{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

03/30/2020
linkedin facebook twitter instagram
WorkScoop
The FBI is relying on the insurance industry to boost its awareness about ransomware attacks. The billion-dollar hacking crew known as FIN7 tries out a new technique. And one of the Exabeam employees who contracted COVID-19 is home from the hospital. This is CyberScoop for Monday, March 30.

Where the FBI is getting ransomware info

Victims of ransomware attacks are still not calling the FBI. So the bureau is turning elsewhere to find the data: insurance companies. Bureau officials have met with insurance firms in at least two small, informal meetings to discuss how law enforcement and insurers might collaborate to stop ransomware, according to three industry executives. The FBI also hosted a larger ransomware summit last September, when corporate executives were invited to “fill some of the gaps in the intel,” as Herb Stapleton, section chief in the FBI’s cyber division, described it. The FBI’s Internet Crime Complaint Center received 2,047 ransomware complaints from U.S. victims in 2019 — an uptick in reported attacks from 2018 — yet that figure still fails to account for the exponential growth in the number of incidents. Jeff Stone has the story.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


Malware by snail mail

Hackers the world over rely on emails and text messages to breach networks. But FIN7, an Eastern European group that has stolen over $1 billion, according to researchers, is now using snail mail. Cybersecurity firm FireEye told CyberScoop it is investigating multiple cases where FIN7's malware has been shipped via the U.S. Postal Service to U.S. organizations. The hacking attempts raise questions about how a group that U.S. officials have hunted for years has been able to get their malware hand-delivered to American organizations. Sean Lyngaas had the news.


Hong Kong espionage continues

Mobile malware attacks capable of taking control of devices, and tracking GPS location, phone call history, contacts, and text messages has been unleashed on targets in Hong Kong in the last several months, according to Trend Micro and Kaspersky. The attackers, which Kaspersky suspects are Chinese-speaking and linked with the group known as Thrip, entice victims by posting links to local news on Hong Kong protests or the coronavirus on community forums. Other attacks come through social media, like Instagram. But when victims click through, they get stuck with malware capable of tracking their every move. Shannon Vavra has more details.


Look for scammers to start targeting Zoom

Check Point researchers said Monday they've seen 1,700 new web domains containing the word "Zoom" since January. Zoom is the video-conferencing app that's seen massive attention from companies that have made the switch to remote work amid the COVID-19 pandemic. Check Point noted that 25% of the new domains have been registered within the past week, including sites that seem designed to trick users into downloading malicious software rather than the true app. Here's the full report.


Some good news: One coronavirus patient is back home

Chris Tillett, a senior security engineer at Exabeam who tested positive for COVID-19 after the RSA Conference, told the Today Show he is "feeling much better and improving every day." Exabeam confirmed on March 10 that two of its employees had fallen ill in the days immediately following the security conference in San Francisco. Tillett, the father of five-month-old twin boys, said he had a fever for days and was hospitalized in an intensive care unit with pneumonia before his condition improved. "I felt like a truck hit me," he told the Today show. Now, the whole family is at home, and thanked the medical professionals who continue to risk their lives. Watch the entire interview.


Florida students say anti-cheating measures violate privacy

Florida State University, which began remote learning on Monday for its entire campus in response to the COVID-19 pandemic, announced last week that faculty can use Honorlock, a service that assesses students remotely and detects potential academic misconduct. But in the days since the announcement, more than 5,000 students have signed an online petition asking administrators to reconsider implementing the technology. Honorlock can verify students’ identities, record web activity and detect the use of mobile devices to ensure students aren’t cheating on tests. The service requires access to computer webcams and microphones to monitor student activity during exams. Betsy Foresman explains at EdScoop.


Tweet Of The Day

Image

Oh, you lived in Harvested? Great town.


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}