{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

05/27/2021
linkedin facebook twitter instagram
WorkScoop
Details on how the TSA is trying to clean up that pipeline mess. Researchers nab suspected Chinese hackers targeting the Uyghur population again. And a Russian man arrested at the airport heads to prison. This is CyberScoop for May 27, 2021.

Fines coming for pipeline operators with weak security

The Transportation Security Administration will for the first time require pipeline operators to meet mandatory cybersecurity requirements in the wake of a ransomware attack that caused a days-long shutdown of the main artery for delivery fuel to the East Coast. The directive requires certain pipeline operators to report hacking incidents to the Department of Homeland Security’s cybersecurity agency within 12 hours, and would levy fines starting at approximately $7,000 on operators for failing to comply with security guidelines, department officials told reporters in a call. Sean Lyngaas has the story.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


Uyghurs targeted by UN poseurs, fake human rights org

Possible Chinese hackers are targeting Uyghurs in China, Pakistan and Xinjiang Uyghur Autonomous Region for eavesdropping, according to research from Check Point and Kaspersky. They are pretending to be from the United Nations Human Rights Council and a fake human rights group, the Turkic Culture and Heritage Foundation. The companies couldn't identify a specific hacking gang responsible, but signs pointed to a Chinese-speaking group. Tim Starks has this one.


Belgians say hackers in ministry since 2019

Belgium's Federal Public Service Interior said it has evicted hackers who were in its systems for two years. The ministry didn't name the culprits behind the cyber-espionage campaign, but signs pointed to China. The FPS Interior said it began investigating after Microsoft revealed in March that state-sponsored hackers had used zero-days to attack its Exchange Server tech. Tim delves deeper.


30 months for a Russian scammer

A Russian man was sentenced to 30 months in prison for running a website that sold stolen credit card data and other personal information to cybercriminals, according to a Department of Justice announcement. The Russian man, Kirill Victorovich Firsov, was first arrested last year, and pleaded guilty to hacking-related charges in January. Deer.io raked in $17 million worth of sales and sold at least $1.2 million in U.S.-based stolen information, according to the DOJ. Dive in with Shannon Vavra.


When ransomware isn’t about extortion

There is growing evidence that Iran-linked groups have deployed ransomware as a smokescreen for disruptive hacking operations in the Middle East. The latest example comes from SentinelOne researchers, who document a series of hacks against Israeli organizations in which the culprit demands a ransom but doesn’t appear to collect it. It wouldn’t be the first time that a state allegedly used a wiper that posed as ransomware. Sean has the lowdown.


Tweet Of The Day

Image

May we all be so lucky.


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}