{"id":99897,"date":"2024-12-13T11:55:39","date_gmt":"2024-12-13T03:55:39","guid":{"rendered":"https:\/\/version-2.com\/?p=99897"},"modified":"2024-12-06T11:58:17","modified_gmt":"2024-12-06T03:58:17","slug":"taming-the-typhoons-how-runzero-keeps-you-ahead-of-state-sponsored-cyber-threats","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/12\/taming-the-typhoons-how-runzero-keeps-you-ahead-of-state-sponsored-cyber-threats\/","title":{"rendered":"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"99897\" class=\"elementor elementor-99897\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"prose dark:prose-light prose--blog prose--blog-wide\"><p>China&#8217;s state-sponsored cyber operations\u2014aptly nicknamed with &#8220;Typhoon&#8221; monikers\u2014have been brewing trouble for over a decade. From Violet to Salt Typhoon, these advanced persistent threat (APT) groups have been wreaking havoc on government entities, critical infrastructure, and other high-value targets. Their evolution highlights one thing loud and clear: attackers are always one step ahead, looking for the weakest link.<\/p><p>But fear not\u2014there\u2019s a way to outpace these storms. Let\u2019s break down what these Typhoons have been up to and how runZero brings calm to the chaos with unparalleled visibility and proactive defense.<\/p><p>\u00a0<\/p><h2 id=\"the-typhoon-timeline-an-evolution-of-threats\">The Typhoon Timeline: An Evolution of Threats<\/h2><p>The Typhoon story began with <strong>Violet Typhoon<\/strong>, which stuck to the basics: phishing, exploiting known vulnerabilities, and going after traditional IT systems. They were your typical \u201csteal the sensitive data and run\u201d kind of crew.<\/p><p>Then came <strong>Volt Typhoon<\/strong>, which shifted focus to U.S. critical infrastructure. They embraced &#8220;living off the land&#8221; techniques, cleverly blending into hybrid IT and OT environments while avoiding detection. Think of them as the first innovators of the Typhoons.<\/p><p>Not to be outdone, <a href=\"https:\/\/www.runzero.com\/blog\/flax-typhoon\/\" target=\"_blank\" rel=\"noopener\"><strong>Flax Typhoon<\/strong><\/a> targeted IoT devices like cameras and DVRs, transforming these &#8220;unimportant&#8221; devices into powerful botnets. It was a wake-up call for organizations ignoring their IoT inventory.<\/p><p>And now, <strong>Salt Typhoon<\/strong> has arrived, skillfully exploiting IT, OT, and IoT systems with alarming precision. Their primary focus? Telecommunications providers and ISPs, where they leverage trusted devices and connections to steal customer call records, compromise private communications\u2014particularly those of individuals involved in government or political activities\u2014and access sensitive information tied to U.S. law enforcement requests under court orders.<\/p><p>\u00a0<\/p><h2 id=\"why-visibility-is-the-game-changer\">Why Visibility is the Game-Changer<\/h2><p>The Typhoon saga reveals one critical truth: attackers will find the blind spots in your network. Whether it\u2019s a forgotten IoT device, an outdated VPN concentrator, or a misconfigured firewall, these gaps become open doors for adversaries.<\/p><p>That\u2019s why visibility\u2014complete visibility\u2014is key to staying ahead. Enter <strong>runZero<\/strong>.<\/p><p>\u00a0<\/p><h2 id=\"how-runZero-helps-you-outmaneuver-salt-typhoon\">How runZero Helps You Outmaneuver Salt Typhoon<\/h2><p>Salt Typhoon thrives on exploiting edge devices and blending into your network. But runZero makes their job infinitely harder. Here\u2019s how we give you the upper hand:<\/p><ul><li dir=\"ltr\"><strong>Proactive Edge Discovery<\/strong>: With real-time scanning and <a href=\"https:\/\/www.runzero.com\/blog\/fingerprinting-caasm\/\" target=\"_blank\" rel=\"noopener\">unmatched fingerprinting capabilities<\/a>, runZero identifies every device\u2014routers, firewalls, switches\u2014before attackers can. Firmware versions? Check. Misconfigurations? Double-check.<\/li><li dir=\"ltr\"><strong>Mapping Internal Pathways<\/strong>: Once inside, attackers aim to move laterally. runZero lights up internal pathways, exposing high-risk devices and connections that could serve as stepping stones for adversaries.<\/li><li dir=\"ltr\"><strong>Correlating Internal and External Risks<\/strong>: Unlike siloed tools, runZero connects the dots between internal and external assets, revealing shared vulnerabilities and dependencies. That\u2019s insight no other platform offers.<\/li><li dir=\"ltr\"><strong>Risk-Based Prioritization<\/strong>: runZero doesn\u2019t just throw vulnerabilities at you. It ranks them by exploitability, exposure pathways, and criticality, so you can tackle the most pressing issues first.<\/li><li dir=\"ltr\"><strong>Continuous Monitoring<\/strong>: Networks change constantly, and so do risks. With runZero\u2019s continuous discovery, you\u2019ll always have an up-to-date picture of your attack surface.