Remove 2012 Remove Education Remove Government
article thumbnail

‘Justice Blade’ Hackers are Targeting Saudi Arabia

Security Affairs

The group of threat actors calling themselves ‘Justice Blade’ published leaked data from Smart Link BPO Solutions, an outsourcing IT vendor working with major enterprises and government agencies in the Kingdom of Saudi Arabia and other countries in the GCC.

article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. manufacturers on behalf of Russian end-users, including defense contractors and other Russian government agencies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Previously undocumented Aoqin Dragon APT targets entities in Southeast Asia and Australia

Security Affairs

SentinelOne documented a series of attacks aimed at government, education, and telecom entities in Southeast Asia and Australia carried out by a previously undocumented Chinese-speaking APT tracked as Aoqin Dragon. The APT primary focus on cyberespionage against targets in Australia, Cambodia, Hong Kong, Singapore, and Vietnam.

article thumbnail

Analyzing attacks conducted by North Korea-linked ARCHIPELAGO APT group

Security Affairs

Google’s Threat Analysis Group (TAG) is warning of the North Korea-linked ARCHIPELAGO group that is targeting government and military personnel, think tanks, policy makers, academics, and researchers in South Korea, the US and elsewhere.

Phishing 246
article thumbnail

Notes and observations about the 2012 intranet innovation award winners

ChiefTech

This year, Pleio, a customised version of Elgg developed by the Dutch government , also won an award. Pleio: A social network for Dutch government on Prezi. We also deployed Elgg for a Government 2.0 Incidentally, the NSW Department of Education is also a Socialtext customer (see below).

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

Related: What local government can do to repel ransomware Ransomware came into existence in 1989 as a primitive program dubbed the AIDS Trojan that was spreading via 5.25-inch FBI spoofs 2012 – 2013. It surfaced in November 2012 and was making thousands of victims a day. inch diskettes. None of these early threats went pro.

article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

Merit is an acronym for the Michigan Educational Research Information Triad. The first Cyber Range training and testing hub opened at Eastern Michigan University in late 2012. The early Cyber Range hubs were mainly used to help educate and certify military technicians and cybersecurity professionals at selected companies.