Space Force leaders are hashing out a plan to create a new group under U.S. Central Command to coordinate what military space assets to use in the region.
Some major defense contractors use the compromised software at the center of the breach, but figuring out whether hackers got inside their systems will be difficult and time-consuming.