT
 * About Us/Pricing
 * Privacy Policy
 * Terms and Conditions

TOPICS
 * 5G
 * Artificial Intelligence
 * Biden's Executive Order
 * Biden's National Security Memorandum
 * Botnets
 * China
 * Cloud
 * CMMC
 * Coronavirus
 * Cyber Congress
 * Cyber Physical
 * Data-Breach
 * Defense
 * Deterrence
 * Elections
 * Framework
 * FTC Cyber Rules

TOPICS CON'T
 * GDPR
 * Incident Reporting Law
 * Info-Sharing
 * Insurance
 * International
 * Internet Of Things
 * Liability
 * National Cyber Strategy
 * Privacy
 * Small Business
 * Software
 * Solarium
 * States
 * Supply Chain
 * Vulnerability Disclosure
 * Workforce
 * Zero Trust

Inside Cybersecurity is a subscription-based premium news service for policy
professionals who need to know about evolving federal policies to protect
cyberspace.

CONNECT WITH US
 * Call us at 1-703-416-8500
 * 
 * 

© 2024. Inside Washington Publishers