{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

06/23/2021
linkedin facebook twitter instagram
WorkScoop
The FIN7 hacking group, blamed for breaching a who's who of U.S. corporations, is the subject of new court documents. More than 30 websites tied to Iran are seized. And Honeywell is nervous about USB drives. This is CyberScoop for June 23, 2021.

Scammers posed as SEC officials, sick restaurant customers

A hacking group known for innovative fraud techniques impersonated angry restaurant customers and targeted specific individuals with unique access to financial information, U.S. prosecutors argue in a court filing that sheds new light on the scammers’ work. In one message to a manager at an unnamed restaurant chain, a person claiming to be a customer named “Oliver Palmer” claimed that a corporate outing to the restaurant ended with the entire group falling ill with diarrhea, which “affected the financial component of the company.” In another message, fraudsters spoofed an email address from the U.S. Securities and Exchange Commission. Jeff Stone has the court documents.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


About those Iranian website seizures...

The U.S. on Tuesday seized more than two dozen websites for allegedly violating sanctions and spreading disinformation on behalf of the Iranian government. The Department of Justice said Iran’s Islamic Radio and Television Union controlled 33 websites, months after the U.S. issued sanctions against the same organization for what officials described as spreading disinformation meant to influence Americans’ opinions prior to the presidential election in 2020. Jeff has the news.


USB drives continue to haunt industrial facilities

The number of cyberthreats that use USB sticks and other external media devices as launching pads doubled in 2021, according to new research from Honeywell. Of those threats, 79% could pose a threat to operational technology systems used by industrial firms. It's not entirely clear that the spike in tactics has translated to real-world attacks. Dragos, a firm specializing in industrial cybersecurity, hasn’t noticed any uptick in attacks using USB devices, according to senior intelligence analyst Anna Skelton. Tonya Riley has the latest.


More lessons from CyberTalks 2021

CyberTalks, the summit of decision-makers from the government and private sector presented last week by Scoop News Group, included a range of expertise about a host of emerging issues. Tune in for conversations with Axiad's Jerome Becquart, John McClurg of Blackberry, Cisco's Bruce Brody and Helen Patton of Duo. Find everything from the event here.


Tweet Of The Day

Image

Anyone have a lighter?


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}