article thumbnail

Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs

Security Affairs

The Turla APT group (aka Snake , Uroburos , Waterbug , Venomous Bear and KRYPTON ) has been active since at least 2004 targeting diplomatic and government organizations and private businesses in the Middle East, Asia, Europe, North and South America, and former Soviet bloc nations.

CMS 106
article thumbnail

Tips for Folder Structure Design and Cleanup

The Texas Record

Consistency Choose file naming conventions and stick with them. For example, unless an abbreviation is known and widely used, avoid using it in folder or file names. A consistent approach with folder structure and file naming means there is less need for individual interpretation. Be consistent.

Cleanup 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lilith: The Latest Threat in Ransomware

eSecurity Planet

According to Cyble, “The ransomware searches for files to encrypt on the local system by enumerating the file directories […] It ignores the file extensions such as EXE, DLL, and SYS and excludes a list of directory and file names from the encryption process.”.

article thumbnail

RIM Month Virtual Colloquium, date and lineup announcement for April 7th 1-3pm EST!

The Schedule

Mark your calendars for April 7th, 2021 1pm-3pm EST. Outline of Event: 7 wonderful presenters working in records management, with 7 minute lightning round presentations (see below!). A case study in creating a Getty retention compliant electronic file naming system for Procurement. Jennifer Thompson, J. Paul Getty Trust.

article thumbnail

Guarding Against Solorigate TTPs

eSecurity Planet

A March 2020 software update of the SolarWinds Orion management platform gave malicious actors unhindered access to key government and enterprise networks. Before jumping into the technical details regarding each new malware detected and proper safeguards, here is a brief look at the events to date: Sep 2019.

article thumbnail

Creating Records At Home, Part III: Various Devices

The Texas Record

Records created and stored outside the business network are in contravention of the government records accessibility requirement —this negatively affects that government’s ability to perform regular business operations efficiently. What is the risk? Create a safe communication channel with the employee.

article thumbnail

APT34: Glimpse project

Security Affairs

The group conducts operations primarily in the Middle East, targeting financial, government, energy, chemical, telecommunications and other industries. Repeated targeting of Middle Eastern financial, energy and government organisations leads FireEye to assess that those sectors are a primary concern of APT34. Source: MISP Project ).