<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How Chinese Cyber Spies Infiltrated Western Businesses in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/How-Chinese-Cyber-Spies-Infiltrated-Western-Businesses/m-p/25144#M1503</link>
    <description>&lt;P&gt;You have nailed it!&amp;nbsp; The advocates of Cryptocurrency turn a blind eye to these kinds of facts in touting the power of block chain like it is some kind of magic and not subject to the same kind of problems with other technology outlined here.&amp;nbsp; &amp;nbsp;This Investopedia article is very illuminating&amp;nbsp;&lt;A href="https://www.investopedia.com/articles/investing/032615/can-bitcoin-be-hacked.asp" target="_blank" rel="noopener"&gt;https://www.investopedia.com/articles/investing/032615/can-bitcoin-be-hacked.asp&lt;/A&gt;.&amp;nbsp; This article highlights the actual exploit of the technology that occurred, refer to this CNBC Tech article&amp;nbsp;&lt;A href="https://www.cnbc.com/2019/05/08/binance-bitcoin-hack-over-40-million-of-cryptocurrency-stolen.html" target="_blank" rel="noopener"&gt;https://www.cnbc.com/2019/05/08/binance-bitcoin-hack-over-40-million-of-cryptocurrency-stolen.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jul 2019 06:47:27 GMT</pubDate>
    <dc:creator>Frank_Mayer</dc:creator>
    <dc:date>2019-07-12T06:47:27Z</dc:date>
    <item>
      <title>How Chinese Cyber Spies Infiltrated Western Businesses</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-Chinese-Cyber-Spies-Infiltrated-Western-Businesses/m-p/24979#M1491</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Teams of hackers connected to the Chinese Ministry of State security broke into the systems of eight major information technology service providers, Reuters has found, in a global cyber-espionage campaign known as “&lt;STRONG&gt;Cloud Hopper&lt;/STRONG&gt;.” By hacking the technology service providers, the attackers were able to “hop” into client networks and steal reams of corporate and government secrets in what U.S. prosecutors say was an effort to boost Chinese economic interests. Check out the Reuters investigative report &lt;A href="https://www.reuters.com/investigates/special-report/china-cyber-cloudhopper/?utm_source=reddit.com" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:15:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-Chinese-Cyber-Spies-Infiltrated-Western-Businesses/m-p/24979#M1491</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: How Chinese Cyber Spies Infiltrated Western Businesses</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-Chinese-Cyber-Spies-Infiltrated-Western-Businesses/m-p/24987#M1492</link>
      <description>&lt;P&gt;&lt;A href="https://graphics.reuters.com/CHINA-CYBER-CLOUDHOPPER/0100B02Y04Q/index.html" target="_blank"&gt;https://graphics.reuters.com/CHINA-CYBER-CLOUDHOPPER/0100B02Y04Q/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;Teams of hackers connected to the Chinese Ministry of State security broke into the systems of eight major information technology service providers, Reuters has found, in a global cyber-espionage campaign known as “&lt;STRONG&gt;Cloud Hopper&lt;/STRONG&gt;.” By hacking the technology service providers, the attackers were able to “hop” into client networks and steal reams of corporate and government secrets in what U.S. prosecutors say was an effort to boost Chinese economic interests.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 14:50:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-Chinese-Cyber-Spies-Infiltrated-Western-Businesses/m-p/24987#M1492</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-07-10T14:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: How Chinese Cyber Spies Infiltrated Western Businesses</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-Chinese-Cyber-Spies-Infiltrated-Western-Businesses/m-p/25030#M1494</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;Hardly surprising the intelligence services, have been undermining Businesses for years and years.&amp;nbsp; If we accept whitelisted solutions, with built in IoT, and shoddy software what does one expect?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Practically everything that comes into the Western world has been produced, manufactured from China - so given the laxity and cheapest wins out, when people want a deal - hardly surprising at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 21:42:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-Chinese-Cyber-Spies-Infiltrated-Western-Businesses/m-p/25030#M1494</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-07-10T21:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: How Chinese Cyber Spies Infiltrated Western Businesses</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-Chinese-Cyber-Spies-Infiltrated-Western-Businesses/m-p/25144#M1503</link>
      <description>&lt;P&gt;You have nailed it!&amp;nbsp; The advocates of Cryptocurrency turn a blind eye to these kinds of facts in touting the power of block chain like it is some kind of magic and not subject to the same kind of problems with other technology outlined here.&amp;nbsp; &amp;nbsp;This Investopedia article is very illuminating&amp;nbsp;&lt;A href="https://www.investopedia.com/articles/investing/032615/can-bitcoin-be-hacked.asp" target="_blank" rel="noopener"&gt;https://www.investopedia.com/articles/investing/032615/can-bitcoin-be-hacked.asp&lt;/A&gt;.&amp;nbsp; This article highlights the actual exploit of the technology that occurred, refer to this CNBC Tech article&amp;nbsp;&lt;A href="https://www.cnbc.com/2019/05/08/binance-bitcoin-hack-over-40-million-of-cryptocurrency-stolen.html" target="_blank" rel="noopener"&gt;https://www.cnbc.com/2019/05/08/binance-bitcoin-hack-over-40-million-of-cryptocurrency-stolen.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2019 06:47:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-Chinese-Cyber-Spies-Infiltrated-Western-Businesses/m-p/25144#M1503</guid>
      <dc:creator>Frank_Mayer</dc:creator>
      <dc:date>2019-07-12T06:47:27Z</dc:date>
    </item>
  </channel>
</rss>

