Remove 2017 Remove Document Remove Government Remove Presentation Remove Security
article thumbnail

e-Records 2017: “Establishing Information Governance for Local Governments in Microsoft SharePoint and Office 365”

The Texas Record

This is the fourth post of a multi-part recap of the 2017 e-Records Conference. Presentation materials from the conference are available on the e-Records 2017 website. Information Governance: Take Control and Succeed. Establishing Information Governance for Local Governments in Microsoft SharePoint and Office 365.

article thumbnail

China-linked APT Sharp Panda targets government entities in Southeast Asia

Security Affairs

China-linked APT group Sharp Panda targets high-profile government entities in Southeast Asia with the Soul modular framework. CheckPoint researchers observed in late 2022, a campaign attributed to the China-linked APT group Sharp Panda that is targeting a high-profile government entity in the Southeast Asia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA warns of phishing attacks delivering KONNI RAT

Security Affairs

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert related to attacks delivering the KONNI remote access Trojan (RAT). The Cybersecurity and Infrastructure Security Agency (CISA) has published an alert to provide technical details on a new wave of attacks delivering the KONNI remote access Trojan (RAT).

Phishing 127
article thumbnail

Crooked Cops, Stolen Laptops & the Ghost of UGNazi

Krebs on Security

A California man accused of failing to pay taxes on tens of millions of dollars allegedly earned from cybercrime also paid local police officers hundreds of thousands of dollars to help him extort, intimidate and silence rivals and former business partners, the government alleges. cryptocurrency holdings online. attorney general.

article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

As more information about IoT device vulnerabilities is published, the pressure on industry and government authorities to enhance security standards might be reaching a tipping point. While it’s a progressive step for the network security of the U.S. government, standards will not apply to the IoT market at-large.

IoT 145
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. It’s a surreal experience, paging through hundreds of top-secret NSA documents. I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades.

article thumbnail

Threat actors target the Ukrainian gov with IcedID malware

Security Affairs

Threat actors are targeting Ukrainian government agencies with phishing attacks delivering the IcedID malware. The Ukrainian Computer Emergency Response Team (CERT-UA) uncovered new phishing campaigns aimed at infecting systems of Ukrainian government agencies with the IcedID malware. To nominate, please visit:? Pierluigi Paganini.