<\/li><\/ul><p>\u00a0<\/p><h2 id=\"actionable-insights-for-real-world-defense\">Actionable Insights for Real-World Defense<\/h2><p>Need proof of what runZero can do? Let\u2019s take <a href=\"https:\/\/www.cisa.gov\/resources-tools\/resources\/enhanced-visibility-and-hardening-guidance-communications-infrastructure\" target=\"_blank\" rel=\"noopener\">CISA\u2019s latest guidance tailored to counter Salt Typhoon\u2019s tactics<\/a> and the queries you can use in the runZero platform to identify assets at risk.<\/p><h3 id=\"strengthening-visibility-monitoring-network-engineers\">Strengthening Visibility: Monitoring: Network Engineers<\/h3><p>If feasible, limit exposure of management traffic to the Internet. Only allow management via a limited and enforced network path, ideally only directly from dedicated administrative workstations. Do not manage devices from the internet. Only allow device management from trusted devices on trusted networks.<\/p><pre style=\"position: relative;\"><code># Service Query\n(type:router OR type:switch OR type:firewall) AND (port:80 OR port:443) AND has_public:true<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><p>Monitor user and service account logins for anomalies that could indicate potential malicious activity. Validate all accounts and disable inactive accounts to reduce the attack surface. Monitor logins occurring internally and externally from the management environment.<\/p><pre style=\"position: relative;\"><code># Users Query\nalive:t AND (\n  isDisabled:true\nOR\n  (source:googleworkspace suspended:t)\nOR\n  (source:googleworkspace isEnforcedIn2Sv:f)\nOR\n  (has:accountExpiresTS)\nOR\n  (isDisabled:true)\nOR\n  (passwordExpired:true OR msDS-UserPasswordExpiryTimeComputedTS:&lt;now))<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><p>Ensure the inventory of devices and firmware in the environment are up to date to enable effective visibility and monitoring. runZero can track and incorporate end-of-life data from a variety of sources.<\/p><pre style=\"position: relative;\"><code># Asset Query\nos_eol_expired:t<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><h3 id=\"monitoring-network-engineers\">Monitoring: Network Engineers<\/h3><p>Closely monitor all devices that accept external connections from outside the corporate network<\/p><pre style=\"position: relative;\"><code># Asset Query\nhas_public:t<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><p>IPsec tunnel usage<\/p><pre style=\"position: relative;\"><code># Service Query\nprotocol:ike<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><h3 id=\"hardening-systems-devices-protocols-and-management-processes-network-engineers\">Hardening Systems &amp; Devices: Protocols and Management Processes: Network Engineers<\/h3><p>Additionally, as a general strategy, put devices with similar purposes in the same VLAN. For example, place all user workstations from a certain team in one VLAN, while putting another team with different functions in a separate VLAN. runZero\u2019s innovative outlier score can help locate devices that don\u2019t look like others in the same site.<\/p><pre style=\"position: relative;\"><code># Asset Query\noutlier:&gt;=2<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><p>if using Simple Network Management Protocol (SNMP), ensure only SNMP v3 with encryption and authentication is used<\/p><pre style=\"position: relative;\"><code># Service Query\nprotocol:snmp1 or protocol:snmp2 or protocol:snmp2c<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><p>Disable all unnecessary discovery protocols, such as Cisco Discovery Protocol (CDP).<\/p><pre style=\"position: relative;\"><code># Service Query\nprotocol:cdp<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><p>Ensure Transport Layer Security (TLS) v1.3 is used on any TLS-capable protocols to secure data in transit over a network.<\/p><pre style=\"position: relative;\"><code># Service Query\ntls.supportedVersionNames:\"SSL\" OR tls.supportedVersionNames:\"TLSv1.0\" OR tls.supportedVersionNames:\"TLSv1.1\" OR tls.supportedVersionNames:\"TLSv1.2\"<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><p>Disable Secure Shell (SSH) version 1.<\/p><pre style=\"position: relative;\"><code># Service Query\nbanner:\"SSH-1\"<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><h3 id=\"hardening-systems-devices-protocols-and-management-processes-network-defenders\">Hardening Systems &amp; Devices: Protocols and Management Processes: Network Defenders<\/h3><p>Disable any unnecessary, unused, exploitable, or plaintext services and protocols, such as Telnet, File Transfer Protocol (FTP), Trivial FTP (TFTP), SSH v1, Hypertext Transfer Protocol (HTTP) servers, and SNMP v1\/v2c<\/p><pre style=\"position: relative;\"><code># Service Query\nprotocol:telnet OR protocol:ftp OR protocol:tftp OR banner:\"SSH-1\" OR (protocol:http AND NOT protocol:tls) OR protocol:snmp1 OR protocol:snmp2 OR protocol:snmp2c<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><p>Conduct port-scanning and scanning of known internet-facing infrastructure<\/p><pre style=\"position: relative;\"><code># Service Query\nhas_public:t<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><h2>\u00a0<\/h2><h2 id=\"the-final-word\">The Final Word<\/h2><p>The Typhoon threat is real, but with runZero, you don\u2019t have to weather the storm alone. Whether you\u2019re facing state-sponsored attackers like Salt Typhoon or just trying to get a handle on your sprawling network, runZero does more than uncover what\u2019s hiding in your network\u2014we redefine what\u2019s possible in exposure management. Our <strong>agentless, credential-free approach<\/strong> means you get instant insights without the hassle. And our advanced fingerprinting technology? It\u2019s second to none, giving you detailed device profiles that competitors can only dream of.