Threat IntelHIGH

Threat Intel - Public-Private Partnerships Disrupt China's Typhoons

REThe Register Security
ChinaVolt TyphoonScattered Spiderpublic-private partnershipscybersecurity
🎯

Basically, experts say teamwork between private companies and the government is crucial to fight cyber threats from China.

Quick Summary

At the RSA Conference, experts stressed the need for public-private partnerships to disrupt China's cyber threats. With no government speakers present, the focus was on private sector intelligence. This absence raises concerns about collaboration in combating cybercrime, especially as threats evolve.

What Happened

During the RSA Conference 2026, a panel discussion focused on disrupting China's cyber threat groups, particularly the Volt and Salt Typhoon gangs. The session was notable for the absence of any government representatives, leaving an empty chair on stage. This absence raised eyebrows, as it highlighted the ongoing challenges in public-private collaboration against cybercrime. Panelists emphasized the importance of sharing intelligence between private sector entities and government agencies to effectively counter these threats.

The discussion recalled past frustrations when private-sector intelligence analysts had valuable information about the Scattered Spider cybercrime group, but government processes delayed real-time collaboration. Dave Scott, a former FBI official, pointed out that private partners often had quicker insights than the government, which was hindered by legal and bureaucratic hurdles. This historical context underscores the urgency of establishing efficient communication channels in the current cyber threat landscape.

Who's Being Targeted

The Volt and Salt Typhoon groups are known for targeting critical infrastructure in the United States. Their operations have increasingly relied on exploiting vulnerabilities in private-sector networks, particularly in utility and telecommunications sectors. Wendi Whitmore from Palo Alto Networks noted that many intrusions occurred on private infrastructures, which means private companies hold significant visibility into these threats.

The panelists agreed that victims must come forward to share intelligence for effective action. The absence of government officials at the RSA Conference raised concerns about the administration's commitment to addressing these threats. The reliance on private-sector insights is crucial, especially as cybercriminals evolve their tactics, including the use of voice phishing to gain initial access.

Tactics & Techniques

The discussion also highlighted the tactics used by Typhoon gangs, which have adapted to exploit weaknesses in cloud environments. Cybercriminals are increasingly using social engineering techniques, such as voice phishing, to penetrate defenses. This method has become the second most common way for cybercriminals to gain access to victims' systems, particularly in cloud setups.

Participants emphasized that the collaboration between public and private sectors is essential to counter these evolving tactics. As cyber threats become more sophisticated, the need for real-time information sharing becomes increasingly critical. Scott mentioned that current advancements in AI further complicate the landscape, making immediate collaboration vital to stay ahead of potential attacks.

Defensive Measures

To combat these threats, experts advocate for stronger public-private partnerships. They stress the need for private companies to share their intelligence with government agencies to enable timely responses. This collaboration can help decision-makers take decisive actions against cyber threats.

Moreover, the RSA panel suggested that informal channels, such as secure messaging platforms, could facilitate better communication between sectors. While official platforms may be slow, private discussions can lead to quicker decision-making and action. As the cybersecurity landscape continues to evolve, fostering these partnerships will be crucial in defending against threats from groups like the Typhoons.

🔒 Pro insight: The lack of government presence at RSA underscores a critical gap in public-private collaboration against sophisticated state-sponsored cyber threats.

Original article from

The Register Security

Read Full Article

Related Pings

HIGHThreat Intel

Trivy Supply Chain Attack - Infostealer Targets Secrets

A new supply chain attack exploited Trivy, targeting CI/CD workflows. Sensitive data, including cloud credentials, was compromised. Organizations must enhance their security measures to prevent similar threats.

Dark Reading·
HIGHThreat Intel

Threat Intel - AI Framework and Rising Phishing Risks

The White House has unveiled its AI legislative framework amid rising phishing threats. Iranian and Russian hackers are targeting messaging apps like Signal and Telegram. This situation raises urgent cybersecurity concerns for users and organizations alike.

CyberWire Daily·
HIGHThreat Intel

Threat Intel - FBI Warns of Russian and Iranian Cyber Campaigns

The FBI has issued warnings about Russian and Iranian cyber campaigns targeting messaging platforms. Thousands of accounts have been compromised, raising serious security concerns. Users are urged to enhance their cybersecurity practices to protect against these threats.

The Record·
HIGHThreat Intel

Phishing Threats - Insights from KnowBe4's Erich Kron

Phishing attacks are on the rise, evolving with automation and targeting collaboration tools. KnowBe4's Erich Kron sheds light on these modern threats and their implications for organizations. Understanding these risks is crucial for protecting sensitive data.

SC Media·
HIGHThreat Intel

Supply Chain Attack - KICS GitHub Action Compromised

The KICS GitHub Action was compromised in a supply chain attack by TeamPCP. Users of the affected tags are at risk of credential theft. Immediate audits are crucial to ensure security.

Wiz Blog·
HIGHThreat Intel

Threat Intel - Mysterious Numbers Station Emerges Amid War

The Threat A mysterious numbers station has emerged, broadcasting a series of numbers in Persian, coinciding with the recent US and Israeli military strikes on Iran. This unusual transmission began on February 28, 2026, and has been identified as originating from a US military base in Germany. The broadcasts occur twice daily, featuring a rhythmic narration of numbers, which

Wired Security·