by Haja Mo May 16, 2025 Cybersecurity In the fourth of our five-part series, Sophos X-Ops explores threat actors’ real-world criminal business interests Previous Story Beyond the kill chain: What cybercriminals do with their money (Part 3) Next Story Beyond the kill chain: What cybercriminals do with their money (Part 5)