article thumbnail

Outlaw is Back, a New Crypto-Botnet Targets European Organizations

Security Affairs

Shellbot is known since 2005 and even available on GitHub. Now, Shellbot has re-appeared in the threat landscape in a recent campaign, targeting organizations worldwide with a new IRC server and new Monero pools, so we decided to deepen the analysis. Technical Analysis. The first folder to analyze is “a”.

Mining 100
article thumbnail

This is the old ChiefTech blog.: Just for fun - a SNA map in Many Eyes of my blog

ChiefTech

How does you blog neighborhood compare to mine? Technorati tags: SNA , Many Eyes , ChiefTech Blog , Social Network Analysis , Google at 11:42 AM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment. What other patterns can you see?

Mining 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This is the old ChiefTech blog.: SNA Map of my blog - second edition

ChiefTech

Monday, 9 April 2007 SNA Map of my blog - second edition My blog social network analysis (SNA) map (really an egonet map ) from a few days ago was ok, but I wasnt completely satisfied. Your blogroll includes a lot of same names as mine. Please seek advice for specific circumstances.

Mining 40
article thumbnail

Interview with Gus Tugendhat of Tussell

Information Matters

Since 2005 we’ve grown organically to a team of 9 people with a fairly even split between product and tech and those working in marketing and sales. The market already has lots of tender portals but nobody has taken the tenders and contracts and turned them into an intelligent database which can be mined efficiently.

Sales 40
article thumbnail

This is the old ChiefTech blog.: 100 people wanted, to lose 100MB of email in 6 weeks

ChiefTech

If we go back to my own take on email information overload, summarised in a short article I wrote in 2005 (PDF, 81KB), I concluded then that: " There are no quick fixes for dealing with e-mail overload. James, I very much agree with the summary comment from your 2005 paper on email. Pipes for the possibilities). 9:38 AM RGH said.

article thumbnail

Capital One Data Theft Impacts 106M People

Krebs on Security

“The largest category of information accessed was information on consumers and small businesses as of the time they applied for one of our credit card products from 2005 through early 2019,” the statement continues. “While I am grateful that the perpetrator has been caught, I am deeply sorry for what has happened.