{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
TikTok makes it harder for users to stumble on a wide-ranging conspiracy. Garmin customers using the app outage as an excuse to avoid workouts are out of luck. And CISA confirms hackers have breached federal and private organizations using a recent software bug. This is CyberScoop for Monday, July 27.

TikTok dumps QAnon channels amid new scrutiny

TikTok has removed a number of hashtags associated with the far-right conspiracy theory group, limiting the spread of the group that the FBI has described as a domestic terrorism threat. The company has made it more difficult for users to search for popular hashtags, reportedly including “QAnon” and “QAnonTruth,” among others, following a similar announcement from Twitter that it would remove 7,000 accounts and limit 150,000 more. Facebook, meanwhile, <a href="https://twitter.com/Shayan86/status/1286674613129416705">remains the group's main hub</a> of activity. Jeff Stone has the story.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Garmin starts showing signs of life

Garmin users are out of excuses to not exercise again now that the athletic company's app appears to be back online following a reported ransomware attack. Workout devices are starting to sync with the mobile app again, though a range of programs still say they only have "limited" connectivity. Advanced features, like connecting to Strava or dietary apps, still are experiencing delays, too. The update comes after Kansas-based Garmin reportedly was hit with an attack resembling previous scams originating with Russian cybercriminals. The company has stayed mostly silent since the down time began. Here's the background.

An (F)5-alarm fire

In an illustration of the race between hackers and network defenders to understand a new vulnerability, DHS’s Cybersecurity and Infrastructure Security Agency said that attackers had used a bug in popular F5 Networks software to breach federal and commercial networks. The vulnerability is a doozy: A 10 out of 10 on the criticality scale, it allows hackers to steal files or disable IT services on a network. The hacking will continue, CISA said. Patch now or get rekt later, as the logic goes. Sean Lyngaas has more.

A shot across Twilio’s bow

The cloud communications service Twilio left some of its custom software code unsecured online, but the hackers who seized on it did little more than run an automated attack, the company says. Experts tell CyberScoop there could have been targeted phishing and attacks on customers; a reminder of the risks of misconfiguring the cloud services that store corporate code. Such Magecart-style attacks have done millions of dollars of damage elsewhere. Just ask British Airways. Sean has the post-mortem.

One ransomware strike results in more than 20 incidents

After ransomware attackers struck an American company that sells software for fundraising and education administration, many of the firm's clients have started experiencing issues of their own, the BBC reports. Blackbaud, which reportedly paid a digital extortion fee in May, hasn't disclosed the breadth of the incident, though it looks like hackers used data stolen from Blackbaud to target universities and charities in the U.S. and U.K. Now British security officials are trying to find out exactly what happened. Here's the news.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}