Skip to main content
. 2024 Jan 15;10:e1772. doi: 10.7717/peerj-cs.1772

Figure 2. Overview of some of the recent cyberattacks.

Figure 2