Supporters of Ukraine hold signs and wave flags during a Stand with Ukraine rally at Copley Square in Boston on Feb. 26. (Photo by JOSEPH PREZIOSO/AFP via Getty Images)
Visitors sit at the stand of Russian antivirus software development company Kaspersky Lab on the opening day of the MWC (Mobile World Congress) in Barcelona on Feb. 28, 2022. (Photo by PAU BARRENA/AFP via Getty Images)
A Ukrainian serviceman inspects the ruins of a building suspected to have been destroyed after a missile strike near Kharkiv on July 5, 2022, amid the Russian invasion of Ukraine. (Photo by SERGEY BOBOK/AFP via Getty Images)
Jen Easterly (L), director of the Homeland Security Cybersecurity and Infrastructure Security Agency, and Chris Inglis, the National Cyber Director, testify during their confirmation hearing before the Senate Homeland Security and Governmental Affairs Committee on June 10, 2021 in Washington, D.C. (Photo by Kevin Dietsch/Getty Images)
The government-linked hacking activity is both an intel-gathering effort as well as a money maker, researchers say.
May 12, 2022
Advertisement
The flag of the People’s Republic of China flies in the wind above the Consulate General of the People’s Republic of China in San Francisco, California on July 23, 2020. (Photo by PHILIP PACHECO/AFP via Getty Images)
China's decade-old Mustang Panda hacking group is adjusting both its tactics and lures, researchers say.
May 5, 2022
Former President Barack Obama attends an event to mark the 2010 passage of the Affordable Care Act in the East Room of the White House on April 5, 2022. (Photo by Chip Somodevilla/Getty Images)
The building that houses the Federal Office for Information Technology Security (BSI, Bundesamt fuer Sicherheit in der Informationstechnik) on Jan. 7, 2019 in Bonn, Germany. (Photo by Andreas Rentz/Getty Images)
Ukrainian citizens board a train toward Wroclaw, Poland, as part of the temporary program for refugees arriving from Ukraine on March 2, 2022 in Przemysl, Poland (Photo by Omar Marques/Getty Images)