Skip to main content

Missouri Governor Vows to Pros...

On Wednesday, the St. Louis Post-Dispatch ran a story about how its staff discovered and reported a security vulnerability in a Missouri state education website that exposed the Social Security numbers of 100,000 elementary and secondary teachers. In a press conference this morning, Missouri Gov. Mike Parson (R) said fixing the flaw could cost the […]

The Southern Libraries

Libraries can take many forms, and serve different functions, based on the needs and resources of their local communities. Recurring guest writer, Edgardo Civallero, shares the nature and history of libraries, specifically in South America. Unrecognized effort Latin Libraries are commonly considered invisible spaces in terms of public opinion. In this sense, and except for […]

How Coinbase Phishers Steal On...

A recent phishing campaign targeting Coinbase users shows thieves are getting smarter about phishing one-time passwords (OTPs) needed to complete the login process. It also shows that phishers are attempting to sign up for new Coinbase accounts by the millions as part of an effort to identify email addresses that are already associated with active […]

Patch Tuesday, October 2021 Ed...

Microsoft today issued updates to plug more than 70 security holes in its Windows operating systems and other software, including one vulnerability that is already being exploited. This month’s Patch Tuesday also includes security fixes for the newly released Windows 11 operating system. Separately, Apple has released updates for iOS and iPadOS to address a […]

What Does The Everyday Work Of...

We all know the inaccurate stereotype that exists about libraries and librarians; a quiet place, where people go to borrow and read books, overseen by a grumpy old lady who will scream “Shhh!” if anyone makes the slightest noise. Of course, this is just simply incorrect. Libraries of all kinds, are so much more than […]

DNS Records and Record Types: ...

DNS is the system that associates domain names with IP addresses, so whenever we type in “securitytrails.com”, DNS uses a series of protocols to connect us with the authoritative DNS server of the domain name and serves us the content we intended to visit. DNS is one of the most popular internet services, and at […]

What Happened to Facebook, Ins...

Facebook and its sister properties Instagram and WhatsApp are suffering from ongoing, global outages. We don’t yet know why this happened, but the how is clear: Earlier this morning, something inside Facebook caused the company to revoke key digital records that tell computers and other Internet-enabled devices how to find these destinations online. Kentik’s view […]

FCC Proposal Targets SIM Swapp...

The U.S. Federal Communications Commission (FCC) is asking for feedback on new proposed rules to crack down on SIM swapping and number port-out fraud, increasingly prevalent scams in which identity thieves hijack a target’s mobile phone number and use that to wrest control over the victim’s online identity. In a long-overdue notice issued Sept. 30, […]

Palo Alto Networks Cortex XSOA...

SecurityTrails’ 125,000 users can now integrate with the leading SOAR platform. We’re excited to announce the immediate availability of our latest API integration into Palo Alto Networks Cortex XSOAR, enabling users to operationalize our security intelligence with over 750 different products. Palo Alto Networks Cortex XSOAR is one of the most comprehensive security orchestration solutions […]

The Rise of One-Time Password ...

In February, KrebsOnSecurity wrote about a novel cybercrime service that helped attackers intercept the one-time passwords (OTPs) that many websites require as a second authentication factor in addition to passwords. That service quickly went offline, but new research reveals a number of competitors have since launched bot-based services that make it relatively easy for crooks […]

Big News about Connecting Comm...

Big News about Connecting Communities Digital Initiative!

September 2021 LC LABS LETTERA Monthly Roundup of News and Thoughts from the Library of Congress Labs Team Big news about the Connecting Communities Digital Initiative (CCDI) Apply now to CCDI grants! The Connecting Communities Digital Initiative (CCDI) currently has three open grant opportunities including 1) a higher education grant and 2) a library, archives, […]

Digital Forensics: Sleuthing A...

Whether providing valuable evidence that assists in the investigation and prosecutions of crime perpetrators or proving their innocence or as part of the post-breach investigation and incident response process in organizations of all sizes, digital forensics is a widely used craft by investigators in all sectors. The ever-growing advancements in information technology have potentially proven […]

FADGI’s embARC: Extending embe

Today’s guest post is from Kate Murray, Digital Projects Coordinator in Digital Collections Management and Services at the Library of Congress and Bertram Lyons, Partner and Managing Director for Software at AVP. Note: This is the last in a series of updates from the Federal Agencies Digital Guidelines Initiative (FADGI) Audio-Visual working group. See That’s […]

Indictment, Lawsuits Revive Tr...

In October 2016, media outlets reported that data collected by some of the world’s most renowned cybersecurity experts had identified frequent and unexplained communications between an email server used by the Trump Organization and Alfa Bank, one of Russia’s largest financial institutions. Those publications set off speculation about a possible secret back-channel of communications, as […]

Aquatic Routes Of Knowledge

Libraries bring knowledge to their communities. However, sometimes this cannot be done on land. That’s when librarians, and libraries, get on a boat in order to bring books, entertainment and knowledge to these people. Recurring guest writer, Edgardo Civallero, shares some Latin American initiatives, past and current, that aim to bring libraries to their communities […]

Security Information and Event...

While there may be talk about SIEM joining the line of legacy technologies that are proclaimed “dead”, SIEM has been a core system for many security teams, and in different capacities. Furthermore, SIEM (along with its evolution) has been intertwined with relevant threats in the ecosystem as well as the market in which it is […]

The September 11, 2001 Web Arc...

Today’s guest post is from Tracee Haupt, a Digital Collection Specialist in the Digital Content Management section at the Library of Congress. On the twentieth anniversary of the September 11th terrorist attacks, I asked four individuals who were part of the creation of the September 11, 2001 Web Archive to reflect on their experience documenting […]