Salt Typhoon’s Global Reach Exposed

Global advisory reveals China-linked espionage group’s infiltration of hundreds of organizations across 80 countries

In partnership with

Is Shadow IT already in your organization?

You wouldn’t allow unmanaged devices on your network, so why allow unmanaged AI into your meetings?

Shadow IT is becoming one of the biggest blind spots in cybersecurity.

Employees are adopting AI notetakers without oversight, creating ungoverned data trails that can include confidential conversations and sensitive IP.

Don't wait until it's too late.

This Shadow IT prevention guide from Fellow.ai gives Security and IT leaders a playbook to prevent shadow AI, reduce data exposure, and enforce safe AI adoption, without slowing down innovation.

It includes a checklist, policy templates, and internal comms examples you can use today.

Interesting Tech Fact:

Few realize that one of the earliest large-scale acts of cyber espionage dates back to the late 1980s, long before today’s internet-driven campaigns. In 1986, German hacker Markus Hess infiltrated U.S. military and research systems by exploiting unsecured dial-up connections, gaining access to sensitive networks such as those at Lawrence Berkeley National Laboratory. His intent wasn’t direct sabotage—he sold stolen information to the KGB, marking one of the first known instances of state-linked digital spying for geopolitical gain. This incident not only exposed the fragility of early networked systems but also foreshadowed today’s global cyber espionage economy, where stolen intelligence fuels political, military, and economic agendas.

Introduction

A groundbreaking joint cybersecurity advisory released today by the FBI, NSA, CISA, and a coalition of international partners—including members of the Five Eyes alliance and other allies—has unveiled the astonishing breadth of Salt Typhoon’s operations. The China-linked espionage campaign has now penetrated over 200 U.S.-based organizations and infiltrated networks in at least 80 countries, spanning sectors as critical as telecommunications, transportation, and lodging. The scale and sophistication of this operation place Salt Typhoon among the most consequential cyber threats in recent memory→The Washington Post.

Subscribe to keep reading

This content is free, but you must be subscribed to The CyberLens Newsletter to continue reading.

Already a subscriber?Sign in.Not now