www.cybersecuritydive.com
Open in
urlscan Pro
2606:4700:4400::ac40:93a0
Public Scan
Submitted URL: https://link.cybersecuritydive.com/click/37753256.8986/aHR0cHM6Ly93d3cuY3liZXJzZWN1cml0eWRpdmUuY29tL25ld3MvZmNjLWN5YmVyLXJ1bGVzLXNh...
Effective URL: https://www.cybersecuritydive.com/news/fcc-cyber-rules-salt-typhoon/734867/?utm_source=Sailthru&utm_medium=email&utm_campaign=Issu...
Submission: On December 30 via api from AE — Scanned from DE
Effective URL: https://www.cybersecuritydive.com/news/fcc-cyber-rules-salt-typhoon/734867/?utm_source=Sailthru&utm_medium=email&utm_campaign=Issu...
Submission: On December 30 via api from AE — Scanned from DE
Form analysis
7 forms found in the DOMName: signup-inter-form — POST /signup/
<form id="signup-inter-form" class="form-basic" name="signup-inter-form" action="/signup/" method="POST">
<input type="hidden" name="signup_box_location" value="interstitial">
<input type="hidden" name="signup_initial_url_path" value="">
<h1> Don’t miss tomorrow’s Cybersecurity industry news </h1>
<p class="interstitial-text"> Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox. </p>
<p class="form-error__message" id="interstitial-error"></p>
<div id="form-interstitial">
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_37ad90_email">
<div id="newsletter-list-section">
</div>
<div id="interstitial-consent-container">
<input name="user_consent" value="1" id="id_user_consent" type="checkbox">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>.
You can unsubscribe at anytime. </span>
</div>
</div>
<input id="signup-inter-submit" class="email_submit submit button" type="submit" data-role="none" value="Subscribe today">
</form>
GET /search/
<form action="/search/" method="GET" data-ajax="false">
<label for="search-desktop">
<span class="screen-reader-text search">Search</span>
</label>
<input id="search-desktop" type="search" name="q" placeholder="Search" data-role="none">
<button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-drawer">
<img src="/static/img/menu_icons/search.svg?320116291121" alt="search" height="16" width="16" loading="lazy">
</button>
<img class="close" src="/static/img/menu_icons/close.svg?273117231121" width="16" height="16" alt="close search" loading="lazy">
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_7b224a_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_7b224a_email">
</label>
<input type="hidden" name="signup_box_location" value="elevated_footer">
<input type="hidden" name="signup_initial_url_path" value="/news/fcc-cyber-rules-salt-typhoon/734867/">
<input type="hidden" name="js_enabled" value="1" id="id_7b224a_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-elevated_footer" value="1" class="checkbox">
<label for="id_user_consent-elevated_footer">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_1cfa99_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_1cfa99_email">
</label>
<input type="hidden" name="signup_box_location" value="sidebar">
<input type="hidden" name="signup_initial_url_path" value="/news/fcc-cyber-rules-salt-typhoon/734867/">
<input type="hidden" name="js_enabled" value="1" id="id_1cfa99_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-sidebar" value="1" class="checkbox">
<label for="id_user_consent-sidebar">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_1ea57b_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_1ea57b_email">
</label>
<input type="hidden" name="signup_box_location" value="elevated_footer">
<input type="hidden" name="signup_initial_url_path" value="/news/fcc-cyber-rules-salt-typhoon/734867/">
<input type="hidden" name="js_enabled" value="1" id="id_1ea57b_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-elevated_footer" value="1" class="checkbox">
<label for="id_user_consent-elevated_footer">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
GET /search/
<form action="/search/" method="GET" data-ajax="false">
<label for="search-mobile">
<span class="screen-reader-text">Search</span>
<input id="search-mobile" type="search" name="q" placeholder="Search" data-role="none">
</label>
<button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-mobile">
<img src="/static/img/menu_icons/search.svg?320116291121" width="15" height="15" alt="search">
</button>
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_f86064_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_f86064_email">
</label>
<input type="hidden" name="signup_box_location" value="integrated_menu">
