Technology ❯ Cybersecurity ❯ Cyber Attacks ❯ State-Sponsored Attacks
Officials say the long-running effort exploited known weaknesses in network edge devices to reach critical networks worldwide.