Remove Education Remove Military Remove Presentation
article thumbnail

Chinese Cycldek APT targets Vietnamese Military and Government in sophisticated attacks

Security Affairs

China-linked APT group Cycldek is behind an advanced cyberespionage campaign targeting entities in the government and military sector in Vietnam. China-linked APT group LuckyMouse (aka Cycldek, Goblin Panda , Hellsing, APT 27, and Conimes) is targeting government and military organizations in Vietnam with spear-phishing.

Military 121
article thumbnail

GUEST ESSAY: 6 steps any healthcare organization can take to help mitigate inevitable cyber attacks

The Last Watchdog

A cyber catastrophe may seem inevitable, but there are basic practices and actionable steps any healthcare organization can take to begin reducing the clear and present risk of being impacted by a cybersecurity event. Educate employees. The risks are real, and the impact of cybersecurity events continues to grow.

Passwords 214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Catches of the Month: Phishing Scams for March 2022

IT Governance

The Ukrainian government and its military were targeted by DDoS (distributed denial-of-service) attacks, while a pro-Ukrainian group attacked the Belarusian railway system with ransomware after discovering that it was being used by Russia to transport tanks and weapons.

Phishing 142
article thumbnail

GCHQ implements World War II cipher machines in encryption app CyberChef

Security Affairs

UK intelligence agency GCHQ, as part of the celebration of its centenary , has released emulators for World War II cipher machines that can be executed in the encryption app CyberChef released for educational purposes. We even tested them against the real thing! Try them out for yourself!

article thumbnail

Have We Become Apathetic About Breaches?

Thales Cloud Protection & Licensing

An incensed population began to demand companies secure their personal information, because the consumerization of the threat was a clear and present danger. One such example is the recent disclosure that military personnel wearing Strava devices are revealing highly sensitive information about their locations and activities.

IoT 89
article thumbnail

List of data breaches and cyber attacks in February 2022 – 5.1 million records breached

IT Governance

You can find out more about the cyber security implications of the Ukraine by registering for our special presentation hosted by IT Governance’s founder and executive chairman, Alan Calder. It will take place on Thursday, 3 March at 3pm, and you can register for on our website.

article thumbnail

Finding Family in Images of Liberation at Buchenwald

Unwritten Record

In honor of International Holocaust Remembrance Day, we wanted to share a story that highlights how materials held by the National Archives and Records Administration are used to connect the past with the present. It is rare to locate and positively identify specific people who appear in the footage shot by the US military.