{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

03/24/2022
linkedin facebook twitter instagram
WorkScoop
Washington's work on cyber incident reporting is hardly over. A Senate report looks how how the FBI handled some REvil cases. And Okta gives more details about what Lapsus$ did. This is CyberScoop for March 24.

The long view on the landmark cyber incident reporting bill

President Joe Biden last week signed some of the biggest cyber legislation Congress has passed, and now there's a long road ahead on finalizing how the cyber incident reporting bill becomes reality. While the bill has been widely praised, lawmakers had to make a lot of concessions along the way to mandating that critical infrastructure owners and operators had to report significant incidents within 72 hours to CISA. And a regulation isn't on schedule to be finalized before late 2024, with much to be settled in the process — such as what even a "significant incident" is. Tim Starks and AJ Vicens do a deep dive.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


Ransomware victims want more FBI help, investigation finds

The FBI sent a hostage negotiator with no experience in ransomware to help out one unnamed REvil victim, a Republican-led Senate report out Thursday finds. The report features three cases studies of three different-sized REvil victims in the United States and highlights the ways the government is lacking in helping ransomware victims. The report recommends greater coordination between CISA and the FBI, something that the recently passed incident reporting bill should help with, investigators say. Tonya Riley reports.


Okta claims 366 customers potentially exposed in data breach

David Bradbury, the chief security officer for identity authentication firm Okta, said Wednesday that according to information the company has, 366 of its customers' data may have been accessed after the hacking group Lapsus$ breached an Okta contractor in late January. In a nine-minute video call where he didn't take questions, Bradbury said the estimate reflects a "worst case scenario," and that any potentially impacted customers will be notified and provided information about what the third-party contracting firm did with their Okta accounts in a five-day period where Lapsus$ had access. AJ Vicens reports.


Another sign of ransomware groups' pro moves

“The average ransom demand in cases worked by Unit 42 incident responders rose 144% in 2021 to $2.2 million, while the average payment climbed 78% to $541,010,” according to Palo Alto Networks’ incident response team, which released its latest Ransomware Threat Report on Thursday. Against those numbers, consider this: About 1 in 5 ransomware cases handled by Unit 42 last year involved Conti, the organization whose professionalism and structure were highlighted in a recent leak of internal documents. Joe Warminsky has the details.


Tweet Of The Day

Image

Targeted but also evergreen, really.


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}