Skip to main content

Web Archiving Virtually In Res1

Meghan Lyon, Librarian in Residence with the Web Archiving Team. Meghan Lyon recently joined the Web Archiving Team in the Digital Content Management section as a Librarian in Residence. In support of developing the next generation of librarians and information professionals, the Librarians-in-Residence program (LIR) gives early-career librarians the opportunity to gain meaningful work experience […]

Risk Assessment vs. Risk Analy1

While yes, there are adrenaline-seekers among us who would gladly take the plunge, let’s look at it from a non-thrill-seekers’ perspective: you would only jump if you knew you had the skills to do it safely, consider all the circumstances, assess the terrain, enlist someone to help out if necessary; essentially, prepare yourself for everything […]

FBI, CISA Echo Warnings on ‘Vi

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued a joint alert to warn about the growing threat from voice phishing or “vishing” attacks targeting companies. The advisory came less than 24 hours after KrebsOnSecurity published an in-depth look at a crime group offering a service that […]

Metaphors for Understanding Bo1

The following is a guest post by Senior Archivist Kathleen O’Neill. Kathleen and her colleague Chad Conrady are currently working on a project called Born Digital Access Now! as the 2020 Staff Innovators in LC Labs. Their first blog post introduces the project, which aims to provide greater access to born digital materials held in […]

Voice Phishers Targeting Corpo1

The COVID-19 epidemic has brought a wave of email phishing attacks that try to trick work-at-home employees into giving away credentials needed to remotely access their employers’ networks. But one increasingly brazen group of crooks is taking your standard phishing attack to the next level, marketing a voice phishing service that uses a combination of […]

Insider Threats in Cybersecuri1

Let’s also consider the current shift taking place in many organizations: working remotely is all the rage right now. And with more and more team members working from home, more devices are accessing your network, along with new technologies and tools being utilized to make at-home-offices function properly. This blurs the lines between the personal […]

Microsoft Put Off Fixing Zero 1

A security flaw in the way Microsoft Windows guards users against malicious files was actively exploited in malware attacks for two years before last week, when Microsoft finally issued a software update to correct the problem. One of the 120 security holes Microsoft fixed on Aug. 11’s Patch Tuesday was CVE-2020-1464, a problem with the […]

Medical Debt Collection Firm R1

R1 RCM Inc. [NASDAQ:RCM], one of the nation’s largest medical debt collection companies, has been hit in a ransomware attack. Formerly known as Accretive Health Inc., Chicago-based R1 RCM brought in revenues of $1.18 billion in 2019. The company has more than 19,000 employees and contracts with at least 750 healthcare organizations nationwide. R1 RCM […]

Comic books and Libraries #2 –

The Princh Library blog provides library stories and insights from around the globe. The blog is brought to you by Princh, the only printing solution designed specifically for – and with – libraries! Our user-friendly printing solution makes it easy for library users to print and pay from their own device. Try out our solution […]

Recon-ng: An Open Source Recon1

This kind of tool really enhances your toolbox when realizing an attack surface analysis against a desired target. Additionally, it provides a development interface that enables you to create your own modules and expand the tools’ capabilities even further. Getting to know Recon-ng This OSINT tool has plenty of features that come “out of the […]

Why & Where You Should You Pla

Several stories here have highlighted the importance of creating accounts online tied to your various identity, financial and communications services before identity thieves do it for you. This post examines some of the key places where everyone should plant their virtual flags. As KrebsOnSecurity observed back in 2018, many people — particularly older folks — […]

Microsoft Patch Tuesday, Augus1

Microsoft today released updates to plug at least 120 security holes in its Windows operating systems and supported software, including two newly discovered vulnerabilities that are actively being exploited. Yes, good people of the Windows world, it’s time once again to backup and patch up! At least 17 of the bugs squashed in August’s patch […]

What is Security Orchestration1

Every organization wants the best of the best to build their defenses. This can often leave their security teams and security operations centers with a toolstack of uncooperative solutions that don’t communicate with one another, with their full value remaining untapped, and they can interrupt or even cancel each other out. The team becomes paralyzed […]

Hacked Data Broker Accounts Fu1

A group of thieves thought to be responsible for collecting millions in fraudulent small business loans and unemployment insurance benefits from COVID-19 economic relief efforts gathered personal data on people and businesses they were impersonating by leveraging several compromised accounts at a little-known U.S. consumer data broker, KrebsOnSecurity has learned. In June, KrebsOnSecurity was contacted […]

Porn Clip Disrupts Virtual Cou1

Perhaps fittingly, a Web-streamed court hearing for the 17-year-old alleged mastermind of the July 15 mass hack against Twitter was cut short this morning after mischief makers injected a pornographic video clip into the proceeding. 17-year-old Graham Clark of Tampa, Fla. was among those charged in the July 15 Twitter hack. Image: Hillsborough County Sheriff’s […]

Robocall Legal Advocate Leaks 1

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers. The Blacklist […]

Three Charged in July 15 Twitt1

Three individuals have been charged for their alleged roles in the July 15 hack on Twitter, an incident that resulted in Twitter profiles for some of the world’s most recognizable celebrities, executives and public figures sending out tweets advertising a bitcoin scam. Amazon CEO Jeff Bezos’s Twitter account on the afternoon of July 15. Nima […]

Buckminster Fuller on a long t1

Buckminster Fuller has loomed large over the Stanford Media Preservation Lab ever since his archives were fully processed and described in the mid-2000s. Over the past eight years we’ve been slowly reformatting the extensive media component of this collection, but there was one media format that remained elusive: wire. A magnetic recording format that predated […]