Remove Analysis Remove Computer and Electronics Remove Document Remove Government
article thumbnail

Croatia government agencies targeted with news SilentTrinity malware

Security Affairs

Croatia government agencies have been targeted by unknown hackers with a new piece of malware tracked as SilentTrinity. A mysterious group of hackers carried out a series of cyber attacks against Croatian government agencies, infecting employees with a new piece of malware tracked as SilentTrinity. ” reads one of the alerts.

article thumbnail

GDPR and The Data Governance Imperative

AIIM

GDPR and the Data Governance Imperative. The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information. The Information Governance Imperative.

GDPR 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Microsoft Powerpoint as Malware Dropper

Security Affairs

Nowadays Microsoft office documents are often used to propagate Malware acting like dynamic droppers. The “attack-path” is very close to what it’s observable on modern threats since years: eMail campaign with an attached document and actionable text on it. The final payload looks like AzoRult Malware.

article thumbnail

Is Emotet gang targeting companies with external SOC?

Security Affairs

Today I’d like to share a quick analysis resulted by a very interesting email which claimed to deliver a SOC “weekly report” on the victim email. Technical Analysis. The attached document is a well obfuscated Microsoft Word document which asks to enable macros in order to view its content. SOC report 10 12 2019.doc

article thumbnail

Ukraine police and Binance dismantled a cyber gang behind $42M money laundering

Security Affairs

Police conducted searches of the suspects’ residences and offices and seized more than $ 200,000 worth of computer equipment, weapons, ammunition and cash. Binance also partnered with TRM Labs, a blockchain analysis firm that focuses on fraud detection. “According to this fact, a criminal case under Part 2 of Art.

article thumbnail

Privacy and Innovation Combined in Information Governance

Everteam

The late 20 th century technological revolution in the US gave birth to the internet and personal computer, paving a path for 21 st century innovation in personal devices, apps, and social media – with Silicon Valley giants leading the way towards a more connected future.

article thumbnail

Step By Step Office Dropper Dissection

Security Affairs

While I was thinking about how to answer to such questions I received a MalSpam with a Microsoft Office document attached by sheer coincidence, so I decided to write a little bit on it. Attached to a nice crafted MalSpam email hitting my inbox a malicious Office Document having a pretty neat “autoopen()” Macro. Traffic Patterns Stage3.