Society ❯ Privacy ❯ Data Security ❯ Personal Information
Officials say the group exploited widely known flaws in edge devices to burrow into telecom routers, prompting urgent mitigation.