The First Ukrainian Delegation at the Largest Technology Conference in North America
The Collision is one of the largest technology conferences in the world, taking place in Toronto from June 20 to 23. It will be attended by more than 35,000 visitors from 140 countries, 1,250+ startups, 800+ investors, 1,200+ journalists and 200+ partners.
This year, for the first time, the Ukrainian IT community will join Collision, where it will present the possibilities of Ukrainian IT in the international arena. You can get acquainted with the representatives of the Ukrainian delegation at the link.
Organizers of the Ukrainian delegation: Ukrainian bridge, European Business Association, Ukrainian Startup Fund. Partners: N-IX, Customertimes, SID and ISSP. The delegation will be supported by the Ministry of Digital Transformation and the Ministry of Foreign Affairs .
News from IT ARMY of Ukraine
Since Monday, May 30, the IT ARMY of Ukraine has focused on attacks on web resources of russian providers .
Reports from the russian media on the success of the IT ARMY of Ukraine over the past week have also appeared on the Internet :
Anonymous Hacked MetProm
Anonymous has leaked 184 GB of emails from MetProm, a subsidiary of russia’s energy giant Gazprom, linked to the Arab Republic of Egypt and the Islamic Republic of Iran. MetProm is a metallurgical engineering and investment group that participates in dozens of projects with ArcelorMittal, PJSC NLMK, EVRAZ Group enterprises, PJSC Mechel, PJSC Severstal, Isfahan Metallurgical Plant (Islamic Republic of Iran, Iran, Iran). Republic of Egypt) .
Hackers Put the SkyEng Database up for Sale
The offer to sell the customer database of the russian online English language school SkyEng appeared on one of the hacker forums. According to the seller, the proposed database contains 7,442,890 lines, including logins, customer names, dates of birth, telephone numbers, e-mail addresses, Skype, information about time zones and regions of residence .
China Is Increasingly Accusing the United States of Cyber Espionage
Since the start of 2022, China’s Foreign Ministry and the country’s cybersecurity firms have increasingly been calling out alleged US cyberespionage. Until now, these allegations have been a rarity. But the disclosures come with a catch: They appear to rely on years-old technical details, which are already publicly known and don’t contain fresh information. The move may be a strategic change for China as the nation tussles to cement its position as a tech superpower. «These are useful materials for China’s tit-for-tat propaganda campaigns when they faced US accusation and indictment of China’s cyberespionage activities,» says Che Chang, a cyber threat analyst at the Taiwan-based cybersecurity firm TeamT5. China’s accusations, which were noted by security journalist Catalin Cimpanu, all follow a very similar pattern. On February 23, Chinese security company Pangu Lab published allegations that the US National Security Agency’s elite Equation Group hackers used a backdoor, dubbed Bvp47, to monitor 45 countries. The Global Times, a tabloid newspaper that’s part of China’s state-controlled media, ran an exclusive report on the research. Weeks later, on March 14, the newspaper had a second exclusive story about another NSA tool, NOPEN, based on details from China’s National Computer Virus Emergency Response Center. A week later, Chinese cybersecurity firm Qihoo 360 alleged that US hackers had been attacking Chinese companies and organizations. And on April 19, the Global Times reported on further National Computer Virus Emergency Response Center findings about HIVE, malware developed by the CIA .
Senator business center, 32/2, Dukes of Ostrozhsky, Kyiv+38 (050) 428 44 68 (Ukraine), +1 (786) 755 8398 (USA)
© 2023 GLOBAL CYBER COOPERATIVE CENTER (GC3). All rights reserved