Weekly News Roundup July 6-10, 2020

Posted on by Kacy Zurkus

CompTIA announced a cybersecurity competition for high school and college students as part of the National Cyber League in an effort to promote careers in cybersecurity, according to Tech Republic. Letting young people know about a cybersecurity pathway seems to be trending this week. RSA Conference Advisory Board member and Forbes Councils Member, Caroline Wong, penned a piece in Forbes discussing how to teach kids about cybersecurity.

Speaking of trends, in advance of RSA Conference 2020 APJ, our Senior Director and General Manager, Linda Gray Martin talked with several speakers from this year’s program to better understand the cybersecurity trends organizations are facing and how those trends should inform a COVID-impacted security posture.

Wong, who also serves as Chief Strategy Officer at Cobalt.io, will be delivering a virtual session, Hack Your Cybersecurity Career: Your Role in the Ecosystem, at our inaugural virtual event. You can also look forward to captivating keynotes from Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group, Microsoft, RSA President, Rohit Ghai, RSA Conference Program Committee Chair Hugh Thompson with special guest, George Takei.

Let’s take a look at what else came across the wire in cybersecurity headlines this week.

Jul. 10: Infosecurity Magazine reported, “UK pubs and restaurants are exposing their customers to the risk of phishing attacks as consumers head back to the bar after a long period of lockdown, according to Proofpoint.”

Jul. 9: German authorities seized a computer server, “being used by a WikiLeaks-like data transparency collective called Distributed Denial of Secrets to share documents — many tagged “For Official Use Only” — that shed light on U.S. police practices,” AP reported.

Jul. 9: In a Wall Street Journal commentary, Daniel Pellathy and Ted Stank opined, “Cyber criminals are taking advantage, launching more ransomware attacks on targets like hospitals…Such attacks highlight the damage that breakdowns in cybersecurity can inflict on enterprises, and how companies need to start thinking about cybersecurity as a supply-chain problem. “

Jul. 8: Microsoft has seized malicious domains used in targeted phishing attacks on Office 365 accounts around the globe. Threatpost reported, “The attackers behind the campaign have gained access to victims’ emails, contact lists, sensitive documents and other valuable information, according to Microsoft.”

Jul. 8: One malicious activity that continues to plague social media platforms is coordinated inauthentic behavior. As a result, this week Facebook removed multiple individual networks that originated in Canada and Ecuador, Brazil, Ukraine and the United States.

Jul. 7: Mortgage lender, FreddieMac disclosed that it suffered a data security incident after the company learned that one of its vendors experienced a ransomware attack.

Jul. 7: According to Europol, “The Italian National Postal and Communication Police Unit (Polizia Postale e delle Comunicazioni) and the Romanian National Police (Poliția Română), supported by Europol and Eurojust, dismantled an organized criminal group involved in financial fraud, cybercrime and money laundering.” 

Jul. 6:
Researchers at Malwarebytes identified credit card skimmers that have been active in the wild since mid-April. The attackers are exclusively targeting, “websites hosted on Microsoft IIS servers and running ASP.NET, Microsoft’s web framework to develop web apps and services.”

Kacy Zurkus

Senior Content Manager, RSA Conference

Hackers & Threats

hackers & threats

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.

Share With Your Community

Related Blogs