Tag: jobs
-
Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job
Note: Title edited to maintain clarity and accurately reflect the nature of the breach, emphasizing the leak of profile data rather than implying access to private information. First seen on hackread.com Jump to article: hackread.com/twitter-x-of-2-8-billion-data-leak-an-insider-job/
-
Twitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Job
by
in SecurityNewsMassive Twitter (X) data breach exposes details of 2.8 billion users; alleged insider leak surfaces with no official response from the company. First seen on hackread.com Jump to article: hackread.com/twitter-x-of-2-8-billion-data-leak-an-insider-job/
-
IBM US cuts may run deeper than feared “’ and the jobs are heading to India
by
in SecurityNewsBig Blue ‘might as well move its headquarters’ to Bengaluru since it ‘no longer prioritizes’ America First seen on theregister.com Jump to article: www.theregister.com/2025/03/27/ibm_cuts_jobs_in_us/
-
Student-Powered SOCs Train Security’s Next Generation
by
in SecurityNewsUniversity security operations centers that hire and train students are a boon to state and local governments while giving much-needed Tier 1 cybersecurity training to undergraduates. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/student-powered-socs-train-security-next-generation
-
DPRK IT Worker Scam: Mitigation Steps for Hiring Teams
by
in SecurityNewsNisos DPRK IT Worker Scam: Mitigation Steps for Hiring Teams Nisos is tracking a network of likely North Korean (DPRK)-affiliated IT workers posing as Singaporean, Turkish, Finish and US nationals with the goal of obtaining employment in remote IT, engineering, and full-stack blockchain positions… First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/dprk-it-worker-scam-mitigation-steps-for-hiring-teams/
-
Which Top Cybersecurity Role of 2024 Was Featured in 64,000+ Job Postings?
by
in SecurityNewsIT and security workforce management firm CyberSN surveyed job listings from 2022 to 2024. Yes, decreases in demand for some job titles may be related to AI. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-cybersecurity-job-market/
-
Comic Agilé Luxshan Ratnaravi, Mikkel Noe-Nygaard #330 — AI For Job Hunting
by
in SecurityNewsvia the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/03/comic-agile-luxshan-ratnaravi-mikkel-noe-nygaard-330-ai-for-job-hunting/
-
Getting the Most Value Out of the OSCP: The PEN-200 Labs
by
in SecurityNews
Tags: access, ai, attack, compliance, container, cyber, cybersecurity, dns, docker, exploit, firewall, guide, hacking, Hardware, infrastructure, intelligence, jobs, kubernetes, microsoft, mitigation, network, open-source, oracle, penetration-testing, powershell, risk, security-incident, service, siem, skills, technology, tool, training, vmware, vulnerability, windowsHow to leverage the PEN-200 simulated black-box penetration testing scenarios for maximal self-improvement and career success. Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance with OffSec’s copyright policies and agreements. I have not been sponsored or incentivized in any way to recommend or oppose any…
-
Cyber Command official is Trump’s choice for Pentagon policy job
by
in SecurityNewsKatherine Sutton, currently in a top civilian post at U.S. Cyber Command, has been nominated to be assistant secretary of Defense for cyber policy. First seen on therecord.media Jump to article: therecord.media/katherine-sutton-nominee-assistant-secretary-defense-cyber-policy
-
The Password Hygiene Failure That Cost a Job – Grip Security
by
in SecurityNewsActions from a real-life breach raises questions about poor password hygiene accountability and why users, policies, and security controls must work together. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/the-password-hygiene-failure-that-cost-a-job-grip-security/
-
Beware Developers Fake Coding Challenges Will Deploy FogDoor on Your System
Researchers has discovered a sophisticated malware operation that poses as a fake coding challenge and targets Polish-speaking professionals. This campaign, known as >>FizzBuzz to FogDoor,>FizzBuzz>Zadanie rekrutacyjne.iso,
-
FBI warns: beware of free online document converter tools
by
in SecurityNewsDon’t ‘just trust the logo’: Luke Connolly, a threat analyst with cybersecurity software and consulting firm Emsisoft, said the fact that the FBI has issued a warning is a good indication that this issue is fairly widespread, and should be taken seriously.Defenses, he said, include only using services from trusted vendors, using endpoint protection to…
-
CISOs are taking on ever more responsibilities and functional roles has it gone too far?
