Belarusian dictator Alexander Lukashenko becomes chairman of the All-Belarus People’s Assembly, a newly established extra-governmental body.
Two hospitals in Kyiv were evacuated following threats from the head of the Belarusian KGB.
Lithuania demands Minsk retract claims it was preparing for drone attacks on Belarusian targets.
Subscribe to the Newsletter
Belarus Weekly
The Belarusian service of German media outlet Deutsche Welle is declared an extremist organization and banned in Belarus.
The Belarusian Cyber Partisans group claims to have hacked KGB servers, accessing 40,000 denunciation reports and 8,600 agent profiles.
The Norwegian government pledges $900,000 to the political prisoners fund set up by Belarusian opposition leader Sviatlana Tsikhanouskaya.
New Belarusian extra-governmental body holds first meeting, appoints Lukashenko its chairman
The new Belarusian extra-governmental body, the All-Belarus People’s Assembly, convened on April 24-25 in Minsk, appointing
The MITRE Company suggests that a condition-backed hacking team breached its units in January 2024 by chaining two Ivanti VPN zero-times.
The incident was learned right after suspicious activity was detected on MITRE’s Networked Experimentation, Investigation, and Virtualization Atmosphere (NERVE), an unclassified collaborative network utilised for research and advancement.
MITRE has due to the fact notified influenced events of the breach, contacted related authorities, and is now doing work on restoring “operational choices.”
Proof collected all through the investigation so far shows that this breach did not have an effect on the organization’s main business community or its partners’ devices.
“No firm is immune from this kind of cyber attack, not even a single that strives to keep the best cybersecurity attainable,” claimed MITRE CEO Jason Providakes on Friday.
“We are disclosing this incident in a well timed fashion for the reason that of our determination to run in the
An Iran-linked hacking team claims to have breached the personal computer network of a sensitive Israeli nuclear installation in an incident declared by the ‘Anonymous’ hackers as a protest versus the war in Gaza.
The hackers claim to have stolen and revealed thousands of paperwork — including PDFs, e-mails, and PowerPoint slides — from the Shimon Peres Negev Nuclear Exploration Middle. The secretive facility, which homes a nuclear reactor joined to Israel’s unavowed nuclear weapons plan, has historically been qualified by Hamas rockets.
In a social media message detailing their intentions, the group claimed “as we are not as like as the bloodthirsty Netanyahu and his terrorist army we carried out the operation in this kind of a way that no civilians were harmed.”
Irrespective of this statement, in an additional a social media information the group explained it did “not intend to have a nuclear explosion but this operation
Sixteen hospitals and a lot more than a hundred other healthcare facilities across the United States are offline after the premier cyberattack on a U.S. healthcare facility method since previous 12 months.
Prospect Medical Holdings, a chain that owns hospitals, as well as extra than 165 outpatient amenities, in California, Connecticut, Pennsylvania and Rhode Island has taken its principal pc community offline, a spokesperson mentioned Friday.
The organization very first took its national pc programs offline Tuesday right after exploring a ransomware attack, reported Nina Kruse, a spokesperson for the Eastern Connecticut Overall health Community, which is owned by Prospect. As is prevalent with cyberattacks on hospitals, medical doctors and nurses are reverting to procedures like making use of pen and paper as an alternative of desktops to just take client documents, she mentioned.
Some outpatient amenities have closed for the reason that of the attacks, such as radiology,
A mysterious and unknown group of hackers has sought to paralyse the computer networks of just about 5,000 victims across the US and Europe, in a person of the most common ransomware attacks on document.
The hacking device, to begin with nicknamed the Nevada Group by security scientists, commenced a series of attacks that started out close to a few months in the past by exploiting an easily fastened vulnerability in a piece of code that is ubiquitous in cloud servers.
The Monetary Periods contacted many victims determined from the publicly accessible information. Most declined to comment, expressing they had been requested by law enforcement to do so. They contain universities in the US and Hungary, transport and development groups in Italy and brands in Germany.
Authorities have nonetheless to establish the perpetrators, guessing only from their recruiting announcements on the internet that it is a combine of Russian and