{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
Iran versus Israel expands in cyberspace. Gallium's target list grows. And the OMB has advice en route pertinent to the software bill of materials. This is CyberScoop for June 15.

Iranian hacking campaign ropes in former U.S. ambassador

A sprawling Iranian hacking campaign targeted a host of Israeli officials and a former U.S. ambassador, Israeli cybersecurity firm Check Point Research said Tuesday. The effort included hijacked and phony email accounts, credential-harvesting web pages, a fake URL shortener and what may have been a letter seeking to lure targets abroad so they could be kidnapped. The campaign is just the latest in the ongoing cyber tit-for-tat between Israel and Iran, which itself is just one component of a troubling escalation in conflict that has seen real world assassinations and other actions. AJ Vicens explains.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

A new Chinese RAT comes to light

A decade-old Chinese hacking group called "Gallium," known for targeting telecommunications firms, had developed a new remote access trojan (RAT) as part of ongoing espionage campaigns, researchers with Palo Alto Networks' Unit 42 said in research published Monday. The RAT, dubbed "PingPull," tries to make its actions harder to detect by blending in with legitimate computer processes either on the ICMP, HTTP(S) or TCP protocols, the researchers said. Also noted: The group's targeting purview seems to have widened in the last year to include finance and government organizations, the researchers said. AJ has this one, too.

OMB guidance presents chance to standardize software bill of materials

Forthcoming Office of Management and Budget guidance on secure development practices offers a chance to make the software bill of materials the standard for vendor self-attestation. But security experts say standardizing the SBOM, an inventory of software components down the stack, requires practical deadlines for vendors and a concrete process for using the information it contains at agencies. Federal contractors working to comply with new technology regulations typically seek as much certainty as possible from government agencies to allow them to budget for changes. The Biden administration’s cybersecurity EO in May last year was widely praised for introducing a standardized timeline for complying with the adoption of zero trust and other measures. Dave Nyczepir writes at FedScoop.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}