Tag: jobs
-
Trump’s CISA budget lays out deep job cuts, program reductions
Critical infrastructure organizations and small businesses would get less support under the president’s fiscal 2026 funding plan. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-trump-2026-budget-proposal/749539/
-
Microsoft Invests $400 Million in Switzerland for AI and Cloud
Microsoft invests $400M in Swiss AI and cloud infrastructure, enhancing data security and job training. Discover how this impacts local economy! First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/microsoft-invests-400-million-in-switzerland-for-ai-and-cloud/
-
PureHVNC RAT distributed via job lures in new phishing attack
First seen on scworld.com Jump to article: www.scworld.com/brief/purehvnc-rat-distributed-via-job-lures-in-new-phishing-attack
-
PureHVNC RAT Uses Fake Job Offers and PowerShell to Evade Security Defenses
A new and highly evasive malware campaign delivering the PureHVNC Remote Access Trojan (RAT) has been identified by Netskope Threat Labs, showcasing a complex multi-layer infection chain designed to bypass modern security defenses. This campaign, active in 2024, leverages fake job offers from well-known global brands like Bershka, Fragrance Du Bois, John Hardy, and Dear…
-
Even $5M a year can’t keep top CISOs happy
Some are unhappy with budgets too: : Not all CISOs working at large enterprises are happy with their six-figure salaries. According to the survey, only 55% of respondents working for $20 billion-plus firms were satisfied with what they were being paid and that group was the least satisfied of all questioned with what they were…
-
Building a Security Portfolio Even When You’re a Blue Teamer
Things to Include on Your CV When Your Job Focuses on Keeping Systems Running If you’re a junior SOC analyst, a GRC specialist, or someone working in ICS environments, the idea of a cyber portfolio might seem irrelevant. It’s not. Employers need tangible proof of your skills, and a well-constructed portfolio does just that –…
-
Maturing UK fintechs increase tech and cyber security hiring
Increased hiring reflects that fintechs are maturing and now require more cyber security and compliance experts First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366624933/Maturing-UK-fintechs-increase-tech-and-cyber-security-hiring
-
Why layoffs increase cybersecurity risks
A wave of layoffs has swept through the tech industry, leaving IT teams in a rush to revoke all access those employees may have had. Additionally, 54% of tech hiring managers … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/26/layoffs-cybersecurity-risks/
-
Digitales Nomadentum: Mit dem Laptop um die Welt
Usbekistan, Georgien, Indien, Iran: Unsere Autorin lebt seit gut zehn Jahren als digitale Nomadin. Ein Rückblick auf skurrile Jobs und technische Herausforderungen. First seen on golem.de Jump to article: www.golem.de/news/digitales-nomadentum-mit-dem-laptop-um-die-welt-2505-195359.html
-
Top 12 US cities for cybersecurity job and salary growth
Tags: access, ai, apple, attack, blockchain, business, country, crowdstrike, cyber, cybersecurity, data, defense, finance, fintech, government, group, infrastructure, insurance, iot, jobs, metric, microsoft, nvidia, office, okta, privacy, software, startup, strategy, supply-chain, technology, training, warfareWhile major hubs like San Francisco naturally come to mind, and perform well based on the metrics we evaluated, there are many lesser-known cities that may be just as promising, if not more. These emerging destinations can offer easier access to job opportunities, more sustainable career paths, higher pay, and a lower cost of living.Here’s…
-
From LinkedIn to Lies: What a Job Scam Looks Like Now
Job scams are on the rise, targeting remote workers and new grads. Learn how to spot red flags, protect your info, and avoid falling victim. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/trends/what-job-scams-look-like/
-
Mass federal worker layoffs exploited by Chinese cyberespionage campaign
First seen on scworld.com Jump to article: www.scworld.com/brief/mass-federal-worker-layoffs-exploited-by-chinese-cyberespionage-campaign
-
Cisco Hires Former Google Cloud Exec As New Security GM
Cisco has hired former Google Cloud executive Peter Bailey as the new senior vice president and general manager of its security business, executives disclosed Tuesday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/cisco-hires-former-google-cloud-exec-as-new-security-gm
-
More_Eggs Malware Uses Job Application Emails to Distribute Malicious Payloads
The More_Eggs malware, operated by the financially motivated Venom Spider group (also known as Golden Chickens), continues to exploit human trust through meticulously crafted social engineering. Sold as a Malware-as-a-Service (MaaS) to notorious threat actors like FIN6 and Cobalt Group, this potent JavaScript backdoor primarily targets human resources (HR) departments by masquerading as job application…
