Tag: jobs
-
Under Pressure: US Charges China’s APTHire Hackers
The US Justice Department on Wednesday announced charges against members of the Chinese-backed i-Soon secret APT and APT27, the latter implicated in January’s Treasury breach. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/us-charges-china-apt-for-hire-hackers
-
Women Faced the Brunt of Cybersecurity Cutbacks in 2024
Many women are finding that they are unhappy in their cybersecurity roles, largely due to the layoffs their companies are experiencing, cutbacks, and return to in-office work policies. First seen on darkreading.com Jump to article: www.darkreading.com/remote-workforce/women-cyber-cutbacks-2024
-
US cyber, national security threatened by federal job cuts, experts say
First seen on scworld.com Jump to article: www.scworld.com/brief/us-cyber-national-security-threatened-by-federal-job-cuts-experts-say
-
National Security Threatened By Cybersecurity Job Cuts, Experts Say
First seen on scworld.com Jump to article: www.scworld.com/brief/national-security-threatened-by-cybersecurity-job-cuts-experts-say
-
DoJ Busts Alleged Global HackingHire Network of ‘Cyber Mercenaries’
Targets included the U.S. Treasury Department, journalists, and religious organisations, and the attacks intended to steal data and suppress free speech. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/us-doj-charges-chinese-nationals-hacking/
-
US Charges 12 Alleged Spies in China’s Freewheeling HackerHire Ecosystem
The Justice Department claims 10 alleged hackers and two eChinese government officials took part in a wave of cyberattacks around the globe that included breaching the US Treasury Department and more. First seen on wired.com Jump to article: www.wired.com/story/us-charges-12-alleged-spies-in-chinas-freewheeling-hacker-for-hire-ecosystem/
-
Justice Department charges Chinese hackershire linked to Treasury breach
The individuals are accused of hacking over 100 U.S. organizations over the course of a decade First seen on techcrunch.com Jump to article: techcrunch.com/2025/03/05/justice-department-charges-chinese-hackers-for-hire-linked-to-treasury-breach/
-
North Korean Fake IT Workers Pose as Blockchain Developers on GitHub
North Korean fake IT workers are creating personas on GitHub to land blockchain developer jobs at US and Japanese firms. The post North Korean Fake IT Workers Pose as Blockchain Developers on GitHub appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/north-korean-fake-it-workers-pose-as-blockchain-developers-on-github/
-
Why Cybersecurity Jobs Are Hard to Find Amid a Worker Shortage
The cybersecurity job market nowadays is facing an unusual paradox: Many roles seem open, but competition and hiring practices can make securing a position a real challenge. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/cybersecurity-jobs-hard-find-amid-worker-shortage
-
Digital nomads and risk associated with the threat of infiltred employees
Companies face the risk of insider threats, worsened by remote work. North Korean hackers infiltrate firms via fake IT hires, stealing data. Stronger vetting is key. In an increasingly connected and digitalized world, companies are facing new security challenges. The insider threat, or the risk that an employee could harm the company, is a growing…
-
GrassCall Malware Targets Job Seekers to Steal Login Credentials
Tags: credentials, crypto, cyber, cyberattack, cybercrime, group, jobs, linkedin, login, malicious, malware, russia, softwareA newly identified cyberattack campaign, dubbed GrassCall, is targeting job seekers in the cryptocurrency and Web3 sectors through fake job interviews. Attributed to the Russian-speaking cybercriminal group >>Crazy Evil,
-
North Korean Fake IT Workers Leverage GitHub to Build Jobseeker Personas
Nisos has found six personas leveraging new and existing GitHub accounts to get developer jobs in Japan and the US First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/north-korean-fake-it-workers-github/
-
Privacy Roundup: Week 9 of Year 2025
Tags: access, android, apple, attack, backdoor, breach, browser, cctv, control, cyber, cybersecurity, data, data-breach, encryption, endpoint, exploit, firmware, flaw, government, group, hacker, Internet, jobs, law, leak, malware, office, password, phishing, privacy, regulation, router, scam, service, software, switch, technology, threat, tool, update, vpn, vulnerabilityThis is a news item roundup of privacy or privacy-related news items for 23 FEB 2025 – 1 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things may overlap;…
-
What is zero trust? The security model for a distributed and risky era
Tags: access, ai, authentication, best-practice, breach, business, ceo, cloud, compliance, computer, computing, control, corporate, credentials, cyberattack, data, detection, framework, government, guide, identity, infrastructure, intelligence, jobs, login, monitoring, network, nist, office, password, ransomware, regulation, risk, saas, service, technology, threat, tool, vpn, zero-trustHow zero trust works: To visualize how zero trust works, consider a simple case: a user accessing a shared web application. Under traditional security rules, if a user was on a corporate network, either because they were in the office or connected via a VPN, they could simply click the application and access it; because…
-
Elon Musk’s Federal Worker Email Sparks ‘Security Nightmare’
Federal Agencies and Experts Alike Say Musk’s Email Request Poses Security Threat. The Department of Government Efficiency-led effort to assess whether millions of federal jobs are necessary through a bulleted list of weekly activities is causing a major security threat, in addition to mass confusion across the federal government, experts told Information Security Media Group.…
-
‘OpenAI’ Job Scam Targeted International Workers Through Telegram
An alleged job scam, led by “Aiden” from “OpenAI,” recruited workers in Bangladesh for months before disappearing overnight, according to FTC complaints obtained by WIRED. First seen on wired.com Jump to article: www.wired.com/story/openai-job-scam/
-
Beware of Fake Job Interview Challenges Targeting Developers to Deliver Malware
Tags: attack, credentials, crypto, cyber, cyberattack, jobs, korea, login, malicious, malware, north-korea, software, threatA new wave of cyberattacks, dubbed >>DeceptiveDevelopment,
-
Strategic? Functional? Tactical? Which type of CISO are you?
