Impacted business computers have already been isolated while other systems' cybersecurity defenses have already been enhanced amid an ongoing investigation into the means of malware compromise and the types of exfiltrated data.
Fast Five
Selected by the SC Media Editorial team every Tuesday.
Sign up now for the top five issues cybersecurity pros need to know this week.