-
4 ways to safeguard CISO communications from legal liabilities
Tags: ciso, communications, corporate, cyber, data, defense, governance, government, incident, jobs, law, privacy, regulation, risk, vulnerabilityPay attention to the medium: CISOs also need to pay attention to what they say based on the medium in which they are communicating. Pay attention to “how we communicate, who we’re communicating with, what platforms we’re communicating on, and whether it’s oral or written,” Angela Mauceri, corporate director and assistant general counsel for cyber…
-
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that’s targeting publicly accessible Redis servers.The malicious activity has been codenamed RedisRaider by Datadog Security Labs.”RedisRaider aggressively scans randomized portions of the IPv4 space and uses legitimate Redis configuration commands to execute malicious cron jobs on vulnerable systems,” First seen on thehackernews.com Jump to…
-
CISA has a new No. 2 … but still no official top dog
Brain drain, budget cuts, constant cyberthreats – who wouldn’t want this job? First seen on theregister.com Jump to article: www.theregister.com/2025/05/19/cisa_deputy_director_gottumukkala/
-
CISA has a new No. 2 – but still no official top dog
Brain drain, budget cuts, and constant cyberthreats – who wouldn’t want this job? First seen on theregister.com Jump to article: www.theregister.com/2025/05/19/cisa_deputy_director_gottumukkala/
-
S. Dakota CIO Gottumukkala Signs on as CISA Deputy Director
The addition is an important hire for the No. 2 position at the cyber agency. The main director role remains unfilled post-Easterly, with Bridget Bean taking over acting duties for now. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/gottumukkala-cisa-deputy-director
-
New Cyera Funding Round Doubles Valuation To $6 Billion: Reports
Fast-growing data security startup Cyera has reportedly raised new funding, and doubled its valuation to $6 billion, weeks after hiring a new channel chief to accelerate its work with partners. First seen on crn.com Jump to article: www.crn.com/news/security/2025/new-cyera-funding-round-doubles-valuation-to-6-billion-reports
-
Microsoft winnows: Layoffs hit software engineers hard
Python, TypeScript, Azure SDK devs among those let go First seen on theregister.com Jump to article: www.theregister.com/2025/05/16/microsofts_axe_software_developers/
-
Former U.S. Govt Employees Targeted by Chinese Intelligence
Report Uncovered Malicious Fake Job Network Operated by a Chinese Company. Recently laid off U.S. federal government officials are being targeted by Chinese intelligence through a network of front companies purporting to offer consulting work. Reports that foreign adversaries intended to recruit former officials began as soon as the administration intentions became apparent. First seen…
-
Cybersecurity Skills Framework connects the dots between IT job roles and the practical skills needed
The Linux Foundation, in collaboration with OpenSSF and Linux Foundation Education, has released the Cybersecurity Skills Framework, a global reference guide that helps … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/16/cybersecurity-skills-framework-linux-foundation/
-
Nordkoreas Cyber-Spione: Remote-Jobs als Tarnung
Mit gefälschten Identitäten und perfekt inszenierten Lebensläufen schleusen sich nordkoreanische Hacker:innen als scheinbar qualifizierte IT-Fachkräfte in Unternehmen ein mit potenziell katastrophalen Folgen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/nordkoreas-cyber-spione
-
North Korean Hackers Stole $88M by Posing as US Tech Workers
Flashpoint uncovers how North Korean hackers used fake identities to secure remote IT jobs in the US, siphoning… First seen on hackread.com Jump to article: hackread.com/north-korean-hackers-stole-88m-posing-us-tech-workers/
-
Sie kommen aus Nordkorea: Wie Unternehmen sich gegen falsche IT-Profis schützen können
Seit einiger Zeit geben sich Bedrohungsakteure:innen aus Nordkorea als legitime IT-Profis aus. Ihr Ziel: Remote-Jobs ergattern, um primär mit ihrem Gehalt nordkoreanische Interessen zu finanzieren und sekundär monetäre Mittel via Erpressung durch Datendiebstahl zu erlangen. Sophos hat insbesondere für Personalverantwortende Tipps zu Vorstellungsgesprächen, Onboarding und Compliance zusammengestellt. ‘Die Betrüger:innen haben in der Vergangenheit mit Fähigkeiten…
-
Job Seekers Targeted as Scammers Pose as Government Agencies on WhatsApp
Scammers impersonate government agencies on WhatsApp to target job seekers with fake offers, phishing sites, and identity theft… First seen on hackread.com Jump to article: hackread.com/job-seekers-targeted-scammers-government-whatsapp/

