Government ❯ National Security ❯ Cybersecurity Policy ❯ International Cooperation
Officials say the group exploited widely known flaws in edge devices to burrow into telecom routers, prompting urgent mitigation.