article thumbnail

CERT-UA warns of cyber espionage against the Ukrainian defense industry using Dark Crystal RAT

Security Affairs

The Computer Emergency Response Team of Ukraine (CERT-UA) uncovered a new cyber espionage campaign targeting employees of defense-industrial complex enterprises and representatives of the Defense Forces of Ukraine with Dark Crystal RAT. In March 2025, threat actors distributed archived messages through Signal.

article thumbnail

What are the Drivers of Electronic Records Management (ERM)?

AIIM

Virtually all new records are created electronically today – they are what we call “born digital.” Whether a record is in the format of a letter, an email, fax, a web, or other transaction, the chances are today that it originally was created with one or more computers. and that means keeping electronic records, as just explained.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Happens to Electronic Records in the Archives?

The Texas Record

The Archives and information services division at the Texas State Library and Archives Commission (TSLAC) has a sophisticated electronic records processes. Many agencies who submit their records to the Archives, may not know how their records are incorporated into TSLAC’s archival inventory. doc to.pdf).

Archiving 116
article thumbnail

Mysterious custom malware used to steal 1.2TB of data from million PCs

Security Affairs

million files and 26 million credentials, 11 million unique email addresses, and 2 billion web login cookies, researchers pointed out that 22% of the web login cookies were still valid at the time of the discovery of the archive. million computers. Experts found over 650,000 Word documents and.pdf files in the archive.

article thumbnail

Ex CIA employee Joshua Adam Schulte sentenced to 40 years in prison

Security Affairs

Furman for crimes of espionage, computer hacking, contempt of Court, making false statements to the FBI, and child pornography.” The archive includes confidential information, malicious codes, and exploits specifically designed to target popular products from various IT companies, including Samsung, Apple, Google, and Microsoft.

article thumbnail

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. The vulnerability is not part of the applications themselves but of the underlying Electron framework -- ­and that vulnerability allows malicious activities to be hidden within processes that appear to be benign.

article thumbnail

Croatia government agencies targeted with news SilentTrinity malware

Security Affairs

The SilentTrinity malware can take control over an infected computer, it allows attackers to execute arbitrary commands. The archive contents are extracted, without being saved to disk. Between February and April, allegedly state-sponsored hackers have launched a spear-phishing campaign against government agencies. .