<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Australian Government - Countering State Sponsored Actors in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Australian-Government-Countering-State-Sponsored-Actors/m-p/83430#M1704</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks. While these actors focus on large backbone routers of major telecommunications providers, as well as provider edge (PE) and customer edge (CE) routers, they also leverage compromised devices and trusted connections to pivot into networks. These actors often modify routers to maintain persistent, long-term access to networks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/countering-chinese-state-sponsored-actors-compromise-of-networks-worldwide-to-feed-global-espionage-system?utm_source=linkedin&amp;amp;utm_campaign=prc-state-sponsored-actors&amp;amp;utm_medium=social&amp;amp;utm_content=advisory" target="_blank"&gt;https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/countering-chinese-state-sponsored-actors-compromise-of-networks-worldwide-to-feed-global-espionage-system?utm_source=linkedin&amp;amp;utm_campaign=prc-state-sponsored-actors&amp;amp;utm_medium=social&amp;amp;utm_content=advisory&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Thu, 28 Aug 2025 00:25:07 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2025-08-28T00:25:07Z</dc:date>
    <item>
      <title>Australian Government - Countering State Sponsored Actors</title>
      <link>https://community.isc2.org/t5/Threats/Australian-Government-Countering-State-Sponsored-Actors/m-p/83430#M1704</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks. While these actors focus on large backbone routers of major telecommunications providers, as well as provider edge (PE) and customer edge (CE) routers, they also leverage compromised devices and trusted connections to pivot into networks. These actors often modify routers to maintain persistent, long-term access to networks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/countering-chinese-state-sponsored-actors-compromise-of-networks-worldwide-to-feed-global-espionage-system?utm_source=linkedin&amp;amp;utm_campaign=prc-state-sponsored-actors&amp;amp;utm_medium=social&amp;amp;utm_content=advisory" target="_blank"&gt;https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/countering-chinese-state-sponsored-actors-compromise-of-networks-worldwide-to-feed-global-espionage-system?utm_source=linkedin&amp;amp;utm_campaign=prc-state-sponsored-actors&amp;amp;utm_medium=social&amp;amp;utm_content=advisory&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 00:25:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Australian-Government-Countering-State-Sponsored-Actors/m-p/83430#M1704</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-08-28T00:25:07Z</dc:date>
    </item>
  </channel>
</rss>

