Government ❯ Cybersecurity Policy ❯ Threat Actors ❯ State-Sponsored Threats
Mandiant’s investigation found the intrusion confined to a specific cloud environment accessed via an API.