by
in SecurityNews
Tags: ai, business, cio, ciso, cloud, compliance, computing, control, corporate, cyber, cybersecurity, data, defense, framework, fraud, governance, healthcare, infosec, intelligence, international, Internet, jobs, law, mitigation, nist, privacy, regulation, resilience, risk, risk-management, service, skills, software, supply-chain, technology, threatth century alongside technology and internet-enabled threats, morphing to meet the demands of the moment. But the position hasn’t just matured; in many cases it has expanded, taking on additional domains.”The CISO role has expanded significantly over the years as companies realize that information security has a unique picture of what is going on across…
-
11 hottest IT security certs for higher pay today
by
in SecurityNews
Tags: access, attack, automation, business, cloud, container, control, corporate, credentials, cyber, cybersecurity, data, defense, encryption, exploit, finance, fortinet, google, governance, incident response, infosec, intelligence, Internet, jobs, linux, malicious, malware, monitoring, network, penetration-testing, remote-code-execution, resilience, reverse-engineering, risk, risk-assessment, risk-management, skills, software, technology, threat, tool, training, vulnerability, windowsOffensive Security Certified Expert (OSCE): OffSec’s Offensive Security Certified Expert consists of three courses: Advanced Web Attacks and Exploitation, Advanced Evasion Techniques and Breaching Defenses, and Windows User Mode Exploit Development. The format for each course exam is the same: Candidates have 48 hours to compromise a given target using various techniques. No formal prerequisites exist for any of the…
-
Choosing the Right Cloud Security Provider: Five Non-Negotiables for Protecting Your Cloud
by
in SecurityNews
Tags: attack, business, cloud, control, corporate, data, infrastructure, intelligence, jobs, risk, service, strategy, technology, threat, vulnerabilityProtecting your cloud environment for the long term involves choosing a security partner whose priorities align with your needs. Here’s what you need to know. As organizations embrace multi-cloud and hybrid environments, the complexity of securing that landscape increases. However, the overlooked risks may not come solely from threat actors. Choosing a security provider that…
-
It looks like IBM is cutting jobs again, with Classic Cloud hit hard
by
in SecurityNewsWe’re told thousands may soon get a pink slip from Big Blue First seen on theregister.com Jump to article: www.theregister.com/2025/03/20/ibm_cuts_us_jobs/
-
Cybersecurity job market faces disruptions: Hiring declines in key roles amid automation and outsourcing
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/analysis/cybersecurity-job-market-faces-disruptions-hiring-declines-in-key-roles-amid-automation-and-outsourcing
-
North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks
by
in SecurityNewsA recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North Korean IT workers to exploit GitHub for creating fake personas, enabling them to secure remote jobs in Japan and the United States. These individuals, posing as professionals from countries like Vietnam, Japan, and Singapore, primarily target roles in engineering and blockchain…
-
How CISOs are approaching staffing diversity with DEI initiatives under pressure
by
in SecurityNewsStaffing diversity can help avoid homogenous thinking: Similarly, Sam McMahon, senior manager of IT and security at Valimail, underscores the necessity of representing different backgrounds and mindsets.”In my experience, even small security teams benefit greatly from the variety of perspectives that come with different backgrounds and skill sets,” he says. “We know that the majority…
-
How can I extend IAM frameworks to include NHIs effectively?
by
in SecurityNewsAre Non-Human Identities the Missing Piece in Your IAM Framework? Your job is likely dominated by securing human identities. But, have you taken a moment to consider the significant role that Non-Human Identities (NHIs) play in your cloud security strategy? The emergence of cloud technology and the integration of machine identities in modern business operations……
-
That breach cost HOW MUCH? How CISOs can talk effectively about a cyber incident’s toll
by
in SecurityNews
Tags: attack, breach, business, ciso, cyber, cybersecurity, data, email, incident, incident response, insurance, jobs, network, phone, ransomware, risk, risk-managementThe importance of practice in estimating costs: Quantifying the costs of an incident in advance is an inexact art greatly aided by tabletop exercises. “The best way in my mind to flush all of this out is by going through a regular incident response tabletop exercise,” Gary Brickhouse, CISO at GuidePoint Security, tells CSO. “People…
-
US tech jobs outlook clouded by DOGE cuts, Trump tariffs
by
in SecurityNews
Tags: jobsHiring remains relatively strong as analysts warn of slowdown First seen on theregister.com Jump to article: www.theregister.com/2025/03/18/us_tech_jobs_outlook/
-
CISA scrambles to contact fired employees after court rules layoffs ‘unlawful’
by
in SecurityNewsFederal court rules U.S. cybersecurity agency must re-hire over 100 former employees First seen on techcrunch.com Jump to article: techcrunch.com/2025/03/18/cisa-scrambles-to-contact-fired-employees-after-court-rules-layoffs-unlawful/
-
Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data
by
in SecurityNewsIn a sophisticated phishing campaign uncovered by the BI.ZONE Threat Intelligence team, the Squid Werewolf group, also known as APT37, has been impersonating recruiters to target key employees in various organizations. This espionage cluster uses fake job opportunities to lure victims into opening malicious attachments, which ultimately lead to system compromise and data theft. Phishing…
-
White House exempts cyber pros from mass layoffs; Judge reinstates CISA firings
by
in SecurityNewsCISA document process raises security concerns: It’s unclear why CISA posted its request for fired employees to send a password-protected attachment containing personally identifiable information to a publicly promoted email address. It’s also unclear how the password-protected document process would work. CISA did not respond to CSO’s request for clarification.Some cybersecurity professionals cast doubt on…
-
Rethinking Insider Risk in an AI-Driven Workplace
Carnegie Mellon CERT’s Dan Costa on Addressing Root Causes of Insider Risk. As layoffs and AI-driven workflows reshape workplace security, insider risk is becoming more complex. Dan Costa, technical manager for the CERT division at Carnegie Mellon University’s Software Engineering Institute, outlines proactive strategies to manage insider risk effectively. First seen on govinfosecurity.com Jump to…
-
7 misconceptions about the CISO role
by
in SecurityNews
Tags: api, attack, breach, business, ceo, ciso, compliance, control, corporate, cyber, cyberattack, cybersecurity, defense, exploit, finance, firewall, governance, infrastructure, insurance, jobs, network, password, phishing, resilience, risk, risk-assessment, risk-management, saas, software, startup, strategy, technology, threat, tool, training, update, vulnerabilityKatie Jenkins, EVP and CISO, Liberty Mutual Insurance Liberty Mutual InsuranceThe field is changing so rapidly, Jenkins adds, she needs to commit time to keeping up on research and connecting with other CISOs for knowledge exchange.In addition to securing infrastructure, an effective CISO focuses on securing the business, experts say. This requires understanding how security…
-
Intel’s New CEO is the Right Leader for a Tough Job: Analysts
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/feature/intels-new-ceo-is-the-right-leader-for-a-tough-job-analysts