When the Volt Typhoon attack surfaced, it wasn’t ransomware—it was stealth. A state-sponsored Chinese threat actor quietly infiltrated U.S. critical infrastructure—energy, water, transportation, and communications—using legitimate admin tools to move undetected.
This wasn’t smash-and-grab. It was pre-positioning for disruption.
In this video, we break down:
- How Volt Typhoon signaled a shift to stealth and persistence.
- Why MSPs are prime targets and part of national digital infrastructure.
- Where traditional defenses fail—and why containment-first thinking matters.
Volt Typhoon was a warning shot: proof the most dangerous threats are the quietest.
What is After the Breach: A Video Series for MSPs?
Every threat leaves a lesson. This series delivers them.
Every breach leaves behind more than just damage—it leaves behind a lesson. “After the Breach”, hosted by Jon Marinaro, is a fast-paced, insight-driven video series built for MSPs who want to stay one step ahead of emerging threats.
In each short episode, Jon breaks down real-world cyberattacks like the Kaseya REvil and Volt Typhoon incidents—not just what happened, but what it means for MSPs today.
Stay tuned as Jon unpacks more attacks, more patterns, and more ways to defend what matters most.