Chinese cyber espionage growing across all industry sectors
CIO
MARCH 4, 2025
Adversaries are pre-positioning themselves within critical networks, supported by a broader ecosystem that includes shared tooling, training pipelines, and sophisticated malware development. These networks are similar to botnets, but are primarily used as proxies, and are often administered by independent contractors that are based in China.
Let's personalize your content