<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Interesting window into Chinese Hacking Practices in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Interesting-window-into-Chinese-Hacking-Practices/m-p/67492#M6712</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/797288093"&gt;@Early_Adopter&lt;/a&gt;Unfortunately this will become an everyday occurrence in 2024 and beyond.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Thu, 22 Feb 2024 02:03:42 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-02-22T02:03:42Z</dc:date>
    <item>
      <title>Interesting window into Chinese Hacking Practices</title>
      <link>https://community.isc2.org/t5/Industry-News/Interesting-window-into-Chinese-Hacking-Practices/m-p/67454#M6710</link>
      <description>Lots of fun stuff revealed including a magic war-driving briefcase…&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.bankinfosecurity.com/chinese-hacking-contractor-isoon-leaks-internal-documents-a-24405" target="_blank"&gt;https://www.bankinfosecurity.com/chinese-hacking-contractor-isoon-leaks-internal-documents-a-24405&lt;/A&gt;</description>
      <pubDate>Wed, 21 Feb 2024 10:51:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Interesting-window-into-Chinese-Hacking-Practices/m-p/67454#M6710</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2024-02-21T10:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting window into Chinese Hacking Practices</title>
      <link>https://community.isc2.org/t5/Industry-News/Interesting-window-into-Chinese-Hacking-Practices/m-p/67492#M6712</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/797288093"&gt;@Early_Adopter&lt;/a&gt;Unfortunately this will become an everyday occurrence in 2024 and beyond.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 02:03:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Interesting-window-into-Chinese-Hacking-Practices/m-p/67492#M6712</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-02-22T02:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting window into Chinese Hacking Practices</title>
      <link>https://community.isc2.org/t5/Industry-News/Interesting-window-into-Chinese-Hacking-Practices/m-p/67493#M6713</link>
      <description>Yes, this looks very much like the smurfs and fragile sad revealed by Snowden… between us I expect nation states to go from being passively monitoring to be overtly and conspicuously monitoring the spectrum in their territories and pumping into big data lakes for analysis and modelling. Unregulated/unexpected/unattributed hotspots etc will definitely get a good fingerprinting and probing at airports, financial centres and other sensitive areas.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Feb 2024 02:12:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Interesting-window-into-Chinese-Hacking-Practices/m-p/67493#M6713</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2024-02-22T02:12:49Z</dc:date>
    </item>
  </channel>
</rss>

