{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

02/16/2022
linkedin facebook twitter instagram
WorkScoop
An update from Ukraine's cyber and law enforcement agencies. What's new with you, TrickBot? And when it comes to the Log4Shell bug, not all the news is bad. This is CyberScoop for February 16.

Ukraine government calls out cyber incidents

A series of DDoS attacks <a href="https://www.cyberscoop.com/ukraine-banks-defense-ministry-ddos/">aimed at government websites and state-owned banks</a> in Ukraine, along with spam text messages falsely claiming ATMs weren't working, were an attempt to sow chaos and discord among the Ukrainian population, government officials said. The DDoS traffic rendered some web services inaccessible, and some government sites were proactively taken offline to limit the spread and prevent damage, the officials said during a joint briefing by cybersecurity and law enforcement agencies Wednesday. They stopped short of blaming Russia for the attacks. AJ Vicens reports.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


TrickBot developers are still hard at work

Security researchers at Check Point recently noted the revitalization of TrickBot malware in 2021, estimating that it had found 140,000 victims since the late 2020 takedowns of its infrastructure, while helping the Emotet botnet bounce back, too. The company published an update Wednesday that exposes how TrickBot’s developers are working hard to protect those gains. Check Point’s new research highlights the malware’s layers of “anti-analysis” and “anti-deobfuscation” capabilities, meaning that if an expert tries to pick apart the code, it stops communicating with its command-and-control servers or stops working altogether. Joe Warminsky explains.


Google Cloud: Log4Shell scans still widespread

Security experts at Google Cloud say there’s good news and bad news about the infamous Log4Shell bug. Companies that interact with the cloud computing provider have been “very much on top of this,” one Google official says, in terms of protecting against the now-patchable vulnerability in widely used Log4j logging software. On the other hand, Google Cloud is seeing hundreds of thousands of scans per day for the vulnerability. Some of those could be cyber professionals looking for problems, but some of them most certainly represent potential cyberthreats, Google Cloud says. AJ has this one, too.


Alleged crypto crime couple faces court

A U.S. federal judge has determined that Ilya Dutch Lichtenstein, one-half of the couple accused of a massive cryptocurrency laundering scheme, will await trial in prison. His wife and alleged co-conspirator, Heather Morgan, was set free on a $3 million bond package, with the conditions of strict electronic monitoring and limits on her virtual currency accounts. Federal law enforcement arrested the pair earlier this month for allegedly conspiring to launder $4.5 billion worth of cryptocurrency stolen in a 2016 hack of the Bitfinex exchange. Evidence presented during a detention hearing Monday painted an elaborate picture of the couple’s alleged operations. Agents found under the couple’s bed various bags of cellphones, SIM cards, and other electronics labeled “Burner Phone,” the judge noted. The couple faces up to 25 years in prison. Tonya Riley has more.


NRC wants info about AI for cybersecurity

The Nuclear Regulatory Commission is seeking insights on how machine learning and artificial intelligence can detect and respond to cyberattacks at nuclear power plants. “The vendor must provide and use an existing experimental infrastructure ... to conduct research and implement a test case,” the agency said on federal contracting site SAM.gov. “The research conducted by the vendor is expected to produce data that evaluates the impacts of AI/ML concepts, technologies and applications on nuclear power cybersecurity outcomes and programs.” FedScoop’s Dave Nyczepir reports.


Tweet Of The Day

Image

The sound of the cyber, for sure.


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}