Source: EAS – Yusof Ishak Institute | Analysis by Surachanee “Hammerli” Sriya
These operations range from state-sponsored espionage campaigns to hacktivist-led disruptive attacks exploiting the inherent anonymity and attribution challenges within cyberspace