{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
Print Spooler is giving Microsoft PrintNightmares. Researchers see suspected Chinese hackers voyaging into Asian telecom organizations. And a Houston man is heading to prison for wire transfer and romance scams. This is CyberScoop for July 9, 2021.

Microsoft's long PrintNightmare

Microsoft is still struggling with a critical Print Spooler vulnerability after Chinese researchers accidentally published a proof-of-concept exploit last week. Nicknamed PrintNightmare, the vulnerability would allow hackers to remotely take over computers. On Thursday, the company fended off claims from researchers that a patch released earlier this week wasn't up to snuff. It had endured other criticisms of its PrintNightmare response, too. Tim Starks traces the story so far.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Chinese hackers seek out telecom IP

Suspected Chinese hackers are targeting telecommunications organizations in Taiwan, Nepal and the Philippines, researchers at Recorded Future say. The cybercriminals appear to be taking a page out of China's long-running playbook of stealing valuable technology from regional rivals. Recorded Future and other firms have noted ongoing attempts against Taiwan's semiconductor industry in particular, which is a source of rivalry with China. Some of the intrusions appeared to be ongoing as of publication time, the researchers noted. Tonya Riley delves into the research.

BEC, romance scams earn man 87 month prison sentence

A U.S. judge sentenced a Nigerian national living in Houston, Akhabue Ehis Onoimoimilin, to more than seven years in prison for his role in romance and business email compromise scams. The scams, which involved co-conspirators, amounted to more than $2 million in attempted gains, according to prosecutors. Onoimoimilin pleaded guilty for his money laundering piece of the scheme. Tim has the rundown.

Kaseya attack hits home

The small Maryland appear to be the first local governments known to be affected by the REvil ransomware attack against the software publisher Kaseya, as the compromise of one the company’s products has spread downstream. Officials in the Chesapeake Bay communities of Leonardtown and North Beach both confirmed this week their computers and networks had been disabled last Friday, downstream effects of the infection of Kaseya's VSA platform, which is used by managed service providers that in turn support organizations, like small local governments. StateScoop's Benjamin Freed reports.

The latest push for cyber grants

Citing the ongoing threat of ransomware attacks, a group of nine associations of state and local government officials — including NASCIO and the NGA — sent a letter Wednesday to congressional leaders asking them to include a new cybersecurity grant program in either an infrastructure spending package or government appropriations bill. “The increased sophistication of cyber criminals, the ever-changing landscape of cyber attacks, and the limited resources of states, territories and localities, create the perfect storm and render carve-outs within existing homeland security grant programs insufficient,” the letter reads. Both the House and the Senate have held hearings recently on creating such a program, but Congress has also deliberated — and failed to enact — many grant proposals in the past. Ben has more.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}