{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

07/14/2021
linkedin facebook twitter instagram
WorkScoop
That major Microsoft Print Spooler flaw is getting federal attention. A prolific ransomware gang's sudden outages have security experts scratching their heads. And a DOD watchdog thinks the department needs to coordinate better on cyber with DHS. This is CyberScoop for July 14, 2021.

CISA seeks to wake federal agencies from 'PrintNightmare'

CISA told federal agencies they need to disable the Microsoft Windows Print Spooler service by midnight Wednesday. The Tuesday emergency directive was a response to the weeks-long "PrintNightmare" saga, a flaw that could allow attackers to take over systems remotely. CISA also gave agencies a July 20 deadline to apply Microsoft security updates. Tim Starks has the news.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


All of cyber world asks: What happened to REvil?

The ransomware gang behind a string of recent attacks that netted tens of millions of dollars may have been too successful for its own good. The dark web site where the Russian-speaking ransomware gang REvil extorts victims went down Tuesday, along with a payment portal and other infrastructure. The cause of the outages wasn’t immediately clear, but the sudden disappearance from such a prolific crew of scammers prompted speculation about a U.S. government action, a Russian crackdown and the suggestion that the attackers closed up shop amid global police scrutiny. Jeff Stone looks closer.


Defense, Homeland Security have some cyber work to do, IG says

The Department of Defense’s work to help defend the cybersecurity of critical infrastructure needs a stronger implementation plan in its collaboration with the Department of Homeland Security, the DOD inspector general reported Tuesday. The IG examined the implementation of a 2018 memorandum that outlined the partnership between the two departments on how they can coordinate the protection of critical infrastructure without violating their jurisdictions. The watchdog found DOD’s work lacks milestones and implementation plans for joint operations and general collaboration with DHS, which could put the nation’s cyberdefense of its critical infrastructure at risk. Jackson Barnett covered it at FedScoop.


New requirements under CMMC

A Cybersecurity Maturity Model Certification assessment could soon be more costly for some Department of Defense contractors. The DOD and the CMMC Accreditation Body are working to finalize requirements that could mandate having more experienced — and expensive — assessors conduct the needed tests of contractor networks that transmit controlled unclassified information. In effect, it could raise the price for some assessments as the per-hour cost of provisional assessors is higher than the original plan. Jackson wrote this one for FedScoop, too.


Tweet Of The Day

Image

Big hitcat energy.


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}