<input type="hidden" name="signup_initial_url_path" value="/news/fcc-cyber-rules-salt-typhoon/734867/">
<input type="hidden" name="js_enabled" value="1" id="id_f86064_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-integrated_menu" value="1" class="checkbox">
<label for="id_user_consent-integrated_menu">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
Text Content
Skip to main content CONTINUE TO SITE ➞ DON’T MISS TOMORROW’S CYBERSECURITY INDUSTRY NEWS Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox. By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. * Deep Dive * Library * Events * Press Releases * Topics Sign up * Search * Sign up Search * Strategy * Breaches * Vulnerability * Cyberattacks * Threats * Leadership & Careers * Policy & Regulation An article from Dive Brief FCC PROPOSES STRONGER TELECOM CYBER RULES AS SALT TYPHOON FALLOUT CONTINUES The agency’s proposed rule changes come two months after a China-government sponsored espionage campaign first came to light. Published Dec. 6, 2024 Matt Kapko Senior Reporter * post * share * post * print * email * license Federal Communications Commission Chair Jessica Rosenworcel testifies before the House Energy and Commerce Committee’s Communications and Technology Subcommittee on Dec. 5, 2019, in Washington, D.C. Rosenworcel proposed rules changes to bolster telecom operators defenses on Dec. 5, 2024. Chip Somodevilla/Getty Images via Getty Images DIVE BRIEF: * Federal Communications Commission Chair Jessica Rosenworcel on Thursday proposed stronger rules requiring telecom operators to secure their networks from intrusions, in response to the wave of China-linked attacks on U.S. carriers’ infrastructure. * The measure has two parts. Rosenworcel proposed a declaratory ruling to clarify telecom operators are legally obligated to secure their networks under Section 105 of the Communications Assistance for Law Enforcement Act. The second lever, a notice of proposed rulemaking, includes an annual certification requirement for telecom providers to maintain cybersecurity risk management plans. * “While the commission’s counterparts in the intelligence community are determining the scope and impact of the Salt Typhoon attack, we need to put in place a modern framework to help companies secure their networks and better prevent and respond to cyberattacks in the future,” Rosenworcel said in a statement Thursday. DIVE INSIGHT: The FCC’s proposals come two months after news first broke about an espionage campaign sponsored by China’s government that federal officials scrambled to assess and have yet to contain. “Given the magnitude of this global attack, it’s clear that we were caught off guard, need to catch up and then keep up,” said Stéphane Téral, founder and chief analyst at Téral Research. Salt Typhoon, a China-affiliated threat group, compromised at least eight U.S. telecom providers, stole a large amount of records and still has access to the networks, officials said earlier this week. The threat group gained broad access to communications of everyday Americans and also stole private audio and text content of targeted U.S. government and political officials. The FCC did not respond to a request for comment or explain when or how soon the declaratory ruling or proposed rule could take effect. The agency took an active role in enforcing cybersecurity and data protection in the sector this year, expanding cooperation with state attorneys general and instituting new data breach reporting rules. Zeus Kerravala, founder and principal analyst at ZK Research, said the FCC has the right idea but he’s skeptical of its ultimate impact. The call to “mandate they secure their networks from unlawful access is a very broad statement, and I believe the operators do this today to the best of their ability,” Kerravala said. The FCC and national security agencies need to increase coordination and collaboration, Téral said. Industry analysts question the outcome of the FCC’s efforts, particularly in the absence of greater support. The agency’s efforts will deliver “little impact if insufficient resources are deployed for implementation and execution,” Téral said. “The name of the game is to stay ahead of all continuously evolving threats.” * * * * * * purchase licensing rights Filed Under: Cyberattacks, Policy & Regulation CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX Get the free daily newsletter read by industry experts Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter. EDITORS’ PICKS * Ethan Miller via Getty Images Deep