Tag: jobs
-
A US soldier is suspected of being behind the massive Snowflake data leak
by
in SecurityNewsOne of the hackers who masterminded the Snowflake credential leak that led to the threat actors stealing data from and extorting at least 165 companies, including 560 million Ticketmaster and 110 AT&T customers, could be a US soldier, according to cybersecurity journalist Brian Krebs.The hacker, known for using the moniker Kiberphant0m, carried out online chats…
-
APT60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor
by
in CISOThe threat actor known as APT-C-60 has been linked to a cyber attack targeting an unnamed organization in Japan that used a job application-themed lure to deliver the SpyGlace backdoor.That’s according to findings from JPCERT/CC, which said the intrusion leveraged legitimate services like Google Drive, Bitbucket, and StatCounter. The attack was carried out around August…
-
Cybersecurity’s oversimplification problem: Seeing AI as a replacement for human agency
by
in SecurityNews
Tags: access, ai, awareness, business, ciso, computer, cyber, cybersecurity, data, election, infrastructure, intelligence, Internet, jobs, technology, threat, tool, trainingThere’s a philosophical concept called the Great Man Theory that suggests history is all about how significant individuals act as centers of gravity for society as a whole, think Alexander the Great, Napoleon Bonaparte, Queen Elizabeth I, or the founding fathers of the American Revolution.Recent research suggests that cybersecurity and related professions are developing a…
-
8 Tips for Hiring and Training Neurodivergent Talent
by
in SecurityNewsNeurodivergent talent can add so much to a cybersecurity team. How can companies ensure they have the right hiring and onboarding practices in place to ensure their success? First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-careers/8-tips-hiring-training-neurodivergent-talent
-
Russian-Speaking Ransomware Gangs on the Hunt for Pen Testers
by
in SecurityNewsIn further proof of the professionalization of Russian cybercriminal groups, ransomware gangs have been posting job ads for security positions such as pen testers, looking to boost their ransomware deployment operations. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/russian-ransomware-gangs-hunt-pen-testers
-
How to recognize employment fraud before it becomes a security issue
by
in SecurityNewsThe combination of remote work, the latest technologies, and never physically meeting your employees has made it very easy for job applicants to mask their true identities … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/11/26/employment-fraud-red-flags/
-
What the cyber community should expect from the Trump transition
by
in SecurityNews
Tags: ceo, cisa, ciso, cyber, cybersecurity, defense, disinformation, election, governance, government, infrastructure, intelligence, jobs, military, technology, threat, ukraineDonald Trump’s decisive win in this year’s presidential election promises to deliver radical changes to how the US government operates.Trump’s positions on a range of social, economic, and military issues, from immigration to human rights to the defense of Ukraine, represent significantly different postures from those of the current Biden administration and are arguably more…
-
17 hottest IT security certs for higher pay today
by
in SecurityNews
Tags: access, ai, attack, automation, blockchain, business, ceo, cisa, ciso, cloud, communications, conference, container, control, credentials, cryptography, cyber, cybersecurity, data, defense, detection, encryption, exploit, finance, fortinet, google, governance, group, guide, hacker, incident response, infosec, infrastructure, intelligence, Internet, jobs, monitoring, network, penetration-testing, privacy, reverse-engineering, risk, risk-management, skills, software, technology, threat, tool, training, windowsWith the New Year on the horizon, many IT professionals may be looking to improve their careers in 2025 but need direction on the best way. The latest data from Foote Partners may provide helpful signposts.Analyzing more than 638 certifications as part of its 3Q 2024 “IT Skills Demand and Pay Trends Report,” Foote Partners…
-
What Talent Gap? Hiring Practices Are the Real Problem
by
in SecurityNewsWhile the need for cybersecurity talent still exists, the budget may not. Here’s how to maximize security staff despite hiring freezes. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/hiring-gap-not-talent-gap
-
AI hiring bias? Men with Anglo-Saxon names score lower in tech interviews
by
in SecurityNewsStudy suggests hiding every Tom, Dick, and Harry’s personal info from HR bots First seen on theregister.com Jump to article: www.theregister.com/2024/11/21/ai_hiring_test_bias/
-
GAO: HHS Needs to Be a Better Leader in Health Sector Cyber
by
