{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
The FCC wants to update data breach reporting rules for the telecom sector. The White House brings everybody together to talk about the security of open source technology. And Cyber Command connects a couple of dots. This is CyberScoop for January 13.

FCC plans to update data breach laws

A proposed Federal Communications Commission rule change would eliminate the seven-business-day waiting period required of telecom carriers before notifying customers of a breach. The proposal also would require carriers to report breaches to the FCC in addition to the FBI and U.S. Secret Service. The telecom regulator wants to “align the Commission’s rules with recent developments in federal and state data breach laws covering other sectors,” according to a news release. Tonya Riley has the latest.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

White House dives into open-source software security

The White House is hosting a meeting Thursday with tech companies and federal agencies focused on open-source software security, in light of the widespread Log4j flaw. Attendees were set to include Amazon, Apple, Facebook and Google, as well as the Apache Software Foundation, which builds Log4j. “At this meeting, together we will discuss existing efforts to address it, what has worked and what else can be done to secure the open source software that we all fundamentally rely on," a senior administration official said in advance. Log4j is a popular open-source logging library and the vulnerability uncovered last month could affect hundreds of millions of devices, CISA has warned. Tim Starks tees it up.

Cyber Command posts alleged Iranian malware samples

U.S. Cyber Command posted more than a dozen samples of malware Wednesday that the agency says are linked to Iranian military cyber activity. The goal is to help network administrators know whether they'd been targeted with the malware from a group known commonly as MuddyWater, Cyber Command said. The release was significant in that along with the samples came clear attribution from the U.S. government that MuddyWater was, in fact, Iranian. Although long-suspected in the information security community, Wednesday's confirmation is the first time the link has been made by the U.S. government itself. AJ Vicens reports.

Ukrainian police break up ransomware gang

Ukrainian authorities announced Thursday the arrest of a man, his wife, and three others suspected of running a ransomware operation that targeted more than 50 companies across Europe and the U.S. The gang also allegedly ran a VPN service for other criminals that not only shielded their IP addresses, but also served as a platform for obtaining computer viruses, spyware and other malicious software. The arrests were part of a joint operation involving authorities from the U.S. and the U.K., the Ukrainians said. It's just the latest example of cross-government law enforcement activity targeting ransomware actors. AJ has this one, too.

It was ransomware indeed, Md. agency says

A cyberattack that brought down the Maryland Department of Health’s website last month was a ransomware incident, the agency confirmed Wednesday. The attack, first detected Dec. 4, affected the department’s ability to publish COVID-19 statistics and share data with local health agencies. The state’s CISO, Chip Stewart, said Wednesday the outages were part of a mitigation strategy designed to isolate affected systems from other state networks. StateScoop's Benjamin Freed reports.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}