{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
U.S. officials went public with technical data apparently used by North Korean hackers as part of an effort to protect American companies. Twitter will include warnings on some coronavirus tweets. And it looks like India is going on offense. This is CyberScoop for Tuesday, May 12.

Rebuking Pyongyang (again)

The FBI, DHS and Department of Defense jointly exposed North Korean government-backed hacking this morning, in the latest instance of the government trying to highlight work of the "Hidden Cobra" hacking group. Threat data meant to help companies fend off hackers was shared with the private sector in malware analysis reports in an effort to boost cyber-defenses in critical infrastructure sectors. “Publicly disclosing malicious cyber activity imposes costs on countries who actively and illegally work against U.S. interests and our partners,” a Cyber Command spokesperson told CyberScoop. Shannon Vavra had the story first.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Twitter to flag false coronavirus tweets

Tweets containing false information about COVID-19 will now include a label or warning that the message contradicts messaging from public health experts, the company said. It's the company's latest effort to slow disinformation around the pandemic. Depending on the severity of the erroneous information, tweets will be accompanied by a link encouraging readers to “Get the facts about COVID-19.” More obvious examples of wrong information will be hidden entirely behind a note saying “Some or all of the content shared in this Tweet conflicts with guidance from public health experts regarding COVID-19.” Jeff Stone puts it into context.

Meet "Monsoon"

A group of suspected Indian hackers has spent the last four months conducting spearphishing attacks against military and government organizations in South Asia, researchers from Palo Alto Networks said. The hackers, known as Monsoon or the Hangover group, have infiltrated websites in Pakistan, Bangladesh, and Maldives to use them in the attacks. Intriguingly, Monsoon’s breach of a shipping agency’s website in Maldives was detected just days before a new president was sworn in there. It’s a reminder that while government-backed hackers from Russia, North Korea, and China may hog the limelight, there is plenty of ongoing activity from aspiring cyber powers. Here's the full report.

Texas courts offline amid ransomware attack

The Texas Office of Court Administration, which provides IT services for state appellate and other judicial agencies, discovered a ransomware attack just hours after the system was targeted, director David Slayton said. Exactly which type of ransomware struck the judicial servers remains unclear, though Slayton said the ransomware was "caught," and that the state would not pay an extortion fee. There’s no indication that any personal or sensitive information was compromised during the attack, though some court websites and servers have been taken offline while the incident is investigated with help from law enforcement. Ryan Johnston has the StateScoop report.

Zoom is courting government attention

Zoom added to its government-relations leadership and acquired an encryption company last week as part of an effort to address cybersecurity issues that have caught the attention of federal agencies and lawmakers. The video communications announced it added retired Lt. Gen. H.R. McMaster, who resigned as President Trump’s national security adviser in 2018, to its board of directors Thursday. Josh Kallmer, former executive vice president of policy at the Information Technology Industry Council, will head up government relations starting May 26. This comes as Zoom has faced occasional roadblocks in the federal government as agencies greatly increased their use of teleworking tools. Dave Nyczepir dug in at FedScoop.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}