article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

ESET researchers discovered a new piece of malware dubbed CDRThief targets a specific Voice over IP system to steal call data records (CDR). “The primary goal of the malware is to exfiltrate various private data from a compromised softswitch, including call detail records (CDR). ” reads the analysis published by ESET.

Metadata 124
article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

ESET researchers discovered a new piece of malware dubbed CDRThief targets a specific Voice over IP system to steal call data records (CDR). “The primary goal of the malware is to exfiltrate various private data from a compromised softswitch, including call detail records (CDR). ” reads the analysis published by ESET.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Takeaways from the NARA Digitizing Permanent Records Webinar

National Archives Records Express

Technical attributes, such as resolution, color depth, and file formats, must meet the technical standards in the regulation and the specific needs of the records. Metadata and Documentation Accurate and comprehensive metadata is crucial for the successful management and retrieval of digitized records.

article thumbnail

Announcing PSIsafe 12 with Advanced Indexing & Search Functionality

Info Source

Advanced search works based on document-level indexing: capturing all document information contained in its metadata, also called index data. This index data includes keywords, numbers and dates, and is either captured automatically with advanced capture software like PSIcapture or is manually entered.

article thumbnail

A flaw in the Packagist PHP repository could have allowed supply chain attacks

Security Affairs

reads the post published by SonarSource in April 2021, “A vulnerability in such a central component, serving more than 100M package metadata requests per month, has a huge impact as this access could have been used to steal maintainers’ credentials or to redirect package downloads to third-party servers delivering backdoored dependencies.”.

article thumbnail

SolarWinds Attack: Microsoft sheds lights into Solorigate second-stage activation

Security Affairs

Microsoft experts analyzed forensic data across the entire environment of impacted organizations to discover how the attackers made lateral movements and how long they remaining within their target networks. The experts conducted a deep analysis of data collected by Microsoft 365 Defender data and Microsoft Defender telemetry.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Threat intelligence feeds are continually updated streams of data that inform users of different cybersecurity threats, their sources, and any infrastructure impacted or at risk of being impacted by those threats. infrastructure, making it a less effective option for global enterprises and distributed workforces abuse.ch Free trial available.