The hosting provider's compromise allowed attackers to deliver malware through tainted software updates for six months.
Key cyber updates on ransomware, cloud intrusions, phishing, botnets, supply-chain risks, and nation-state threat activity.