Tag: jobs
-
North Korea’s >>Contagious Interview<< Floods npm with 200 New Packages, Using Fake Crypto Jobs to Deploy OtterCookie Spyware
The post North Korea’s >>Contagious Interview
-
Because fraud detection deserves better than another AI-written SEO page
If you landed here after searching for something like “browser fingerprint test”, “bot detection API”, or “Kameleo anti-detect browser”, then welcome. The search engine did its job, and so did we. Let’s be honest. The internet is full of low-quality SEO pages First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/because-fraud-detection-deserves-better-than-another-ai-written-seo-page/
-
Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools
If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms are fast, flexible, and easy to work with”, making them favorites for IT teams. But there’s a catch…The very tools that make your job easier might also be the reason your systems are at risk.These tools are…
-
Bossware booms as bots determine whether you’re doing a good job
A lot of companies are turning to employee monitoring tools to make sure workers aren’t slacking off First seen on theregister.com Jump to article: www.theregister.com/2025/11/23/bossware_monitor_remote_employees/
-
CISOs Get Real About Hiring in the Age of AI
Dark Reading Confidential Episode 12: Experts help cyber job seekers get noticed, make an argument for a need to return to the hacker ethos of a bygone era, and have a stark conversation about keeping AI from breaking the sector’s talent pipeline for years to come. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/ciscos-get-real-about-hiring-age-ai
-
2026 CSO Hall of Fame call for nominations
Tags: ceo, cio, ciso, corporate, cybersecurity, finance, google, group, infrastructure, international, jobs, risk, risk-management, sans, technology2025 CSO Hall of Fame Honorees Meg Anderson, VP & CISO (retired), Principal Financial Group Bob Bruns, CISO, Avanade Jonathan Chow, CISO, Genesys Mignona Cote, CISO, Infor Laura Deaner, Managing Director, CISO, The Depository Trust & Clearing Corporation (DTCC) George Finney, CISO, University of Texas System Michael Gordon, SVP & CISO, McDonald’s Ron Green, Cybersecurity Fellow/Former CSO, Mastercard Shawn Henry, CSO, CrowdStrike Todd Lukens,…
-
2026 CSO Hall of Fame call for nominations
Tags: ceo, cio, ciso, corporate, cybersecurity, finance, google, group, infrastructure, international, jobs, risk, risk-management, sans, technology2025 CSO Hall of Fame Honorees Meg Anderson, VP & CISO (retired), Principal Financial Group Bob Bruns, CISO, Avanade Jonathan Chow, CISO, Genesys Mignona Cote, CISO, Infor Laura Deaner, Managing Director, CISO, The Depository Trust & Clearing Corporation (DTCC) George Finney, CISO, University of Texas System Michael Gordon, SVP & CISO, McDonald’s Ron Green, Cybersecurity Fellow/Former CSO, Mastercard Shawn Henry, CSO, CrowdStrike Todd Lukens,…
-
Invisible battles: How cybersecurity work erodes mental health in silence and what we can do about it
Always-on alertness Threats don’t wait. Neither does your pager. You’re expected to respond instantly, on holidays, birthdays, weekends and 2 a.m. system alerts. Even when nothing’s burning, your mind stays wired.That permanent readiness? It’s exhaustion disguised as dedication. Sleep suffers. Focus slips. And when your nervous system never gets to shut down, it starts to…
-
Invisible battles: How cybersecurity work erodes mental health in silence and what we can do about it
Always-on alertness Threats don’t wait. Neither does your pager. You’re expected to respond instantly, on holidays, birthdays, weekends and 2 a.m. system alerts. Even when nothing’s burning, your mind stays wired.That permanent readiness? It’s exhaustion disguised as dedication. Sleep suffers. Focus slips. And when your nervous system never gets to shut down, it starts to…
-
North Korean Scam Job Platform Targets U.S. AI Developers
A sophisticated new variant of the North Korean-linked Contagious Interview campaign has emerged, featuring an unprecedented level of polish and technical sophistication designed to compromise job-seeking AI developers, software engineers, and cryptocurrency professionals. Unlike typical DPRK IT worker infiltration schemes, this operation targets real individuals through an elaborate fake recruitment platform that mimics legitimate hiring…
-
North Korean Scam Job Platform Targets U.S. AI Developers
A sophisticated new variant of the North Korean-linked Contagious Interview campaign has emerged, featuring an unprecedented level of polish and technical sophistication designed to compromise job-seeking AI developers, software engineers, and cryptocurrency professionals. Unlike typical DPRK IT worker infiltration schemes, this operation targets real individuals through an elaborate fake recruitment platform that mimics legitimate hiring…
-
Cybersecurity-Mitarbeiter bei Datenklau für Hacker erwischt
Ein Insider bei Crowdstrike soll einer Cybergang für 25.000 US-Dollar interne Informationen zugespielt haben. Nun ist er seinen Job los. First seen on golem.de Jump to article: www.golem.de/news/crowdstrike-cybersecurity-mitarbeiter-bei-datenklau-fuer-hacker-erwischt-2511-202506.html
-
The CISO’s greatest risk? Department leaders quitting
What CISOs can and should be doing: The situation isn’t hopeless; there are steps CISOs can and should take to help avoid defections. It’s a matter of making staff a priority. PayNearMe’s Hobson says CISOs need to ask themselves whether functional security leaders are wearing too many hats with too few opportunities to advance, and…
-
Dark Web Job Market Evolved Prioritizes Practical Skills Over Formal Education
The underground labor market has undergone a significant transformation. According to new research analyzing 2,225 job-related posts collected from shadow forums between January 2023 and June 2025. The dark web job market now emphasizes practical skills and real-world experience over traditional credentials, marking a notable shift from previous patterns and reflecting broader global employment trends.”‹…
-
Dark Web Job Market Evolved Prioritizes Practical Skills Over Formal Education
