Tag: jobs
-
Flight delays continue across Europe after weekend cyber-attack
Software provider Collins Aerospace completing updates after Heathrow, Brussels and Berlin hit by problems<ul><li><a href=”https://www.theguardian.com/business/live/2025/sep/22/rachel-reeves-gatwick-second-runway-growth-jobs-environmental-disaster-business-live-news”>Business live latest updates</li></ul>Passengers are facing another day of flight delays across Europe, as big airports continue to grapple with the <a href=”https://www.theguardian.com/uk-news/2025/sep/20/heathrow-airport-delays-cyber-attack-berlin-brussels-cancelled-delays”>aftermath of a cyber-attack on the company behind the software used for check-in and boarding.Several of the largest airports…
-
Threat Actors Exploit Oracle Database Scheduler to Infiltrate Corporate Networks
Threat actors have begun exploiting the Oracle Database Scheduler’s External Jobs feature to execute arbitrary commands on corporate database servers, enabling stealthy initial footholds and rapid escalation of privileges. By abusing the extjobo.exe executable, attackers can run encoded PowerShell commands, establish encrypted tunnels with Ngrok, and deploy ransomware, all while evading detection through aggressive cleanup…
-
DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams
Threat actors with ties to the Democratic People’s Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style lures to deliver a known malware called BeaverTail and InvisibleFerret.”The threat actor used ClickFix lures to target marketing and trader roles in cryptocurrency and retail sector organizations rather than targeting software development roles,” GitLab…
-
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies, successfully infiltrating 34 devices across 11 organizations as part of a recruitment-themed activity on LinkedIn.Swiss cybersecurity company PRODAFT is tracking the cluster under the name Subtle Snail. It’s assessed to be affiliated with Iran’s Islamic First…
-
DOD official: We need to drop the cybersecurity talent hiring window to 25 days
Mark Gorak outlined that the department has seen a drop in the time it takes to hire, but much more work is needed. First seen on cyberscoop.com Jump to article: cyberscoop.com/dod-cyber-workforce-hiring-25-days-mark-gorak-fedtalks/
-
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future, discover what ‘good’ looks like and how to get there. Key takeaways Teams are fragmented, with most organizations lacking…
-
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future, discover what ‘good’ looks like and how to get there. Key takeaways Teams are fragmented, with most organizations lacking…
-
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future, discover what ‘good’ looks like and how to get there. Key takeaways Teams are fragmented, with most organizations lacking…
-
AI is altering entry-level cyber hiring, and the nature of the skills gap
The certification trap and broken pipelines: Other experts argued that an over reliance on CVs and certifications is one of the biggest barriers to hiring success in cybersecurity because it acts to shut out otherwise qualified candidates.”Despite bringing valuable experience and perspectives, people with 10 years of work experience are put off because there is…
-
Where CISOs need to see Splunk go next
Tags: ai, api, automation, cisco, ciso, cloud, communications, compliance, conference, crowdstrike, cybersecurity, data, data-breach, detection, finance, framework, google, incident response, intelligence, jobs, metric, microsoft, open-source, RedTeam, resilience, risk, router, siem, soar, strategy, tactics, threat, tool, vulnerabilityResilience resides at the confluence of security and observability: There was also a clear message around resilience, the ability to maintain availability and recover quickly from any IT or security event.From a Cisco/Splunk perspective, this means a more tightly coupled relationship between security and observability.I’m reminded of a chat I had with the chief risk…
-
Global hiring risks: What you need to know about identity fraud and screening trends
Hiring new employees has always carried some risk, but that risk is growing in new ways, and identity fraud is becoming more common in the hiring process. HireRight’s 2025 … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/18/global-hiring-risks-2025/
-
Criminals broke into the system Google uses to share info with cops
Talk about an inside job First seen on theregister.com Jump to article: www.theregister.com/2025/09/16/google_confirms_crims_accessed_lers/
-
Navigating Your Audit: 6 Important Questions to Ask Your Auditor
Audits are a cornerstone of security and compliance programs. They validate the strength of your controls and communicate trust to customers, regulators, and partners. At the same time, audits can be complex and resource-intensive. The difference between an efficient, value-adding audit and a stressful, prolonged one often comes down to preparation. When you hire an……
-
Navigating Your Audit: 6 Important Questions to Ask Your Auditor
Audits are a cornerstone of security and compliance programs. They validate the strength of your controls and communicate trust to customers, regulators, and partners. At the same time, audits can be complex and resource-intensive. The difference between an efficient, value-adding audit and a stressful, prolonged one often comes down to preparation. When you hire an……
-
Jaguar Land Rover extends production shutdown after cyber-attack
Carmaker says it will freeze production until at least 24 September as it continues investigations<ul><li><a href=”https://www.theguardian.com/business/live/2025/sep/16/uk-wage-growth-slows-jobs-market-cools-business-live-news-updates”>Business live latest updates</li></ul>Jaguar Land Rover has extended its shutdown on car production, as Britain’s biggest carmaker grapples with the aftermath of a cyber-attack.JLR said on Tuesday it will freeze production until at least next Wednesday, 24 September, as it…
-
Jaguar Land Rover extends production shutdown after cyber-attack
