salttyphoon (3)

31105892100?profile=RESIZE_400xThe Federal Bureau of Investigation (FBI) has officially confirmed that a limited number of its servers have been compromised in a cybersecurity incident.  The breach affected surveillance systems used by the FBI for lawful foreign intelligence interception operations, with investigators suspecting state-backed Chinese hackers based on suspicious activity patterns.  The security breach occurred during the second week of February 2026 and was detected on 17 February 2026.  The incident has raised

31078641094?profile=RESIZE_400xIn a significant cyber intrusion, Chinese hackers linked to the Salt Typhoon group have accessed email systems used by staff in key US House of Representatives committees. The breach, reported by the Financial Times and covered by Reuters, affects aides on the House Select Committee on China, as well as those handling foreign affairs, intelligence, and armed services.  Detected in December 2025, the incident raises concerns over the security of sensitive government communications.[1]

The hackers

13758037456?profile=RESIZE_400xThe cybersecurity community recently received an urgent signal from Darktrace's research team about a sophisticated intrusion campaign linked to Salt Typhoon, a persistent threat actor with ties to China.  The core of this campaign: the exploitation of a critical vulnerability in the Citrix NetScaler Gateway (formerly Citrix ADC/Gateway).  This is not just another vulnerability report; it is a live-fire case study highlighting the strategic importance of patching perimeter devices and the necess