{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
The Justice Department pursues espionage charges against an ex-NSA employee for allegedly trying to sell cyber secrets. An unhappy member of the REvil ransomware gang tells all. And the VA launches a major internal cyber investigation. This is CyberScoop for Sept. 30.

Ex-NSA employee faces Espionage Act charges

A former National Security Agency employee appeared in federal court Thursday on charges that he attempted to transmit classified “national defense information” to an FBI agent he believed was a Russian operative in exchange for $85,000, according to the Justice Department. The former employee, Jareh Sebastian Dalke, allegedly told the undercover agent that he had access to information “relating to foreign targeting of U.S. systems and information on cyber operations,” according to the affidavit.   Suzanne Smalley has the story.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

REvil insider spilled tea

In the fall of 2019, after writing about how Sodinokibi ransomware affiliates bragged online about the money they were making, threat intelligence researchers with McAfee Advanced Threat Research received an email from what turned out to be a “disgruntled internal source” upset with how other hackers boasted about earnings while they hadn’t been paid. The insider went on to help researchers understand the inner workings of the group that became known as REvil, whose antics and crimes made headlines after attacking beef producer JBS, and the information was turned over to international law enforcement. AJ Vicens reports.

The VA investigates source code breach

The Department of Veterans Affairs is conducting a breach investigation after a federal contractor published source code containing sensitive credentials on internet hosting service GitHub, sources told FedScoop. Three people with direct knowledge of the matter told FedScoop the compromised information included hard-coded administrator account privileges, encrypted key tokens and specific database table information. After the information was published, six foreign IP addresses cloned the source code, including at least one from a country hostile to the U.S., according to sources. John Hewitt Jones covers it in FedScoop.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}