{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

07/23/2020
linkedin facebook twitter instagram
WorkScoop
Twitter hackers accessed DMs from famous users (exactly who, though, is a mystery). Apple hands out phones to hackers. And wireless car keys help Polish thieves. This is CyberScoop for Thursday, July 23.

Twitter hackers accessed some DMs, to the surprise of no one

Hackers who breached Twitter’s systems last week likely accessed private messages belonging to 36 of the 130 accounts targeted, including messages for a Dutch politician. That was the only account Twitter highlighted, refraining from more details on the access hackers had to private conversations from some of the most famous people on the site.  The direct message disclosure is the latest update, after a week of speculation from security researchers that the hackers likely had access to the usually protected DMs. Jeff Stone has the news.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


Apple gives researchers new toys

In order to make it easier for security researchers to find vulnerabilities in iPhones, Apple is launching an iPhone Security Research Device Program. The company will provide certain hackers with special devices to conduct security research. Despite a reputation for being frosty toward researchers, Apple’s move could mark a step forward in its willingness to work with the information security community to root out flaws in widely used tech. And yet, there appear to be some limits on participation. Shannon Vavra offers some context.


Hacked in 60 Seconds

Car hacking is a lucrative business. Look no further than a Polish gang that allegedly stole 34 cars for a haul of $1.6 million at least in part, authorities say, by breaching the keyless systems used to start the vehicles. The gang may be dismantled, but there could be plenty more where they came from: Big payouts, combined with small number of people required to pull off a digital carjacking, mean this problem is here to stay. Sean Lyngaas has more.


North Korean hackers have no chill

North Korean government-linked hackers have been deploying a malicious software framework against victims around the world for over two years, according to new Kaspersky research. The hacking tool, which Kaspersky calls the MATA framework, targets Windows, Linux, and macOS operating systems. That shows that, while Lazarus Group hackers have been known for some of their noisier attacks, they may also be working to expand their more covert toolsets, Kaspersky says. Hackers targeted organizations in Poland, Germany, Turkey, Korea, Japan, and India. Shannon has the details.


$2 million in rewards posted for accused SEC hackers

The U.S. government embarked on a public awareness campaign seeking help in the apprehension of two Ukrainian men accused of hacking the U.S. Securities and Exchange Commission. The State Department offered rewards of up to $1 million apiece for information leading to the arrest or conviction of Artem Radchenko and Oleksandr Ieremenko. The bounty that comes more than a year after the pair were indicted in a scheme to breach an SEC database, steal nonpublic information and then sell it for a profit. Jeff explains the case.


Army hackers just need to be faster than the mail

One of the Army‘s IT support commands still sends out physical disks on a quarterly basis to patch its software. But the hope is in the next year, it can build out a common repository to improve its software patching. The Army’s Communications-Electronics Command relies on sending out physical disks with updated code to bases, a process that takes on average 90 days just to get the disk to the right soldier. And who knows if the disks are uploaded right when they arrive. Now, that's slated to change. FedScoop's Jackson Barnett explains.


Tweet Of The Day

Image

Some order for our chaotic world.


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}