Government ❯ National Security ❯ Cybersecurity Policy ❯ International Relations
Officials say the group exploited widely known flaws in edge devices to burrow into telecom routers, prompting urgent mitigation.