Skip to main content

Trending In Library Management

Indictment, Lawsuits Revive Tr1

In October 2016, media outlets reported that data collected by some of the world’s most renowned cybersecurity experts had identified frequent and unexplained communications between an email server used by the Trump Organization and Alfa Bank, one of Russia’s largest financial institutions. Those publications set off speculation about a possible secret back-channel of communications, as […]

Aquatic Routes Of Knowledge

Libraries bring knowledge to their communities. However, sometimes this cannot be done on land. That’s when librarians, and libraries, get on a boat in order to bring books, entertainment and knowledge to these people. Recurring guest writer, Edgardo Civallero, shares some Latin American initiatives, past and current, that aim to bring libraries to their communities […]

Security Information and Event1

While there may be talk about SIEM joining the line of legacy technologies that are proclaimed “dead”, SIEM has been a core system for many security teams, and in different capacities. Furthermore, SIEM (along with its evolution) has been intertwined with relevant threats in the ecosystem as well as the market in which it is […]

The September 11, 2001 Web Arc1

Today’s guest post is from Tracee Haupt, a Digital Collection Specialist in the Digital Content Management section at the Library of Congress. On the twentieth anniversary of the September 11th terrorist attacks, I asked four individuals who were part of the creation of the September 11, 2001 Web Archive to reflect on their experience documenting […]

nmapAutomator: Automating your1

And understandably so; cybersecurity continues to receive significant attention on all fronts, from secretive accounts of cyber espionage to the now rather ubiquitous corporate breach scenarios pressuring organizations across the globe. Better security comes at a price too, and in the absence of significant security measures anti-patterns quickly evolve to give miscreants ample targets of […]

Does Your Organization Have a 1

It happens all the time: Organizations get hacked because there isn’t an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe it isn’t entirely clear who should get the report when remote access to an organization’s internal network is being sold in the cybercrime underground. In a […]

Trial Ends in Guilty Verdict f1

A jury in California today reached a guilty verdict in the trial of Matthew Gatrel, a St. Charles, Ill. man charged in 2018 with operating two online services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against Internet users and websites. Gatrel’s conviction comes roughly two weeks after his co-conspirator pleaded guilty […]

Reading the (Same) Signals: Us1

This is the second in a series of updates from the Federal Agencies Digital Guidelines Initiative (FADGI) Audio-Visual working group. See That’s Our Cue! Updates for the FADGI Embedded Metadata Guidelines and BWF MetaEdit for the Cue Chunk in Broadcast Wave Files for the first installment. This post is co-authored by Kate Murray, Digital Projects […]

Dungeons And Dragons In The Li1

Dungeons and Dragons is in its renaissance right now. The rising popularity of shows like Critical Role, Dimension20 or Not Another DND Podcast, brings new players to the world’s most popular role playing game. But is this trend something your library should capitalize on and introduce the game to its community? In this week’s post […]

Customer Care Giant TTEC Hit B1

TTEC, [NASDAQ: TTEC], a company used by some of the world’s largest brands to help manage customer support and sales online and over the phone, is dealing with disruptions from a network security incident resulting from a ransomware attack, KrebsOnSecurity has learned. While many companies have been laying off or furloughing workers in response to […]

Microsoft Patch Tuesday, Septe1

Microsoft today pushed software updates to plug dozens of security holes in Windows and related products, including a vulnerability that is already being exploited in active attacks. Also, Apple has issued an emergency update to fix a flaw that’s reportedly been abused to install spyware on iOS products, and Google‘s got a new version of […]

The 10 Largest Data Breaches a1

With so much exposure to this kind of news, we can become desensitized to the numbers involved in these situations, but it’s important to understand how dangerous and wide-reaching they can be. We’ve put together a list of the largest data breaches involving attackers infiltrating some of the largest companies’ networks, and the misfortunate data […]

Stanford Libraries welcomes Ka1

It is my delight to share the news that Kabir Hermon is joining the staff of Digital Library Systems and Services as our new Audio Digitization Specialist. Kabir’s first day will be Monday, September 20, and he will be working alongside Geoff Willard and Michael Angeletti at our media preservation facilities on the Stanford Redwood […]

KrebsOnSecurity Hit By Huge Ne1

On Thursday evening, KrebsOnSecurity was the subject of a rather massive (and mercifully brief) distributed denial-of-service (DDoS) attack. The assault came from “Meris,” the same new botnet behind record-shattering attacks against Russian search giant Yandex this week and internet infrastructure firm Cloudflare earlier this summer. Cloudflare recently wrote about its attack, which clocked in at […]

That’s Our Cue! Updates for th

This is guest post, the first in a series of updates about the recent work of the Federal Agencies Digital Guidelines Initiative (FADGI) Audio-Visual working group, is co-authored by Kate Murray, Digital Projects Coordinator in Digital Collections Management and Services, audiovisual archivist and technologist Dave Rice, and Jérôme Martinez, Founder and President of MediaArea.net. Fig. […]

5 Reasons Why Libraries Are Es1

Nowadays, we are extremely dependent on the internet for information in our daily lives. However, does that information always bring us the right answers? As you might know, search engines such as Google tend to provide us with information depending on our formulated questions or keywords, therefore the data we get is not always relevant. […]

Microsoft: Attackers Exploitin1

Microsoft Corp. warns that attackers are exploiting a previously unknown vulnerability in Windows 10 and many Windows Server versions to seize control over PCs when users open a malicious document or visit a booby-trapped website. There is currently no official patch for the flaw, but Microsoft has released recommendations for mitigating the threat. According to […]

Supporting the Acquisition of 1

For thirty years the Library of Congress has offered undergraduate and graduate students from across the country the opportunity to work on projects focused on expanding access to and use of the Library’s collections. As a result of the COVID-19 pandemic, the Junior Fellows program continued to be entirely virtual in 2021. The Digital Content […]

Intrusion Prevention Systems: 1

Vulnerability assessment, the use of cyber intelligence feeds, attack surface management and other processes are all used to prevent threats from becoming security breaches. Organizations have also turned to solutions that detect and prevent cyberattacks by monitoring early indicators of attack in network traffic. After all, nearly all types of cyber threats use network communications […]

“FudCo” Spam Empire Tied to Pa

In May 2015, KrebsOnSecurity briefly profiled “The Manipulaters,” the name chosen by a prolific cybercrime group based in Pakistan that was very publicly selling spam tools and a range of services for crafting, hosting and deploying malicious email. Six years later, a review of the social media postings from this group shows they are prospering, […]