<\/p><p>But it\u2019s not just about tech; it\u2019s about speed and adaptability. As networks grow more complex and threats more advanced, runZero ensures you\u2019re always one step ahead of these Typhoons no matter how their tactics evolve. From shadow IT to unmanaged IoT, we uncover everything\u2014because the very things you didn\u2019t know existed are exactly what these attackers are looking for.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"55060\" class=\"elementor elementor-55060\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About runZero<\/strong><br \/>runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network\u2013without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>China&#8217;s state-sponsored cyber operations\u2014aptly ni [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[976,1273,61],"tags":[977,1272],"class_list":["post-99897","post","type-post","status-publish","format-standard","hentry","category-runzero","category-1273","category-press-release","tag-runzero","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats - Version 2\" \/>\n<meta property=\"og:description\" content=\"China&#8217;s state-sponsored cyber operations\u2014aptly ni [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-13T03:55:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/taming-typhoon-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/taming-the-typhoons-how-runzero-keeps-you-ahead-of-state-sponsored-cyber-threats\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats\",\"datePublished\":\"2024-12-13T03:55:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/taming-the-typhoons-how-runzero-keeps-you-ahead-of-state-sponsored-cyber-threats\\\/\"},\"wordCount\":1018,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"runZero\",\"2024\"],\"articleSection\":[\"runZero\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/taming-typhoon-threats\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/taming-the-typhoons-how-runzero-keeps-you-ahead-of-state-sponsored-cyber-threats\\\/\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/taming-typhoon-threats\\\/\",\"name\":\"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2024-12-13T03:55:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/taming-typhoon-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/taming-typhoon-threats\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/taming-typhoon-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/","og_locale":"en_US","og_type":"article","og_title":"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats - Version 2","og_description":"China&#8217;s state-sponsored cyber operations\u2014aptly ni [&hellip;]","og_url":"https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/","og_site_name":"Version 2","article_published_time":"2024-12-13T03:55:39+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/12\/taming-the-typhoons-how-runzero-keeps-you-ahead-of-state-sponsored-cyber-threats\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats","datePublished":"2024-12-13T03:55:39+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/12\/taming-the-typhoons-how-runzero-keeps-you-ahead-of-state-sponsored-cyber-threats\/"},"wordCount":1018,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["runZero","2024"],"articleSection":["runZero","2024","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/12\/taming-the-typhoons-how-runzero-keeps-you-ahead-of-state-sponsored-cyber-threats\/","url":"https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/","name":"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2024-12-13T03:55:39+00:00","breadcrumb":{"@id":"https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.runzero.com\/blog\/taming-typhoon-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-pZf","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/99897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=99897"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/99897\/revisions"}],"predecessor-version":[{"id":99904,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/99897\/revisions\/99904"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=99897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=99897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=99897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}