{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
A texting and communications platform popular with political campaigns and action committees suffered a breach. The Treasury Department acts against a cryptocurrency mixer. And a Twitter hack exposes pseudonymous accounts. This is CyberScoop for Aug. 8.

Hackers breach popular texting platform Twilio

Twilio, a communications software popular with political campaigns, disclosed a breach that affected a “limited number” of customers. The company said in a blog post Sunday that it’s still in the early stages of its investigation. Twilio says it became aware of the hack on Aug. 4 and has reached out to its customers and is working with the ones affected by the incident. The company has more than 150,000 customers, including political campaigns and government agencies. The company’s platform is used to automate phone calls, text messages and other communications to customers or voters in the case of political organizations. Tonya Riley has it.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Treasury sanctions crypto mixer

The Treasury Department’s Office of Foreign Assets Control sanctioned virtual currency mixer Tornado Cash, it announced Monday. The mixer, which combines various types of crypto assets to mask their origin, has gained notoriety as the money laundering tool of choice for the Lazarus Group, a group of state-sponsored North Korean hackers responsible for a series of massive cryptocurrency heists. Tornado Cash has been used to launder more than $7 billion worth of virtual currency since 2019, including more than $455 million stolen by the Lazarus Group, according to Treasury. Tonya reports.

Twitter breach exposes pseudonymous accounts

Twitter confirmed Friday that a bad actor used a vulnerability to match private information with potentially anonymous Twitter accounts, posing risks to users privacy. The vulnerability allowed someone to match an email or phone number to any Twitter accounts tied to that information and the name of the accounts, Twitter wrote in a press blog. “We can confirm the impact was global,” a Twitter spokesperson said in an email. “We cannot determine exactly how many accounts were impacted or the location of the account holders.” Tonya covers this one, too (she is on fire!).


New guidance on zero trust details more prescriptive implementation practices

The ZTA practice guide, recently released by the National Cybersecurity Center of Excellence, signals a turning point for organizations implementing zero trust. Okta’s Federal CSO, Sean Frazier shares his perspective on the impact this guidance will have among federal agencies and the key ways IT leaders can approach identity as both a holistic security strategy and a means to improve digital experiences for citizens. Watch the full interview with Frazier.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}