{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
Does a 5-year-old mystery hold some answers for the SolarWinds case? Inauthentic social media accounts aren't just for trolls. And gamers, beware: Supply-chain attacks can affect you, too. This is CyberScoop for Monday, Feb. 1, 2021.

SolarWinds breathes life into Juniper cold case

Remember the Juniper breach? It’s been five years since the networking giant revealed that someone had slipped malicious code into the firewalls it sells to the federal government. Very little insight into who carried out the hack and what it accomplished has come to light since. Now, a group of U.S. lawmakers are demanding answers from the NSA on the role of an agency-backed algorithm in the incident. Sean Lyngaas has a deep dive.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Pro-Huawei influence campaign targets Belgium

A pro-Huawei network of inauthentic Twitter accounts began a campaign last month railing against Belgium’s recent decision to limit 5G technology vendors it deems “high-risk,” according to Graphika research published Friday. The pro-Huawei network, whose posts were shared on multiple occasions by Huawei executives, sought to cloak its activities by using fake, computer-generated profile pictures through an artificial intelligence technique known as Generative Adversarial Networks (GAN). On at least two occasions the network also shared articles that Huawei had sponsored. Graphika said it did not have enough evidence to attribute the campaign definitively. Shannon Vavra has the story.

'Highly targeted' espionage on gamers

The latest news of a software supply-chain attack involves a company that makes a tool for gamers. Researchers at ESET say they've identified a "highly targeted" malware campaign that allows for the perpetrators to spy on users of NoxPlayer, which allows Android games to be played on PCs or Macs. The malware arrives via updates pushed out by BigNox, which makes the emulator software. ESET says the operation appears to be fixated on espionage and not broad data breaches or destructive attacks. NoxPlayer has about 150 million users, most of them in Asia. Joe Warminsky explains.

DARPA hardware bounty program yields just 10 bugs

DARPA, the Pentagon’s R&D arm, last week revealed the results of a novel, three-month bug bounty program focused on hardware. The researchers found just 10 valid vulnerabilities, seven of which were deemed critical. That points to the defensive strengths of the DARPA-backed hardware, said program manager Keith Rebello. Most of those bugs were in weaknesses between how the hardware, firmware and operating software interacted. There’s more to be learned in the field. The white-hat hackers from Synack who participated tested “novel prototype systems that have never been tested before,” said Synack’s Mark Kuhr. More from DARPA.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}