Technology ❯Information Technology ❯Cybersecurity ❯Hacking
Officials say the group exploited widely known flaws in edge devices to burrow into telecom routers, prompting urgent mitigation.