
Sign up to save your podcasts
Or
This episode details the extensive and evolving cyber threat operations originating from China. It examines the motivations behind these attacks, including geopolitical objectives, economic gain, and military ambitions. The report profiles various Chinese state-sponsored and non-state affiliated threat actors, highlighting their tactics, techniques, and procedures (TTPs), and discusses recent significant cyber incidents involving Chinese actors. Finally, the report offers mitigation strategies for organizations to enhance their cybersecurity defenses against these sophisticated and persistent threats.
This episode details the extensive and evolving cyber threat operations originating from China. It examines the motivations behind these attacks, including geopolitical objectives, economic gain, and military ambitions. The report profiles various Chinese state-sponsored and non-state affiliated threat actors, highlighting their tactics, techniques, and procedures (TTPs), and discusses recent significant cyber incidents involving Chinese actors. Finally, the report offers mitigation strategies for organizations to enhance their cybersecurity defenses against these sophisticated and persistent threats.