article thumbnail

Ukraine: Belarusian APT groupĀ UNC1151 targets military personnel with spear phishing

Security Affairs

The Ukrainian agency attributes the campaign to the Belarus-linked cyberespionage group tracked as UNC1151. In mid-January, the government of Kyiv attributed the defacement of tens of Ukrainian government websites to Belarusian APT group UNC1151. Attackers spear-phishing messages have been sent from email accounts using the domains i[.]ua-passport[.]space

Military 106
article thumbnail

German Parliament Bundestag targeted again by Russia-linked hackers

Security Affairs

The attackers are suspected to be hackers of the tracked as Ghostwriter group that works under the control of the Russian military secret service GRU. The messages were sent by threat actors to the private emails of the German politicians. “The Bundestag has again become the target of alleged Russian hackers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ghost Squad Hackers defaced a second European Space Agency (ESA) site in a week

Security Affairs

A group of hacktivists that goes online with the name Ghost Squad Hackers has defaced for the second time in a week a site of the European Space Agency (ESA). Last week a group of hackers that goes online with the name Ghost Squad Hackers announced the defacement of a site of the European Space Agency (ESA), [link].

CMS 101
article thumbnail

Mandiant links Ghostwriter operations to Belarus

Security Affairs

Security researchers at the Mandiant Threat Intelligence team believe that Ghostwriter APT group is linked to the government of Belarus. Sensitive technical information gathered by the researchers suggests the threat actors were operating from Minsk, Belarus under the control of the Belarusian Military.

Military 107
article thumbnail

GhostWriter APT targets state entities of Ukraine with Cobalt Strike BeaconĀ 

Security Affairs

Ukraine CERT-UA warns that the Belarus-linked GhostWriter APT group is targeting state entities of Ukraine with Cobalt Strike Beacon. Ukraine CERT-UA uncovered a spear-phishing campaign conducted by Belarus-linked GhostWriter APT group targeting Ukrainian state entities with Cobalt Strike Beacon. Pierluigi Paganini.

article thumbnail

Ghostwriter disinformation campaign aimed at discrediting NATO

Security Affairs

Unlike other disinformation campaigns, GhostWriter doesn’t spread through social networks, instead, threat actors behind this campaign abused compromised content management systems (CMS) of news websites or spoofed email accounts to disseminate fake news. ” continues the report.

Military 101
article thumbnail

Remember the human factor in the patient experience

CGI

On the panel were representatives from the Centers for Medicare & Medicaid Services (CMS), b.well Connected Health, MedStar Georgetown University Hospital (MGUH) and CGI. The first step to improve the patient experience is to understand just what a positive patient experience is. It often begins well before a patient enters a health facility.

CMS 40