Cyberattacks & Data Breaches
A hand touching a keyboard of a laptop, the screen of which displays an envelope iconwith a red warning symbol
Threat IntelligenceChina-Sponsored Attackers Target 40K Corporate Users in 90 DaysChina-Sponsored Attackers Target 40K Corporate Users in 90 Days
The attacks infiltrate enterprise networks through browsers, and show an evolution in evasive and adaptive tactics from well-resourced state-sponsored actors.
byJeffrey Wells, Visiting Fellow, National Security Institute at George Mason University's Antonin Scalia Law School
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.