Threat Actors Surveillance Software Nation-State Actors Foreign Threats Chinese Hacking Telecommunications Phishing State-Sponsored Hacking State-sponsored Cyber Operations Intelligence Services Listening Devices APT29 Hacking North Korea Connected Vehicles Data Theft Hacking Groups Information Operations Export Controls Critical Infrastructure Intelligence Operations Malware Trade Secrets Artificial Intelligence Emerging Technologies Technological Advancements Spyware Vulnerabilities Nation-State Threats State-sponsored attacks Targeting Individuals Threat Intelligence Chinese Technology State-Sponsored Attacks Targeted Attacks AI and Quantum Technologies AI in Cybersecurity Innovation Hardware Security Chinese Cyber Operations State-sponsored hacking