Tag: jobs
-
Hire me! To drop malware on your computer
FIN6 moves from point-of-sale compromise to phishing recruiters First seen on theregister.com Jump to article: www.theregister.com/2025/06/11/crooks_posing_job_hunters_target_recruiters/
-
The critical role that partnerships play in shrinking the cyber skills gap
Building the cyber talent pipeline through partnerships: a real-world example: Fortinet’s work in Morocco offers an example of how uniquely crafted partnerships can help develop cyber-talent pipelines, particularly in under-resourced regions. Through the “Code 212” initiative, Fortinet works with two ministries and 12 Moroccan universities, integrating hands-on cybersecurity training for students across many disciplines. We…
-
FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
FIN6, a financially motivated group tracked for years by cybersecurity researchers, is now lurking on sites such as LinkedIn and Indeed to spread malware, a new report says. First seen on therecord.media Jump to article: therecord.media/fin6-recruitment-scam-malware-campaign
-
Hands-On Skills Now Key to Landing Your First Cyber Role
An ISC2 study found that 90% of security hiring managers would consider entry-level candidates with only previous IT work experience First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/hands-on-skills-first-cyber-role/
-
8 things CISOs have learned from cyber incidents
Tags: apt, attack, authentication, backup, breach, business, ciso, compliance, cyber, data, defense, detection, endpoint, exploit, incident, incident response, infection, insurance, jobs, malicious, malware, metric, network, ransom, ransomware, RedTeam, risk, skills, tool, training, update, virus, vulnerability, vulnerability-management, zero-trust2. You’ll need shift from defense to offence: The role and the CISO won’t be the same after an incident.”My job on December 11 was very different from my job on December 12 and beyond, says Brown.Following an incident, some organizations need to change to such an extent that they need a different CISO with…
-
Is attacker laziness enabled by genAI shortcuts making them easier to catch?
Tactics of attackers: The OpenAI report, published in June, detailed a variety of defenses the company has deployed against fraudsters. One, for example, involved bogus job applications.”We identified and banned ChatGPT accounts associated with what appeared to be multiple suspected deceptive employment campaigns. These threat actors used OpenAI’s models to develop materials supporting what may…
-
FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware
The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes hosted on Amazon Web Services (AWS) infrastructure to deliver a malware family called More_eggs.”By posing as job seekers and initiating conversations through platforms like LinkedIn and Indeed, the group builds rapport with recruiters before delivering phishing messages that lead to malware,”…
-
M&S resumes online orders six weeks after cyber-attack
Retailer estimated to have lost about £25m a week after it was forced to pause online shopping<ul><li><a href=”https://www.theguardian.com/business/live/2025/jun/10/us-china-trade-talks-resume-uk-jobs-market-weakening-payrolls-tumble-growth-economy-business-live-news”>Business live latest updates</li></ul>Marks & Spencer has reopened its website to shoppers, six weeks after it was forced to halt online orders after a cyber-attack.On its website, M&S said customers “can now place online orders with standard delivery…
-
M&S website resumes online orders six weeks after cyber-attack
Retailer estimated to have lost about £25m a week after it was forced to pause online shopping<ul><li><a href=”https://www.theguardian.com/business/live/2025/jun/10/us-china-trade-talks-resume-uk-jobs-market-weakening-payrolls-tumble-growth-economy-business-live-news”>Business live latest updates</li></ul>Marks & Spencer has reopened its website to shoppers, six weeks after it was forced to halt online orders after a cyber-attack.The retailer said on its website that customers “can now place online orders with…
-
Over 1,000 Employees Departed CISA Since Trump Administration Began
The Cybersecurity and Infrastructure Security Agency (CISA), the U.S. government’s frontline civilian cybersecurity force, has lost nearly one-third of its workforce”, roughly 1,000 employees”, since the start of the current Trump administration, according to multiple sources and internal communications. This exodus, driven by buyouts, early retirements, and layoffs, has left the agency with approximately 2,200…
-
Beyond Generic Chatbots: Rise of Industry-Specific AI Agents
Iksha Labs CEO Hitesh Ganjoo on AI Hiring Agent ‘Rumi’. As companies shift away from broad, general-purpose AI tools, Iksha Labs CEO Hitesh Ganjoo says the future lies in domain-specific agents such as Rumi, an AI hiring coworker that’s transforming interviews with speed and consistency. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/beyond-generic-chatbots-rise-industry-specific-ai-agents-a-28605
-
Docuseries Explores Mental, Physical Hardships of CISOs
During CISO: The Worst Job I Ever Wanted, several chief information security officers (CISOs) tell their stories and reveal how difficult it is to be in a role that’s still undefined despite being around for decades. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-careers/docuseries-explores-mental-physical-hardships-ciso
