Close Menu
Tech News VisionTech News Vision
  • Home
  • What’s On
  • Mobile
  • Computers
  • Gadgets
  • Apps
  • Gaming
  • How To
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Trending Now
Europe’s ‘first’ payment made by AI agent conducted by Santander

Europe’s ‘first’ payment made by AI agent conducted by Santander

3 March 2026
Battlefield 6’s New Patch Addresses QoL and Stability Issues, As Well As UI and Battle Pass

Battlefield 6’s New Patch Addresses QoL and Stability Issues, As Well As UI and Battle Pass

3 March 2026
Big Google Home update lets Gemini describe live camera feeds

Big Google Home update lets Gemini describe live camera feeds

3 March 2026
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact
Facebook X (Twitter) Instagram Pinterest VKontakte
Tech News VisionTech News Vision
  • Home
  • What’s On
  • Mobile
  • Computers
  • Gadgets
  • Apps
  • Gaming
  • How To
  • More
    • Web Stories
    • Global
    • Press Release
Tech News VisionTech News Vision
Home » 2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’
What's On

2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’

News RoomBy News Room10 December 2025Updated:10 December 2025No Comments
Facebook Twitter Pinterest LinkedIn Tumblr Email
2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’

To try to determine the probability of those name repetitions being a coincidence, Cary checked two databases of Chinese names and consulted with Yi Fuxian, a professor of Chinese demography at the University of Wisconsin–Madison. The name Qiu Daibing—or 邱代兵 in Chinese characters—turned out to be a relatively unlikely name to show up twice just by chance, he says. The surname 邱 alone, Yi confirmed to WIRED, represents just 0.27 percent of Chinese names, and in combination with the specific 代兵 given name would represent a far smaller percentage.

The name Yu Yang (余洋 in Chinese characters) is more common. But the two names appearing in association seems less likely to be a coincidence, Cary theorizes. “The sheer improbability of somebody having this name also being paired with a Yu Yang, having this skill set and going to the same university in the same location where these companies are registered, it’s just an incredibly small chance that these are not the right people,” Cary argues.

WIRED attempted to contact Qiu Daibing and Yu Yang via both Qiu Daibing’s LinkedIn page and an email address on the website of Beijing Huanyu Tianqiong but received no response.

If Cary’s theory that two men linked to Salt Typhoon were in fact trained in Cisco’s Networking Academy is correct, it doesn’t represent a flaw or security oversight in Cisco’s program, he says. Instead, it points to a tough-to-avoid issue in a globalized market where technology products—and even training in the technical details of those products—are widely available, including to potential hacking adversaries.

Cary argues that the issue has only become more glaring, however, as China has tried for years to replace Cisco equipment and other Western devices in its own networks with domestic alternatives. “If China is moving in the direction of actually removing these products from Chinese networks,” Cary asks, “who’s still interested in learning about them?”

China has, meanwhile, increasingly restricted its own information-sharing with the global cybersecurity community, points out John Hultquist, chief analyst at Google’s Threat Intelligence Group, for instance, by pressuring security researchers not to present findings at international conferences.

“It’s like we’re in a sharing group, and they’ve told us straight to our face that they’re not going to reciprocate,” Hultquist says. “We’re benefiting them with our programs. But it’s not going in the other direction.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Google Primes Chrome for a Post-Quantum World

Google Primes Chrome for a Post-Quantum World

3 March 2026
Review: Shark PowerDetect UV Reveal

Review: Shark PowerDetect UV Reveal

3 March 2026
Cybercrime increases in sophistication as hackers age, according to new research

Cybercrime increases in sophistication as hackers age, according to new research

3 March 2026
The Best Ergonomic Keyboards for Your Tired Hands

The Best Ergonomic Keyboards for Your Tired Hands

3 March 2026
Editors Picks
Review: Shark PowerDetect UV Reveal

Review: Shark PowerDetect UV Reveal

3 March 2026
Cybercrime increases in sophistication as hackers age, according to new research

Cybercrime increases in sophistication as hackers age, according to new research

3 March 2026
Pokémon Pokopia Becomes the Highest-Rated Pokémon Game of All-Time

Pokémon Pokopia Becomes the Highest-Rated Pokémon Game of All-Time

3 March 2026
The Best Ergonomic Keyboards for Your Tired Hands

The Best Ergonomic Keyboards for Your Tired Hands

3 March 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Trending Now
Tech News Vision
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact
© 2026 Tech News Vision. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.