Tags: breach, business, ceo, cisco, ciso, cloud, compliance, cybersecurity, finance, governance, group, guide, healthcare, infrastructure, jobs, risk, service, skills, startup, strategy, technology, trainingTransformational, as in program-builders or turnaround agents.Operational, often early-career CISOs who are closer to the technology and work at small-to-midsize companies where they still perform some technical duties.Compliance, that is, risk experts typically found in highly regulated industries.Steady-state CISOs, who, in opposition to the transformational type, keep everything on an even keel.Customer-facing CISOs, usually found…
-
Cybersecurity Pros Don’t Think Much Of Their Current Job Situations
First seen on scworld.com Jump to article: www.scworld.com/brief/cybersecurity-pros-dont-think-much-of-their-current-job-situations
-
News alert: INE Security’s focus on practical security training enhances career stability in tech
Cary, NC, Feb. 19, 2025, CyberNewswire, 2025 marks a time of unprecedented volatility in the technology job market. On one hand, dependence on technology is soaring. The growth of AI and machine learning is propelling a surge in new… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/news-alert-ine-securitys-focus-on-practical-security-training-enhances-career-stability-in-tech/
-
Lloyds Bank reviews tech and engineering personnel in reorg
Admits it will be saying ‘goodbye to talented people’ in UK amid fears of jobs being offshored to India First seen on theregister.com Jump to article: www.theregister.com/2025/02/18/lloyds_tech_engineering_reorg/
-
Privacy Constraints Are Keeping Banks From Tackling Scams
M&T Bank’s Karen Boyer on Need for Shared Responsibility with Telecoms, Tech Firms. Technology solutions can help banks fight fraud, but privacy constraints are preventing them from doing an effective job to ferret out scammers, said Karen Boyer, senior vice president at M&T Bank. She supports a new Australian law that also places responsibility on…
-
How CISOs can rebuild trust after a security incident
Tags: attack, breach, business, cisco, ciso, cloud, communications, cybersecurity, data, firewall, group, incident response, jobs, linux, mobile, monitoring, risk, security-incident, service, software, strategy, vulnerabilityMaintaining sensitivity in accountability: Cisco’s Lidz emphasizes that transparency does not end at incident resolution.”Being transparent, internally in particular, by making sure stakeholders understand you and your team have learned from the incident, that there are things you would do better not just in terms of protections, but how you respond and react to incidents”…
-
CISO success story: How LA County trains (and retrains) workers to fight phishing
Tags: ai, awareness, breach, business, chatgpt, cio, ciso, cloud, compliance, computing, control, corporate, cybersecurity, data, dos, election, email, endpoint, government, hacker, healthcare, incident response, jobs, law, lessons-learned, malicious, marketplace, network, phishing, privacy, regulation, risk, risk-management, service, software, strategy, supply-chain, tactics, technology, threat, tool, training, vulnerability(The following interview has been edited for clarity and length.)At first glance, LA County’s reporting structure who reports to whom seems, well, fairly complex.We have a federated model: I report to the county CIO. Each department acts as an independent business and has its own department CIO and information security officer. Their job is to…
-
vCISOs are in high demand
Regardless of job title, 92% of executives stated they had some degree of confidence in their organization’s ability to meet compliance requirements and tackle advanced … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/14/ceos-security-strategies-confidence/
-
North Korean IT Workers Penetrate Global Firms to Install System Backdoors
In a concerning escalation of cyber threats, North Korean IT operatives have infiltrated global companies, posing as remote workers to introduce system backdoors and exfiltrate sensitive data. These activities, which generate critical revenue for the heavily sanctioned regime, also pose significant risks to corporate security and international stability. Fraudulent Hiring North Korea has capitalized on…
-
What is anomaly detection? Behavior-based analysis for cyber threats
a priori the bad thing that you’re looking for,” Bruce Potter, CEO and founder of Turngate, tells CSO. “It’ll just show up because it doesn’t look like anything else or doesn’t look like it’s supposed to. People have been tilting at that windmill for a long time, since the 1980s, trying to figure out what…
-
Sophos Lays Off 6% of Workers Following Secureworks Purchase
Cuts Hit Duplicative Roles, Positions Rooted in Secureworks Being a Public Company. Sophos laid off 6% of its staff just days after closing its $859 million acquisition of Secureworks. The job cuts will streamline duplicative roles following the Feb. 3 close of the Secureworks deal as well as reduce positions that are no longer needed…

