{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
Cyber crooks advance on the Microsoft Exchange Server bugs. GitHub removes a PoC exploit. And hackers cross a red line. This is CyberScoop for March 12, 2021.

Crooks join Exchange Server melee

Botnet operators and a ransomware actor are among the opportunists trying to take advantage of vulnerable Exchange Servers around the world, researchers have warned. Microsoft said it found a new ransomware family, dubbed DearCry, targeting organizations with vulnerable Exchange Server software, while Check Point said the rate of exploitation attempts by attackers of all stripes was skyrocketing. Sean Lyngaas has the story.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

The new race against ransomware

Analysts are warning that in the fallout of the Microsoft Exchange Server flaws, compromised organizations can expect a ransomware outbreak. With such a large list of victims and so many attackers trying to leverage the flaws, there is little hope for cybersecurity professionals and affected entities to keep up with the sheer volume of exploits and attackers pummeling them, analysts say. So some are taking matters into their own hands, like Allison Nixon, the chief research officer at cybersecurity consulting firm Unit 221B, who set up a website meant to notify victims. Shannon Vavra breaks it down.

GitHub removes Exchange PoC exploit

Microsoft-owned GitHub has removed a proof-of-concept exploit of the Exchange Server bugs, stirring debate over when researchers should refrain from releasing software exploits. It’s an unusually sensitive situation, with mass exploitation of the vulnerabilities underway, and it won’t be the last brouhaha between offensive security researchers and network defenders. Sean has more.

Beer should be off limits

Molson Coors said in a regulatory filing on Thursday that a cyber incident had affected beer production, and might continue to do so. The company said in a Securities and Exchange Commission disclosure that it had contacted forensic IT firms and legal counsel and would stay in touch with business partners with updates, but otherwise was vague about details of the attack. Tim Starks dives in.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}