{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
Mandiant points out a flaw in software used in millions of IoT devices. Suspected Russia propagandists wade into 4chan. And the SEC settles with a company over its "misleading" handling of a data breach. This is CyberScoop for Aug. 17, 2021.

The Internet of Insecure Things

Researchers at Mandiant FireEye on Tuesday lifted the veil on months of work to find and mitigate a glaring bug in software used in millions of IoT devices, from baby monitors to web cameras. It’s an example of the challenge of securing smart home devices before they go to market. Policymakers in the U.S. and U.K. have  shown greater interest in regulating IoT products in the last year out of concern that the industry lacks incentives to design software more securely. Sean Lyngaas breaks it down.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Russia targets far-right outrage

A long-running suspected Russian propaganda operation used anti-Muslim-themed COVID-19 disinformation to try to stoke far-right anger and paint America in a negative light, researchers at Recorded Future found. The group, Secondary Infektion, is known for using forged documents and small websites to advance Russia’s political agenda in Europe. The research suggests that the group’s activity might be more widespread than previously thought, researchers say. Tonya Riley reports.

A $1 million SEC-Pearson breach settlement

The SEC announced a $1 million settlement with the educational software company Pearson over charges that it was "misleading" in its handling of a 2018 data breach. In both disclosures to the agency and the public, Pearson didn't give an accurate picture of what had happened, the SEC charged. For instance, a 2019 SEC disclosure spoke about a hypothetical attack, when Pearson had already been breached. Tim Starks covered the news.

Ransomware hit two Maine water facilities earlier this year

Officials in Maine recently disclosed that two rural wastewater systems were hit by ransomware attacks earlier this year. The attacks, which affected plants in the towns of Limestone and Mount Desert Island, did not compromise taxpayer data or generate a public safety threat, local officials told The Maine Monitor. Officials also said no ransoms were paid, though some systems were upgraded. But they acknowledged that cyberattacks against the towns — which occurred during a holiday in April in Mount Desert Island and on the Fourth of July in Limestone — could have overridden the plants’ alarms or disabled critical pumps and other equipment. Colin Wood has the story at StateScoop.


The case for transitioning to a single, multi-cloud IAM platform

SAIC Cybersecurity Director Eric Brown talks with Axiad co-founder Bassam Al-Khalidi about the rationale for moving to a single identity and access management platform. Hear more from Brown and Al-Khalidi.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}