The underground labor market has undergone a significant transformation. According to new research analyzing 2,225 job-related posts collected from shadow forums between January 2023 and June 2025. The dark web job market now emphasizes practical skills and real-world experience over traditional credentials, marking a notable shift from previous patterns and reflecting broader global employment trends.”‹…
-
Sneaky2FA phishing tool adds ability to insert legit-looking URLs
A look at Sneaky2FA: Sneaky2FA operates through a full-featured bot on Telegram, says the report. Customers reportedly receive access to a licensed, obfuscated version of the source code and deploy it independently. This means they can customize it to their needs. On the other hand, the report notes, Sneaky2FA implementations can be reliably profiled and…
-
Sneaky2FA phishing tool adds ability to insert legit-looking URLs
A look at Sneaky2FA: Sneaky2FA operates through a full-featured bot on Telegram, says the report. Customers reportedly receive access to a licensed, obfuscated version of the source code and deploy it independently. This means they can customize it to their needs. On the other hand, the report notes, Sneaky2FA implementations can be reliably profiled and…
-
LLM-generated malware is improving, but don’t expect autonomous attacks tomorrow
Researchers tried to get ChatGPT to do evil, but it didn’t do a good job First seen on theregister.com Jump to article: www.theregister.com/2025/11/20/llmgenerated_malware_improving/
-
Behind the firewall: The hidden struggles of cyber professionals with a disability
Daisy Wong Daisy WongWhen Daisy Wong, head of security awareness at Medibank, first entered cybersecurity, she didn’t expect to become an advocate for inclusion, she just wanted to prove that being in a wheelchair was no barrier to what she could achieve. “I never wanted to be in cybersecurity. I did marketing at uni,” she…
-
US Cyber Defense Agency Admits to Major Staffing Crisis
Internal Memo Says Trump-Era Cuts ‘Hampered’ CISA During ‘Pivotal Moment’. The Cybersecurity and Infrastructure Security Agency is reeling from an apparent 40% vacancy rate in several key divisions following White House-driven cuts and a prolonged government shutdown, according to an internal memo revealing how recent layoffs were undermining federal readiness. First seen on govinfosecurity.com Jump…
-
5 plead guilty to laptop farm and ID theft scheme to land North Koreans US IT jobs
Fleets of laptops run from US residences gave appearance workers were in the US. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/11/5-plead-guilty-to-laptop-farm-and-id-theft-scheme-to-land-north-koreans-us-it-jobs/
-
CISA, eyeing China, plans hiring spree to rebuild its depleted ranks
The agency will also change some of its workforce policies to avoid driving away talented staff. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-hiring-workforce-strategy/805733/
-
North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes
Developers remain a high-value target: Researchers highlighted that the campaign specifically targets developers involved in crypto and Web3 projects, using realistic-sounding personas and demo applications (real estate, DeFi, game forks) to lower suspicion. The state-linked actors’ shift from direct payload hosting to abusing legitimate JSON storage services suggests that even benign developer-centric platforms are now…
-
North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes
Developers remain a high-value target: Researchers highlighted that the campaign specifically targets developers involved in crypto and Web3 projects, using realistic-sounding personas and demo applications (real estate, DeFi, game forks) to lower suspicion. The state-linked actors’ shift from direct payload hosting to abusing legitimate JSON storage services suggests that even benign developer-centric platforms are now…
-
The rise of the chief trust officer: Where does the CISO fit?
Tags: ai, business, ceo, ciso, compliance, control, credentials, cybersecurity, data, governance, grc, jobs, marketplace, metric, office, privacy, risk, soc, strategy, technology, vulnerabilityCISO and CTrO: A model for a working partnership?: As customers, partners and regulators demand greater openness and assurance, those in the role say building trust, not just security, is the answer. Trust is touted as a differentiator for organizations looking to strengthen customer confidence and find a competitive advantage. Trust cuts across security, privacy,…
-
Product showcase: SecAlerts Relevant, actionable, upthe-minute vulnerability alerts
Do you spend countless hours tracking vulnerabilities in order to keep your software secure? Are you looking for a service to make your job easier by providing relevant, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/17/product-showcase-secalerts-vulnerability-alerts/
-
NDSS 2025 Heimdall: Towards Risk-Aware Network Management Outsourcing
SESSION Session 3A: Network Security 1 Authors, Creators & Presenters: Yuejie Wang (Peking University), Qiutong Men (New York University), Yongting Chen (New York University Shanghai), Jiajin Liu (New York University Shanghai), Gengyu Chen (Carnegie Mellon University), Ying Zhang (Meta), Guyue Liu (Peking University), Vyas Sekar (Carnegie Mellon University) PAPER PAPER Heimdall: Towards Risk-Aware Network Management…
-
TDL 009 – Inside DNS Threat Intelligence: Privacy, Security Innovation
Tags: access, apple, attack, automation, backup, best-practice, business, ceo, cisco, ciso, cloud, computer, control, corporate, country, crime, cybersecurity, data, dns, encryption, finance, firewall, government, infrastructure, intelligence, Internet, jobs, law, linkedin, malicious, marketplace, middle-east, monitoring, msp, network, office, privacy, regulation, risk, service, software, strategy, threat, tool, windows, zero-trustSummary Inside DNS Threat Intelligence: Privacy, Security & Innovation In this episode of the Defenders Log, host David Redekop speaks with Tim Adams, the founder of the protective DNS resolver Scout DNS. Tim shares his origin story, explaining how he transitioned from a wireless network integrator to building his own DNS solution. He saw a…

