Polish and Romanian soldiers stand next to military vehicles and a NATO flag on the sidelines of a press conference of the Polish and Lithuanian president following a joint visit of the NATO Multinational Division North East mobile command center near Szypliszki village on July 7, 2022. (Photo by WOJTEK RADWANSKI/AFP via Getty Images)
Supporters of Ukraine hold signs and wave flags during a Stand with Ukraine rally at Copley Square in Boston on Feb. 26. (Photo by JOSEPH PREZIOSO/AFP via Getty Images)
Visitors sit at the stand of Russian antivirus software development company Kaspersky Lab on the opening day of the MWC (Mobile World Congress) in Barcelona on Feb. 28, 2022. (Photo by PAU BARRENA/AFP via Getty Images)
A Ukrainian serviceman inspects the ruins of a building suspected to have been destroyed after a missile strike near Kharkiv on July 5, 2022, amid the Russian invasion of Ukraine. (Photo by SERGEY BOBOK/AFP via Getty Images)
Jen Easterly (L), director of the Homeland Security Cybersecurity and Infrastructure Security Agency, and Chris Inglis, the National Cyber Director, testify during their confirmation hearing before the Senate Homeland Security and Governmental Affairs Committee on June 10, 2021 in Washington, D.C. (Photo by Kevin Dietsch/Getty Images)
The government-linked hacking activity is both an intel-gathering effort as well as a money maker, researchers say.
May 12, 2022
The flag of the People’s Republic of China flies in the wind above the Consulate General of the People’s Republic of China in San Francisco, California on July 23, 2020. (Photo by PHILIP PACHECO/AFP via Getty Images)
China's decade-old Mustang Panda hacking group is adjusting both its tactics and lures, researchers say.
May 5, 2022
Former President Barack Obama attends an event to mark the 2010 passage of the Affordable Care Act in the East Room of the White House on April 5, 2022. (Photo by Chip Somodevilla/Getty Images)