in SecurityNewsWatchdog Agency Report Points to Unimplemented Cyber Recommendations. The U.S. Department of Health and Human Services needs to take important actions to do a better job of carrying out its duties as the lead federal agency responsible for strengthening cybersecurity in the healthcare and public health sector, said a new federal watch dog agency report.…
-
5 Best Cybersecurity Certifications to Get in 2025
by
in SecurityNewsBoost your career and job security with a cybersecurity certificate. Gain in-demand skills, access to high-paying roles, and protect vital information… First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/networks/cybersecurity-certifications/
-
Active network of North Korean IT front companies exposed
by
in SecurityNewsAn analysis of the websites belonging to companies that served as a front for getting North Korean IT workers remote jobs with businesses worldwide has revealed an active … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/11/21/north-korean-it-front-companies/
-
Red red team team: Threat actors hire pentesters to test out ransomware effectiveness
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/red-red-team-team-threat-actors-hire-pentesters-to-test-out-ransomware-effectiveness
-
North Korean IT Worker Using Weaponized Video Conference Apps To Attack Job Seakers
by
in SecurityNewsNorth Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent phishing attacks leveraging malware-infected video conference apps. The group, likely based in Laos, has demonstrated a sophisticated approach, infiltrating a U.S.-based SMB IT services company to gain access to sensitive information and secure a position at a major tech company. It…
-
Russian Ransomware Gangs on the Hunt for Pen Testers
by
in SecurityNewsIn further proof of the professionalization of Russian cybercriminal groups, ransomware gangs have been posting job ads for security positions such as pen testers, looking to boost their ransomware deployment operations. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/russian-ransomware-gangs-hunt-pen-testers
-
North Korean Hackers Target Job Seekers with Malware-Laced Video Apps
by
in SecurityNewsA recent report by Unit 42 researchers uncovers a complex phishing campaign linked to a cluster of North Korean IT workers tracked as CL-STA-0237. This group used malware-infected video conference... First seen on securityonline.info Jump to article: securityonline.info/north-korean-hackers-target-job-seekers-with-malware-laced-video-apps/
-
Channel Brief: N-able Makes Key Exec Hires to Further Channel Strategy
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/channel-brief-n-able-makes-key-exec-hires-to-further-channel-strategy
-
Mozilla Foundation lays off 30% staff, drops advocacy division
by
in SecurityNewsThis is the second layoff at Mozilla this year, the first affecting dozens of staff on the side of the organization that builds the popular Firefox br… First seen on techcrunch.com Jump to article: techcrunch.com/2024/11/05/mozilla-foundation-lays-off-30-staff-drops-advocacy-division/
-
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 – Nov 17)
by
in SecurityNewsWhat do hijacked websites, fake job offers, and sneaky ransomware have in common? They’re proof that cybercriminals are finding smarter, sneakier ways to exploit both systems and people.This week makes one thing clear: no system, no person, no organization is truly off-limits. Attackers are getting smarter, faster, and more creative”, using everything from human trust…
-
North Korean IT Worker Network Tied to BeaverTail Phishing Campaign
by
in SecurityNewsBeaverTail malware has been used to target tech job seekers through fake recruiters, Palo Alto Networks’ Unit 42 has found First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/north-korean-it-worker-beavertail/
-
Iranian Threat Actors Mimic North Korean Job Scam Techniques
by
in SecurityNewsTehran Baits Aerospace Sector into Downloading Malware With Fake Job Offers. Iranian state hackers are taking a page out of North Korean tactics to entice job seekers into downloading malware, with security researchers spotting a Tehran campaign directed against the aerospace industry. It’s possible that Pyongyang shared its attack methods and tools. First seen on…
-
Iranian Hackers Target Aerospace Industry in ‘Dream Job’ Campaign
by
in SecurityNewsIran-linked Charming Kitten hackers have been running a ‘dream job’ campaign targeting the aerospace industry with the SnailResin malware. The post Iranian Hackers Target Aerospace Industry in ‘Dream Job’ Campaign appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/iranian-hackers-target-aerospace-industry-in-dream-job-campaign/
-
Iranian Threat Group Targets Aerospace Workers With Fake Job Lures
by
in SecurityNewsFirst seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/36594/Iranian-Threat-Group-Targets-Aerospace-Workers-With-Fake-Job-Lures.html