{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

02/19/2021
linkedin facebook twitter instagram
WorkScoop
Parler was a hub of misinformation around the Capitol insurrection. Election security officials are still fighting bad info, too. And Microsoft concluded its internal examination of what the SolarWinds hackers did. This is CyberScoop for Feb. 19, 2021.

Peeling a layer back on Parler

The overwhelming majority — 87% — of news links shared on Parler in the days surrounding the Capitol insurrection last month were filled with misinformation, according to an analysis by NewsGuard and PeakMetrics. Some of the most popular sites shared across the social networking platform included sites that shared false claims about election fraud and COVID-19 as well as QAnon conspiracy theories, according to the analysis. The authors of the research note that “the findings suggest that Parler was a hotbed for misinformation publishers.” Shannon Vavra has more.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


Election security officials still fighting disinformation

While the execution of the 2020 general election went off with relatively few bumps, election officials and industry experts said Thursday that the rampant disinformation that spread on cable news and social media during and after the campaign still leaves them with challenges in winning voters’ trust. Marc Schneider, a co-director of MITRE’s election security initiative, said the organization last year developed an online tool, called Squint, that helped election officials aggregate disinformation spreading online in their communities. Much of the work of safeguarding an election occurs largely out of view, Schneider added, explaining that officials can do more to educate voters about the process. Benjamin Freed has more at StateScoop.


Microsoft wraps internal probe on SolarWinds hackers

The hackers behind the SolarWinds operation accessed and downloaded Microsoft source code for three products, the company said in its "final update" of its internal investigation. They accessed cloud computing service Azure, mail and calendar server Exchange and cloud management service Intune. They first viewed a file in a source repository in November, and continued to try to gain access unsuccessfully into early January. The hackers apparently were trying to unearth company secrets. Here's the full accounting.


CrowdStrike snaps up Humio for $400 million

CrowdStrike is acquiring logging data company Humio for $400 million, the two firms announced.  It's the second sale in less than a month of a logging company to a cybersecurity firm: SentinelOne earlier in February announced it would buy Scalyr for $155 million. "With Humio, CrowdStrike accelerates the extraction of value from data by enabling customers to collect all of the data in real time and at scale," said Geeta Schmidt, Humio's CEO. Read the full announcement.


Tweet Of The Day

Image

Eat your heart out, Amanda Gorman.


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}