-
Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture
Tags: access, attack, best-practice, business, cio, ciso, communications, computer, computing, conference, corporate, crypto, cryptography, cyber, cybersecurity, data, defense, email, encryption, finance, government, group, ibm, identity, incident, incident response, infrastructure, jobs, lessons-learned, metric, microsoft, mitre, monitoring, nist, risk, service, strategy, technology, threat, tool, training, update, vulnerability, vulnerability-management, warfareCheck out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the latest on exposure response strategies and on CISO compensation and job satisfaction. Dive into five things that are top of…
-
Prep for Layoffs Before They Compromise Security
Mass layoffs create cybersecurity vulnerabilities through dormant accounts and disgruntled employees. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/prep-layoffs-before-compromise-security
-
Top US cyber officials face divergent paths after Senate confirmation
Tags: china, cisa, cyber, cybersecurity, government, incident, incident response, iran, jobs, russia, strategy, technology, threatDivergent strategies moving forward: The road ahead appears paved with opportunity for Cairncross, while Plankey faces a narrower path of contraction and clean-up at CISA.”This is a perfect opportunity for the NCD [national cyber director] position to work,” Center on Cyber and Technology Innovation’s Montgomery said. “You have a National Security Council focused on the…
-
What the Arc Browser Story Reveals About the Future of Browser Security
By Dakshitaa Babu, Security Researcher, SquareX In a candid letter that Joshua Miller, CEO of Arc Browser, wrote to the community, he revealed a truth the tech industry has been dancing around: “the dominant operating system on desktop wasn’t Windows or macOS anymore”Š”, “Šit was the browser.” The evidence is everywhere”Š”, “Šcloud revenue surging year…
-
Cybersecurity’s ‘rare earth’ skills: Scarce, high-value, and critical for future defense
Tags: ai, attack, business, ciso, computing, crypto, cryptography, cyber, cybersecurity, data, defense, detection, intelligence, jobs, programming, risk, skills, strategy, supply-chain, technology, threat, trainingAdvanced threat hunting expertise Like the rarest elements, professionals who can proactively identify novel threats and adversary techniques before they cause damage are scarce and extremely valuable. Why are these skills rare? Many factors have led to this scenario:Complex skill requirements: Effective threat hunters need a unique combination of skills, including deep cyber knowledge, programming…
-
This $35 Training Pack May Help You Land a Cybersecurity Job
Unlock lifetime access to 11 beginner-friendly cybersecurity and networking courses taught by real experts First seen on techrepublic.com Jump to article: www.techrepublic.com/article/cybersecurity-soc-analyst-bundle/
-
Trump’s 2026 Budget Guts CISA: Nearly 30% of Jobs and $500M on the Chopping Block
Trump’s 2026 budget proposal seeks to cut nearly 30% of CISA’s workforce and $495M from its budget, slashing key cyber defense and election security programs. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/trump-2026-budget-cuts-cisa/
-
What Tackling the SaaS Security Problem Means to Me
By Kevin Hanes, CEO of Reveal Security When I reflect on the years I spent leading one of the world’s largest Security Operations Centers (SOCs) and incident response teams, the lessons learned aren’t just war stories”¦they’re a playbook for how we should rethink our responsibilities in the face of today’s fast-evolving attack surfaces. Back then,…
-
Trump Budget Plan to Cut Nearly 1000 Jobs at Cyber Agency CISA
CISA is facing $495m budget cut, losing 1000 employees and reducing staff to 2324 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/trump-cut-nearly-1000-jobs-cisa/
-
Trump Budget Plan to Cut Nearly 1000 Jobs at Cyber Agency CISA
CISA is facing $495m budget cut, losing 1000 employees and reducing staff to 2324 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/trump-cut-nearly-1000-jobs-cisa/
-
ACDS Continues Global Expansion With Announcement of New French Entity
Advanced Cyber Defence Systems (ACDS) has today unveiled plans for further global expansion with the establishment of its new French entity. This follows its expansion across APAC last year through partnerships and personnel hires in the region. ACDS France will help organisations across France, as well as mainland Europe, to protect the expanded attack surface…
-
Monster Mitigates Malicious Traffic Fake Accounts with DataDome’s AI-Powered Protection
By eliminating click fraud, blocking job scrapers, stopping fake accounts, and reducing DevOps workload, Monster safeguarded its revenue, improved the platform’s integrity, and freed up engineering resources thanks to DataDome First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/monster-mitigates-malicious-traffic-fake-accounts-with-datadomes-ai-powered-protection/
-
Trump budget proposal would slash more than 1,000 CISA jobs
The fate of the fiscal 2026 budget blueprint, which includes a $495 million reduction for the agency, is uncertain. First seen on cyberscoop.com Jump to article: cyberscoop.com/trump-budget-proposal-would-slash-more-than-1000-cisa-jobs/

