This Python-based simulation platform can realistically model various components of the UAV network, including the network layer, MAC layer and physical layer, as well as the UAV mobility model, ...
"The plan sets out specific construction tasks for building national data infrastructure in areas including data circulation and utilization, computing power, networks and security," Wang noted.
During the attack, the threat actors stole 6 TB of data and ultimately encrypted computers on the network, causing the company to shut down IT systems to prevent the spread of the attack.