{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
The same researchers who sparked the Methbot cybercrime investigation just found an updated version. Syrian spyware apps leverage COVID-19. And a new project aims to help prioritize risk. This is CyberScoop for Thursday, April 16.

It's not TV. It's a scam.

New York-based security firm White Ops has disclosed a vast, ongoing scheme in which fraudsters are charging advertising companies for ad space on smart TVs, and then not delivering on their promise. To boost their credibility, the scammers are disguising bot activity which originates in global data centers as legitimate traffic in order to dupe anti-fraud services. The campaign is an updated version of the notorious Methbot/3ve scheme, which has resulted in an ongoing international FBI investigation. Jeff Stone has more context.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Yelp, but for software bugs

Cybersecurity company Rapid7 on Wednesday went public with a web platform where security researchers can rate the severity of software bugs and back their assessments up with data. It’s an attempt to help organizations with an ongoing struggle: filtering out the noise and focusing on software flaws that only affect them. By rating how easy it would be for a hacker to weaponize a vulnerability, the logic goes, security pros can help organizations prioritize what they need to do next. Sean Lyngaas had the story.

A slew of Syrian spyware apps

A Syrian government-backed hacking campaign is distributing coronavirus-themed applications that are actually spyware, according to new research from mobile security firm Lookout. Although the campaign is part of an espionage effort that has been in operation since January 2018, hackers tied to the Syrian government have leveraged at least 71 new malicious Android applications in the last month alone, according to Lookout. They’re capable of capturing victim geolocation, contacts, pictures, audio, video, and more, and pose a particular threat to anyone, including dissidents, journalists, and rebels, affected by the Syrian Civil War. Shannon Vavra breaks it down.

Zoom's security push continues

The San Jose-based video conferencing company announced Wednesday it has hired Katie Moussouris’ Luta Security, a vulnerability disclosure firm, as part of its efforts to improve its security. Zoom’s stock has fluctuated dramatically -- dipping by 19.6% at one point only to rise again -- since its number of daily users exploded from 10 million to 200 million in the past six weeks. After scrutiny on its encryption strategy and an FBI warning about unauthorized outsiders barging into digital meetings, chief executive Eric Yuan acknowledged the firm had prioritized growth over data protection. Now, after an attacker disrupted a Congressional video conference, the company is hiring respected security leaders to make some of these issues go away. We've covered much of the drama.

Hackers are jumping on the 'Valorant' buzz

Attackers are disguising malicious software that looks like a product licensing key that would grant a user access to the beta version of “Valorant,” a new title from the developer Riot Games. However, the game-key generator actually includes keylogger software that would allow hackers to track the words and phrases that users type. Albert Zsigovits, a threat researcher at the security firm Sophos, disclosed the issue in a tweet Wednesday that attracted attention from other malware specialists. The number of victims who may have downloaded the keylogger remains unclear. Jeff covered the news.

DHS adds to its election security team

The Department of Homeland Security’s cybersecurity wing has hired David Kuennen, a former Election Assistance Commission adviser, as it prepares for the 2020 election. Kuennen will work for Matt Masterson, another ex-EAC official, who leads DHS’s election security work. Kuennen has extensive experience in observing elections from Ukraine to Pakistan, according to his LinkedIn profile. Now, he'll be part of a DHS team that tries to navigate the chaos sewn by COVID-19 to ensure a smooth election in November. Here's the latest.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}