by Haja Mo May 16, 2025 Cybersecurity In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors Previous Story State Attorneys General Share Consumer Protection Viewpoints in Chicago Next Story Beyond the kill chain: What cybercriminals do with their money (Part 3)