article thumbnail

RIM Month Virtual Colloquium, date and lineup announcement for April 7th 1-3pm EST!

The Schedule

Surveying and Collecting Electronic Records. A case study in creating a Getty retention compliant electronic file naming system for Procurement. Hillary Gatlin, Duke University. Jennifer Thompson, J. Paul Getty Trust. Clean up, collaborate, and comply – without realizing it!

article thumbnail

CyberheistNews Vol 13 #22 [Eye on Fraud] A Closer Look at the Massive 72% Spike in Financial Phishing Attacks

KnowBe4

It also includes a summary of indicators of compromise (IOCs), such as unique command-line strings, hashes, file paths, exploitation of certain vulnerabilities, and file names commonly used by this actor. With this in mind, scammers could strategically buy.zip and.mov URLs that are also common file names—think, springbreak23.mov—so