Skip to main content

nmapAutomator: Automating your1

And understandably so; cybersecurity continues to receive significant attention on all fronts, from secretive accounts of cyber espionage to the now rather ubiquitous corporate breach scenarios pressuring organizations across the globe. Better security comes at a price too, and in the absence of significant security measures anti-patterns quickly evolve to give miscreants ample targets of […]

Does Your Organization Have a 1

It happens all the time: Organizations get hacked because there isn’t an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe it isn’t entirely clear who should get the report when remote access to an organization’s internal network is being sold in the cybercrime underground. In a […]

Trial Ends in Guilty Verdict f1

A jury in California today reached a guilty verdict in the trial of Matthew Gatrel, a St. Charles, Ill. man charged in 2018 with operating two online services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against Internet users and websites. Gatrel’s conviction comes roughly two weeks after his co-conspirator pleaded guilty […]

Reading the (Same) Signals: Us1

This is the second in a series of updates from the Federal Agencies Digital Guidelines Initiative (FADGI) Audio-Visual working group. See That’s Our Cue! Updates for the FADGI Embedded Metadata Guidelines and BWF MetaEdit for the Cue Chunk in Broadcast Wave Files for the first installment. This post is co-authored by Kate Murray, Digital Projects […]

Dungeons And Dragons In The Li1

Dungeons and Dragons is in its renaissance right now. The rising popularity of shows like Critical Role, Dimension20 or Not Another DND Podcast, brings new players to the world’s most popular role playing game. But is this trend something your library should capitalize on and introduce the game to its community? In this week’s post […]

Customer Care Giant TTEC Hit B1

TTEC, [NASDAQ: TTEC], a company used by some of the world’s largest brands to help manage customer support and sales online and over the phone, is dealing with disruptions from a network security incident resulting from a ransomware attack, KrebsOnSecurity has learned. While many companies have been laying off or furloughing workers in response to […]

Microsoft Patch Tuesday, Septe1

Microsoft today pushed software updates to plug dozens of security holes in Windows and related products, including a vulnerability that is already being exploited in active attacks. Also, Apple has issued an emergency update to fix a flaw that’s reportedly been abused to install spyware on iOS products, and Google‘s got a new version of […]

The 10 Largest Data Breaches a1

With so much exposure to this kind of news, we can become desensitized to the numbers involved in these situations, but it’s important to understand how dangerous and wide-reaching they can be. We’ve put together a list of the largest data breaches involving attackers infiltrating some of the largest companies’ networks, and the misfortunate data […]

Stanford Libraries welcomes Ka1

It is my delight to share the news that Kabir Hermon is joining the staff of Digital Library Systems and Services as our new Audio Digitization Specialist. Kabir’s first day will be Monday, September 20, and he will be working alongside Geoff Willard and Michael Angeletti at our media preservation facilities on the Stanford Redwood […]

KrebsOnSecurity Hit By Huge Ne1

On Thursday evening, KrebsOnSecurity was the subject of a rather massive (and mercifully brief) distributed denial-of-service (DDoS) attack. The assault came from “Meris,” the same new botnet behind record-shattering attacks against Russian search giant Yandex this week and internet infrastructure firm Cloudflare earlier this summer. Cloudflare recently wrote about its attack, which clocked in at […]

That’s Our Cue! Updates for th

This is guest post, the first in a series of updates about the recent work of the Federal Agencies Digital Guidelines Initiative (FADGI) Audio-Visual working group, is co-authored by Kate Murray, Digital Projects Coordinator in Digital Collections Management and Services, audiovisual archivist and technologist Dave Rice, and Jérôme Martinez, Founder and President of MediaArea.net. Fig. […]

5 Reasons Why Libraries Are Es1

Nowadays, we are extremely dependent on the internet for information in our daily lives. However, does that information always bring us the right answers? As you might know, search engines such as Google tend to provide us with information depending on our formulated questions or keywords, therefore the data we get is not always relevant. […]

Microsoft: Attackers Exploitin1

Microsoft Corp. warns that attackers are exploiting a previously unknown vulnerability in Windows 10 and many Windows Server versions to seize control over PCs when users open a malicious document or visit a booby-trapped website. There is currently no official patch for the flaw, but Microsoft has released recommendations for mitigating the threat. According to […]

Supporting the Acquisition of 1

For thirty years the Library of Congress has offered undergraduate and graduate students from across the country the opportunity to work on projects focused on expanding access to and use of the Library’s collections. As a result of the COVID-19 pandemic, the Junior Fellows program continued to be entirely virtual in 2021. The Digital Content […]

Intrusion Prevention Systems: 1

Vulnerability assessment, the use of cyber intelligence feeds, attack surface management and other processes are all used to prevent threats from becoming security breaches. Organizations have also turned to solutions that detect and prevent cyberattacks by monitoring early indicators of attack in network traffic. After all, nearly all types of cyber threats use network communications […]

“FudCo” Spam Empire Tied to Pa

In May 2015, KrebsOnSecurity briefly profiled “The Manipulaters,” the name chosen by a prolific cybercrime group based in Pakistan that was very publicly selling spam tools and a range of services for crafting, hosting and deploying malicious email. Six years later, a review of the social media postings from this group shows they are prospering, […]

Gift Card Gang Extracts Cash F1

Some of the most successful and lucrative online scams employ a “low-and-slow” approach — avoiding detection or interference from researchers and law enforcement agencies by stealing small bits of cash from many people over an extended period. Here’s the story of a cybercrime group that compromises up to 100,000 email inboxes per day, and apparently […]

Cloud Printing For Libraries

Cloud services are a commonly used resource in most people’s daily life. Whether it is with iCloud, Google Drive, or other mobile or web applications, people are using cloud services.  This is no different at an organizational level, many organizations are using cloud services to improve their user’s experience and improve internal business processes. Though […]

15-Year-Old Malware Proxy Netw1

Over the past 15 years, a cybercrime anonymity service known as VIP72 has enabled countless fraudsters to mask their true location online by routing their traffic through millions of malware-infected systems. But roughly two weeks ago, VIP72’s online storefront — which ironically enough has remained at the same U.S.-based Internet address for more than a […]

Review With Us: By the People 1

Today’s guest post is from Caitlin Haynes, the Program Coordinator for the Smithsonian Transcription Center in Washington, D.C. You can read Caitlin’s original post from the Smithsonian here.* During the month of August 2021, we teamed up with the community managers and volunteers at By the People, the Library of Congress’s crowdsourced transcription program, to focus […]