Dive AT MICROSOFT, YEARS OF SECURITY DEBT COME CRASHING DOWN Critics say negligence, misguided investments and hubris have left the enterprise giant on its back foot. By David Jones • April 30, 2024 * Kevin Dietsch / Staff via Getty Images SUPREME COURT RULING ON CHEVRON DOCTRINE MAY UPEND FUTURE CYBERSECURITY REGULATION Experts expect new legal challenges against numerous agency cybersecurity requirements, including incident reporting mandates and rules governing critical infrastructure sectors. By David Jones • Updated July 8, 2024 GET THE FREE NEWSLETTER Subscribe to Cybersecurity Dive for top news, trends & analysis Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter. MOST POPULAR 1. White House says 9th telecom company hit in Salt Typhoon spree 2. At least 8 US companies hit in telecom attack spree, officials say 3. CISA mobile security advice gets personal in wake of telecom intrusions 4. Feds raise alarm on China-linked infiltration of telecom networks LIBRARY RESOURCES * Webinar - on demand Reducing Mobile Risk: Smishing, Quishing, and Executive Impersonation Custom content for Lookout * Trendline The biggest cybersecurity trends to watch for 2025 Supported by Wind River * Trendline Cybersecurity in the healthcare industry Supported by Imprivata View all COMPANY ANNOUNCEMENTS * Rumpke Data Breach Investigation From Migliaccio and Rathod * DigiCert Releases First-of-Its-Kind Open-Source DCV Library to Elevate Industry Standards From DigiCert * Migliaccio and Rathod Investigates Byte Federal Data Breach From Migliaccio and Rathod * Only Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Eva… From Cynet Security View all | Post a press release EVENTS * 17 MAR Conference Enterprise Connect Orlando, Florida Presented by Informa Connect * 24 MAR Conference Channel Partners Conference & Expo, co-located with MSP Summit Las Vegas, Nevada Presented by Informa Promote an event CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX Get the free daily newsletter read by industry experts Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter. COMPANY ANNOUNCEMENTS View all | Post a press release Rumpke Data Breach Investigation From Migliaccio and Rathod December 11, 2024 DigiCert Releases First-of-Its-Kind Open-Source DCV Library to Elevate Industry Standards From DigiCert December 18, 2024 Migliaccio and Rathod Investigates Byte Federal Data Breach From Migliaccio and Rathod December 12, 2024 Only Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Eva… From Cynet Security December 11, 2024 Editors’ picks * Ethan Miller via Getty Images Deep Dive AT MICROSOFT, YEARS OF SECURITY DEBT COME CRASHING DOWN Critics say negligence, misguided investments and hubris have left the enterprise giant on its back foot. By David Jones • April 30, 2024 * Kevin Dietsch / Staff via Getty Images SUPREME COURT RULING ON CHEVRON DOCTRINE MAY UPEND FUTURE CYBERSECURITY REGULATION Experts expect new legal challenges against numerous agency cybersecurity requirements, including incident reporting mandates and rules governing critical infrastructure sectors. By David Jones • Updated July 8, 2024 Latest in Cyberattacks * White House says 9th telecom company hit in Salt Typhoon spree By Matt Kapko * BeyondTrust customers hit by wave of attacks linked to compromised API key By Matt Kapko * Flagstar fined $3.5M for ‘misleading’ after 2021 cyberattack By Gabrielle Saulsbery * CISA mobile security advice gets personal in wake of telecom intrusions By Matt Kapko -------------------------------------------------------------------------------- * * * * EXPLORE * About * Editorial Team * Contact Us * Newsletter * Purchase Licensing Rights * Press Releases * What We’re Reading REACH OUR AUDIENCE * Advertising * Post a press release * Promote an event RELATED PUBLICATIONS * CIO Dive -------------------------------------------------------------------------------- Industry Dive is an Informa TechTarget business. © 2024 TechTarget, Inc. or its subsidiaries. All rights reserved. | View our other publications | Privacy policy | Terms of use | Take down policy. Cookie Preferences / Do Not Sell This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466. Search * Home * Topics * Strategy * Breaches * Vulnerability * Cyberattacks * Threats * Leadership & Careers * Policy & Regulation * Deep Dive * Library * Events * Press Releases GET CYBERSECURITY DIVE IN YOUR INBOX The free newsletter covering the top industry headlines Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter.