{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
How much can the Pentagon help on diversity in the cyber industry? The U.S. takes some concrete steps on naming and shaming the perpetrators of Trisis. And Finland is gripped with a data breach story. This is CyberScoop for Monday, October 26, 2020.

DOD diversity initiative raises some questions

A new DOD initiative meant to improve access to cybersecurity resources at historically Black colleges and universities (HBCUs) is being met with some skepticism among prominent cyber practitioners and educational advocates. The goal is to connect HBCUs and minority universities with other colleges that already meet NSA cybersecurity curriculum standards to share resources, but some experts have concerns the programs like this have the potential to set up HBCUs to become dependent on other organizations for cybersecurity resources, rather than building out their own capacity. The program also says it will offer some paid internships as part of the initiative, which experts say is a step in the right direction. Shannon Vavra has more.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

US sees Russian role in world’s most dangerous malware

The U.S. Treasury Department on Friday sanctioned a Russian government research institute for its alleged role in a hacking operation that shut down a Saudi petrochemical plant in 2017. The Treasury Department called the Russian lab’s involvement in Trisis, as the malware is known, “particularly troubling given the Russian government’s involvement in malicious and dangerous cyber-enabled activities.” Private-sector researchers praised the sanctions as a step toward accountability for safety-threatening cyber activity. The Russian ambassador to the U.S. rejected the allegations. Trisis, also known as Triton, has intrigued and alarmed researchers since 2017. More from Tim Starks and Sean Lyngaas.

A dark turn for a data breach in Finland

Finland's government, media and cybersecurity community are consumed with the story of a data breach of tens of thousands of patient records at Vastaamo, which runs a network of psychotherapy centers throughout the country. The incident happened as early as November 2018 but wasn't publicly known until last week when the company reported it. The story soon took off: Reports said the cybercriminals demanded about 450,000 euros to return the highly sensitive patient data — and then later gave individual people the opportunity to pay a smaller sum to protect their own records. By Sunday, the furor over the case had prompted an emergency meeting of Finland's Cabinet. Joe Warminsky has more on the incident.

The broad scourge of state-sponsored malware

When it comes to defending against foreign cyber powers, many U.S. national security experts tend to hype up countries with powerful hacking capabilities, such as China, Iran, Russia and North Korea. But when it comes to state-sponsored malware campaigns, the security community needs to dig deeper, as surveillance software has become increasingly available for purchase for countries that may not have in-house capabilities, says Cooper Quintin, a security researcher and programmer at the Electronic Frontier Foundation. The United Nations and the international community also have a larger role to play in rooting out state-sponsored surveillance campaigns, said Quintin, who spoke at CyberTalks on Friday. Shannon has more from the event.

French prosecutors seek 10 years for Vinnik

At the end of a week of court hearings in Paris, prosecutors sought a 10-year prison term and a fine of 750,000 euros for alleged ransomware mastermind Alexander Vinnik. It's only one part of the 41-year-old Russian's legal saga, which includes an arrest in Greece, extradition to France, and criminal charges in the U.S. and Russia. The French and U.S. governments say Vinnik was one of the creators of the infamous "Locky" ransomware and that he ran a money laundering scheme through the cryptocurrency exchange BTE-e. The ransomware cost French businesses and organizations about $160 million. U.S. prosecutors say the overall take for the scheme is several billion dollars. Read more.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}