Carmaker says it will freeze production until at least 24 September as it continues investigations<ul><li><a href=”https://www.theguardian.com/business/live/2025/sep/16/uk-wage-growth-slows-jobs-market-cools-business-live-news-updates”>Business live latest updates</li></ul>Jaguar Land Rover has extended its shutdown on car production, as Britain’s biggest carmaker grapples with the aftermath of a cyber-attack.JLR said on Tuesday it will freeze production until at least next Wednesday, 24 September, as it…
-
âš¡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More
In a world where threats are persistent, the modern CISO’s real job isn’t just to secure technology”, it’s to preserve institutional trust and ensure business continuity.This week, we saw a clear pattern: adversaries are targeting the complex relationships that hold businesses together, from supply chains to strategic partnerships. With new regulations and the rise of…
-
Jaguar Land Rover supply chain workers must get Covid-style support, says union
As post-cyberattack layoffs begin, labor org argues UK goverment should step in First seen on theregister.com Jump to article: www.theregister.com/2025/09/15/covidstyle_furlough_schemes_for_jlr/
-
12 digital forensics certifications to accelerate your cyber career
Tags: access, apt, attack, browser, chrome, cloud, computer, corporate, cyber, cybercrime, cybersecurity, data, defense, detection, email, endpoint, exploit, google, government, group, hacker, hacking, Hardware, incident response, international, jobs, law, malicious, malware, microsoft, mobile, network, phone, service, skills, soc, technology, threat, tool, training, windowsCellebrite Certified Mobile Examiner (CCME)Certified Computer Examiner (CCE)CyberSecurity Forensic Analyst (CSFA)EC-Council Computer Hacking Forensic Investigator (CHFI)EnCase Certified Examiner (EnCE)Exterro AccessData Certified Examiner (ACE)GIAC Advanced Smartphone Forensics Certification (GASF)GIAC Certified Forensics Analyst (GCFA)GIAC Certified Forensic Examiner (GCFE)GIAC Cloud Forensic Responder (GCFR)GIAC Network Forensic Analysis (GNFA)Magnet Certified Forensics Examiner (MCFE) Cellebrite Certified Mobile Examiner (CCME) Out of…
-
Docker malware breaks in through exposed APIs, then changes the locks
The variant has creative twists: Setting the variant apart is its move to deny others access to the same Docker API, effectively monopolizing the attack surface. It tries to modify firewall settings (iptables, nft, firewall-cmd, etc.) via a cron job to drop or reject incoming connections to port 2375. A cron job is a scheduled…
-
When is the Right Time to Hire a CISO?
Knowing when to hire a CISO is a challenging proposition one which most organizations will eventually need to answer. The need to hire a CISO depends on a combination of factors, including but not limited to: Relevance of regulatory requirements Size of the organization Complexity of operations Sensitivity of data handled or processed Desired risk…
-
Securing Agents Isn’t the Customer’s Job, it’s the Platform’s
As enterprises adopt AI agents at scale, security must evolve beyond policies and human oversight. From protecting enterprise data and preventing prompt injection to enforcing permission boundaries and agent guardrails, platform providers”, not customers”, must embed security into AI systems. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/securing-agents-isnt-the-customers-job-its-the-platforms/
-
When AI nukes your database: The dark side of vibe coding
Tags: ai, application-security, attack, authentication, automation, ciso, computer, control, corporate, data, data-breach, defense, dos, email, flaw, governance, incident response, injection, jobs, LLM, microsoft, open-source, password, risk, saas, skills, supply-chain, threat, tool, training, zero-trustprivate paths, on another instance.Worthington warns this is one of the most frequent red flags in threat intel. When vibe-coded applications reach incident response, she says, “You’ll often see absence of logging, lack of source control, or weak authentication alongside hardcoded secrets. Rather than a single fingerprint, it’s a collection of sloppy behaviors that point…
-
When AI nukes your database: The dark side of vibe coding
Tags: ai, application-security, attack, authentication, automation, ciso, computer, control, corporate, data, data-breach, defense, dos, email, flaw, governance, incident response, injection, jobs, LLM, microsoft, open-source, password, risk, saas, skills, supply-chain, threat, tool, training, zero-trustprivate paths, on another instance.Worthington warns this is one of the most frequent red flags in threat intel. When vibe-coded applications reach incident response, she says, “You’ll often see absence of logging, lack of source control, or weak authentication alongside hardcoded secrets. Rather than a single fingerprint, it’s a collection of sloppy behaviors that point…
-
When AI nukes your database: The dark side of vibe coding
Tags: ai, application-security, attack, authentication, automation, ciso, computer, control, corporate, data, data-breach, defense, dos, email, flaw, governance, incident response, injection, jobs, LLM, microsoft, open-source, password, risk, saas, skills, supply-chain, threat, tool, training, zero-trustprivate paths, on another instance.Worthington warns this is one of the most frequent red flags in threat intel. When vibe-coded applications reach incident response, she says, “You’ll often see absence of logging, lack of source control, or weak authentication alongside hardcoded secrets. Rather than a single fingerprint, it’s a collection of sloppy behaviors that point…
-
‘I broke completely’: how jobseekers from Africa are being tricked into slavery in Asia’s cyberscam compounds
A growing number of Kenyans, Ugandans and Ethiopians are being trafficked to Myanmar, where missing online scam targets leads to beatings and torture”¢ <a href=”https://www.theguardian.com/global-development/2025/sep/08/myanmar-military-junta-scam-centres-trafficking-crime-syndicates-kk-park”>Revealed: the huge growth of Myanmar scam centres that may hold 100,000 trafficked peopleWithin hours of landing in Bangkok from Nairobi last December to start a job as a customer service…

