{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

04/25/2022
linkedin facebook twitter instagram
WorkScoop
DHS's bug bounty program is afoot. CISA makes a big-name hire. And Cyber Command awards a $60 million contract. This is CyberScoop for April 25.

Hackers find 122 vulnerabilities — 27 deemed critical — during first round of DHS bug bounty program

Vetted hackers working with the Department of Homeland Security identified more than 122 vulnerabilities — 27 of which were deemed critical — as part of the first round of the agency's "Hack the DHS" bug bounty program. The department said that more than 450 security researchers found the bugs, and that it shelled out $125,600 to the participants, who were eligible to receive between $500 and $5,000 for verified vulnerabilities. This was the first of three phases for the program. Round two will be a live, in-person hacking event, while a third will identify lessons learned to inform future bug bounty programs. AJ Vicens had the story first.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


Lord to CISA

DHS’s Cybersecurity and Infrastructure Security Agency has tapped Bob Lord to serve as a senior technical advisor for the agency. Lord will work on community partnerships and expanding the agency's Joint Cyber Defense Collaborative. Lord joined the Democratic National Committee in 2018 as its first chief security officer, working to improve campaign security in the aftermath of the 2016 hacks of the DNC and Hillary Clinton’s campaign by Russian hackers. Tonya Riley has more.


Cyber Command awards nearly $60M contract for ‘hunt forward’ operations

U.S. Cyber Command has awarded a nearly $60 million contract to Sealing Technologies to provide equipment to conduct defensive cyber operations abroad on the networks of partner nations, the company announced Thursday. Specifically, the award is for so-called hunt-forward operations, which involve physically sending defensively-oriented cyber protection teams from the Cyber National Mission Force to foreign nations to hunt for threats on their networks at the invitation of host nations. The equipment will support automated deployments, configurations and data flows for cyber ops. The full story's at FedScoop from Mark Pomerleau.


A K-12 vendor breach spreads

A school district in Coventry, Connecticut, notified families of its students this week that students’ data may have been swept up in a breach of one of its vendors. The breach of the vendor, Illuminate Education — which sells software for tracking students' grades, attendance and behavioral development — had already been found to have affected some 820,000 current and former students in New York City. “It’s hard to imagine it was New York City and this Connecticut district and no other districts,” said Doug Levin of the K-12 Security Information Exchange. Benjamin Freed has more at StateScoop.


Tweet Of The Day

Image

Crypto whiplash.


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}