Sept. 7, 2023, noon |

Infosecurity Magazine www.infosecurity-magazine.com

The threat actor used the stolen key to breach 25 organizations, including US government agencies

actor breach chinese government government agencies hacker key microsoft organizations signing signing key spies stolen threat threat actor

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Computer and Forensics Investigator

@ ManTech | 221BQ - Cstmr Site,Springfield,VA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India