article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Static Analysis x Dynamic Analysis.

Libraries 103
article thumbnail

A flaw in the R programming language could allow code execution

Security Affairs

Since then, it has gained popularity among statisticians and data miners for its powerful features and extensive libraries for data manipulation, visualization, and statistical analysis. ” reads the analysis published by HiddenLayer. ” continues the analysis.

Metadata 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Do I Need a Data Catalog?

erwin

The data catalog is a searchable asset that enables all data – including even formerly siloed tribal knowledge – to be cataloged and more quickly exposed to users for analysis. Three Types of Metadata in a Data Catalog. The metadata provides information about the asset that makes it easier to locate, understand and evaluate.

Metadata 132
article thumbnail

Multiple malicious packages in PyPI repository found stealing AWS secrets

Security Affairs

The malicious packages, which were reported to PyPI, are: loglib-modules — appears to target developers familiar with the legitimate ‘loglib’ library. pyg-modules — appears to target developers familiar with the legitimate ‘pyg’ library. ” continues the analysis. com:8000/upload. another.

article thumbnail

Success of AI in academic libraries depends on underlying data

CILIP

Success of AI in academic libraries depends on good underlying data. nder, scientific information specialist: Success of AI in academic libraries depends on good underlying data. Why do we hear so little in this respect from libraries on this side of the Atlantic? In what way have the working methods in libraries changed?

article thumbnail

Russia-linked APT29 abuses EU information exchange systems in recent attacks

Security Affairs

The HTLM files are hosted on a legitimate online library website that was likely compromised by the threat actors sometime between the end of January 2023 and the beginning of February 2023. ” reads the analysis published by BlackBerry. ” concludes the report.

article thumbnail

Five benefits of a data catalog

IBM Big Data Hub

Imagine walking into the largest library you’ve ever seen. Fortunately, the library has a computer at the front desk you can use to search its entire inventory by title, author, genre, and more. It uses metadata and data management tools to organize all data assets within your organization. Thankfully, a data catalog can help.