Government ❯ National Security ❯ Cybersecurity Policy ❯ Critical Infrastructure Protection
Officials say the group exploited widely known flaws in edge devices to burrow into telecom routers, prompting urgent mitigation.