{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

02/04/2022
linkedin facebook twitter instagram
WorkScoop
An update on potential agitation by a Russia-linked APT. The State Department speaks out about a recent attack on a global NGO. And News Corp. reports cyber-espionage with a Chinese footprint. This is CyberScoop for February 4.

Recent Gamaredon activity in Ukraine?

Analysts with Palo Alto Networks' Unit 42 threat intelligence unit have published new research that details possible ongoing cyber-operations from Gamaredon, a Russia-linked hacking group that's targeted Ukraine dating back to 2014. While not tying to the group directly to the recent spate of cyberattacks against Ukrainian institutions, Unit 42 did unpack one phishing campaign it says targeted an unnamed Western government entity in Ukraine on Jan. 19. AJ Vicens reports.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


Foggy Bottom decries Red Cross hack

The U.S. State Department voiced concern about the recent cyberattack on the Red Cross and its associated Red Crescent organizations, believed to have accessed personal data for more than half a million people. “Targeting the Red Cross and Red Crescent Movement’s sensitive and confidential data is a dangerous development,” said Ned Price, a spokesman for the State Department. “It has real consequences: this cyber incident has harmed the global humanitarian network’s ability to locate missing people and reconnect families. This is why it is so vital that humanitarian data be respected and only used for intended purposes.” The agency called on other nations to speak out. Tim Starks has the news.


Digital intrusion at News Corp. was likely by China, Mandiant says

A cyberattack discovered on Jan. 20 accessed emails and documents of some employees at News Corp. business units, including The Wall Street Journal and the New York Post, the Journal reported Friday morning. News Corp. notified law enforcement and hired Mandiant for incident response, according to the report. “Mandiant assesses that those behind this activity have a China nexus, and we believe they are likely involved in espionage activities to collect intelligence to benefit China’s interests,” said David Wong, vice president of incident response at Mandiant, the newspaper said. Read more.


CMMC oversight gets a new home at Pentagon

The Department of Defense’s cybersecurity program for contractors has been moved to the office of the department’s CIO. The Cybersecurity Maturity Model Certification board was originally organized under the authority of the Pentagon’s CISO for acquisition and sustainment, but that office has been dissolved. Moving CMMC from acquisition and sustainment to the CIO’s office was first suggested during a top-down review of CMMC in the summer of 2021. Jackson Barnett explains at FedScoop.


Tweet Of The Day

Image

What chipset is that? Asking for a friend.


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}