ShadowMap
  • USE CASES
    • Attack Surface Management
    • Actionable Threat Intelligence
    • Monitoring Data Leaks & Leaked Credentials
    • Brand Protection & Takedowns
    • Dark Web Monitoring & Data Breaches
  • SOLUTIONS
    • Phishing Takedown
    • Automate Security Operations
    • Security Ratings
  • FEATURES
    • Executive Cyber Protection
    • Cyber Threat Police Services
    • Tracking SSO Integrations
  • ABOUT US
  • CONTACT US
  • REQUEST A DEMO
Select Page
Investigating Chinese Intelligence Firm Zhenhua Data

Investigating Chinese Intelligence Firm Zhenhua Data

by Yash Kadakia | Sep 17, 2020 | Security Research

Stories of Chinese Intelligence Firms leveraging Big Data Analysis, Social Media Platforms, LinkedIn, Mobile Devices, SIGINT, etc are all over the internet.  However the recent stories about the Zhenhua Data Leak in the Indian Express caught our attention and we...

Search

Recent Posts

  • Tracking SSO Integrations Across The Organization
  • Cyber Threat Police Services
  • Executive Cyber Protection
  • Investigating Chinese Intelligence Firm Zhenhua Data
  • Update on Our Aarogya Setu Blog Post

Recent Comments

  • NEED OF GLOBAL GOVERNANCE IN CYBERSPACE: THE AFTERMATH OF ZHENHUA INVESTIGATION LEAK - RGNUL Student Research Review (RSRR) on Investigating Chinese Intelligence Firm Zhenhua Data
  • News & Analysis: No. 255 | Daniel Miessler on Investigating Chinese Intelligence Firm Zhenhua Data

Archives

  • October 2022
  • September 2020
  • August 2020
  • July 2020
  • May 2020
  • March 2020
  • December 2017

Categories

  • Attack Surface Management
  • Brand Protection
  • Features
  • Managed Services
  • News
  • Security Research
  • Threat Intelligence

Meta

  • Site Admin
  • Log out
  • Entries feed
  • Comments feed
  • WordPress.org

Follow Us

  • Follow
  • Follow
  • Follow

Products

  • Attack Surface Management
  • Actionable Threat Intelligence
  • Monitoring Data Leaks & Leaked Credentials
  • Brand Protection & Takedowns
  • Dark Web Monitoring & Data Breaches

Solutions

  • Phishing Takedown – Automation & Expert Analysts
  • Security Ratings
  • Automate Security Operations

About Us

  • Contact Us
  • Partner Program
  • Become A Partner
  • About ShadowMap
  • Overview of ShadowMap

Privacy & Security

  • Privacy
  • Sitemap
  • Security

© 2025 Security Brigade. All rights reserved.