The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and related technologies.

​The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and related technologies.