<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Security Insider</provider_name><provider_url>https://www.microsoft.com/en-us/security/business/security-insider</provider_url><author_name>WTcr-prod</author_name><author_url>https://www.microsoft.com/en-us/security/business/security-insider/author/wtcr-prod/</author_url><title>Volt Typhoon Targets US Critical Infrastructure: Latest Cybersecurity News Today | Security Insider</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="n4Vke3dEer"&gt;&lt;a href="https://www.microsoft.com/en-us/security/business/security-insider/threat-briefs/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/"&gt;Volt Typhoon targets US critical infrastructure with living-off-the-land techniques&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.microsoft.com/en-us/security/business/security-insider/threat-briefs/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/embed/#?secret=n4Vke3dEer" width="600" height="338" title="&#x201C;Volt Typhoon targets US critical infrastructure with living-off-the-land techniques&#x201D; &#x2014; Security Insider" data-secret="n4Vke3dEer" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,d){"use strict";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=new RegExp("^https?:$","i"),l=0;l&lt;n.length;l++)n[l].style.display="none";for(l=0;l&lt;i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=d.createElement("a"),a=d.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2023/05/375x234_MSFTInsider_Article_Hero_Mobile_Volt-Typhoon.png</thumbnail_url><thumbnail_width>376</thumbnail_width><thumbnail_height>235</thumbnail_height><description>Chinese state-sponsored threat actor Volt Typhoon has been observed using stealthy techniques to target US critical infrastructure, conduct espionage, and dwell in compromised environments. Explore Volt Typhoon's cyberattacks on US critical infrastructure using living-off-the-land techniques. Discover effective mitigation steps to safeguard your organization against this threat</description></oembed>
