Tag: jobs
-
AI video company arouses fury by boasting about replacing creative jobs
Marketing stunt backfires with creators First seen on theregister.com Jump to article: www.theregister.com/2026/02/06/higgsfield_ai_job_loss/
-
Workday reveals around 400 staff soon won’t have to work another day
Tags: jobsJob cuts to fall hardest on non-revenue generating roles on the Global Customer Operations team First seen on theregister.com Jump to article: www.theregister.com/2026/02/04/workday_layoffs_400_jobs/
-
Ex-Nuance IT Worker Faces More Charges in Geisinger Breach
Terminated Employee Accused of Stealing 1 Million Patient Records. A former Nuance Communications IT worker is facing additional federal charges in an ongoing criminal case alleging he downloaded and stored on a personal hard drive with more than 1 million patient records of a Nuance client two days after he was terminated from his job…
-
The blind spot every CISO must see: Loyalty
Tags: access, ai, ciso, corporate, data, espionage, exploit, finance, framework, gartner, government, intelligence, jobs, malicious, monitoring, risk, strategy, tool, training, vulnerability, zero-trustHow the misread appears in practice: Recent examples illustrate the point. In the US federal sphere, abrupt terminations under workforce reduction initiatives have left former employees with lingering access to sensitive systems, amplifying the potential for data exposure or retaliation. Corporate cases show a similar dynamic: engineers or executives who have spent years building institutional…
-
Four new vulnerabilities found in Ingress NGINX
Tags: access, api, authentication, container, cve, cybersecurity, data, exploit, group, injection, jobs, kubernetes, malicious, risk, service, strategy, vulnerabilitycustom-errors configuration that includes HTTP errors 401 or 403, and if the configured default custom-errors backend is defective and fails to respect the X-Code HTTP header, then an Ingress with the auth-url annotation may be accessed even when authentication fails.CVE-2026-24512 is a configuration injection vulnerability where the rules.http.paths.path Ingress field can be used to inject configuration into nginx.…
-
KI-basierte Disruption der Arbeitswelt: 80 Prozent der Menschen werden ihren Job verlieren
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/ki-basierte-disruption-arbeitswelt-80-prozent-job-verlust
-
Ex-Nuance IT Worker Face More Charges in Geisinger Breach
Terminated Employee Accused of Stealing 1M Patient Records. A former Nuance Communications IT worker is facing additional federal charges in an ongoing criminal case alleging he downloaded and stored on a personal hard drive with more than 1 million patient records of a Nuance client two days after he was terminated from his job in…
-
Securing Agents Isn’t the Customer’s Job, It’s the Platform’s
Securing AI agents can’t fall on customers. Platform providers must own data protection, prompt injection defense and agent guardrails. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/securing-agents-isnt-the-customers-job-its-the-platforms-2/
-
Significant Ransomware Firewall Misconfiguration Breach
When “Secure by Design” Fails at the Edge Firewalls are still widely treated as the first and final line of defense. Once deployed, configured, and updated, they are often assumed to be a stable control that quietly does its job in the background. Recent ransomware incidents suggest that the assumption is becoming dangerous. In early…
-
Microsoft Hires Ex-Google Cloud President Hayete Gallot As New Security Chief
Microsoft confirmed Wednesday that it has hired former Google Cloud executive Hayete Gallot to head its security division, replacing Charlie Bell. First seen on crn.com Jump to article: www.crn.com/news/security/2026/microsoft-hires-ex-google-cloud-president-hayete-gallot-as-new-security-chief
-
How To Get Your First Job In Cybersecurity
First seen on thesecurityblogger.com Jump to article: www.thesecurityblogger.com/how-to-get-your-first-job-in-cybersecurity/
-
Should I stay or should I go?
Tags: access, breach, business, ceo, cio, ciso, communications, compliance, cybersecurity, finance, fraud, insurance, jobs, network, risk, strategy, supply-chain, update, vulnerabilityRed flag: Cognitive disconnect: Lack of access to executives and the board comes up repeatedly in Cybersecurity Ventures reports as a top reason CISO’s decide to leave their jobs, according to Steve Morgan, founder of Cybersecurity Ventures. He cites lack of support as another top reason CISO’s leave.Splunk’s 2025 CISO report found 29% of respondents…
-
Chinese Money Laundering Jargon via Google’s Gemini
After having a short discussion with Gemini about Chinese Money Laundering, I could tell we weren’t quite connecting on my Mandarin-assistance requests, so I shared an example post from a Telegram “Crime-as-a-Service” group that was part of a Chinese Guarantee Syndicate. For context, these posts were made in the Tudou Guarantee Syndicate’s group dedicated to…
-
‘Deepfakes spreading and more AI companions’: seven takeaways from the latest artificial intelligence safety report
Annual review highlights growing capabilities of AI models, while examining issues from cyber-attacks to job disruptionThe International AI Safety report is an <a href=”https://www.theguardian.com/technology/2025/jan/29/what-international-ai-safety-report-says-jobs-climate-cyberwar-deepfakes-extinction”>annual survey of technological progress and the risks it is creating across multiple areas, from deepfakes to the jobs market.Commissioned at the 2023 global AI safety summit, it is chaired by the…
-
County Pays $600K to Wrongfully Jailed Pen Testers
Iowa police arrested two penetration testers in 2019 for doing their jobs, highlighting the risk to security professionals in red teaming exercises. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/county-pays-600k-wrongfully-jailed-pen-testers
-
How risk culture turns cyber teams predictive
Tags: access, compliance, control, credentials, cyber, cybersecurity, data-breach, detection, identity, intelligence, jobs, ransomware, resilience, risk, serviceRisk culture: What it is when you strip the slogans: People talk about culture like it’s soft. Posters. Values. A town hall with applause on cue.Culture is harder. Culture is what people do when nobody is watching, and when the clock is loud. Culture is what gets you the truth at 4 p.m., not at…
-
When responsible disclosure becomes unpaid labor
Tags: ai, bug-bounty, ciso, cloud, compliance, control, credentials, cve, cvss, cybersecurity, data, email, exploit, finance, flaw, governance, healthcare, incident response, infrastructure, jobs, open-source, ransom, risk, security-incident, service, software, threat, tool, update, vulnerability, warfaresupposed to function and how it increasingly does in practice. Enter the gray zone of ethical disclosure: The result is a growing gray zone between ethical research and adversarial pressure. Based on years of reporting on disclosure disputes, that gray zone tends to emerge through a small set of recurring failure modes.Silent treatment and severity…
-
Neuer Job als Senior RPA-Developer gesucht? Schau dir unsere Top Jobs an:
Tags: jobsFirst seen on t3n.de Jump to article: t3n.de/news/unsere-jobs-der-woche-1175973/
-
Banker claims Oracle may slash up to 30,000 jobs, sell health unit to pay for AI build-out
Cerner, though acquired in 2022, is nothing to multibillion black hole First seen on theregister.com Jump to article: www.theregister.com/2026/01/29/oracle_td_cowen_note/
-
Java developers want container security, just not the job that comes with it
BellSoft survey finds 48% prefer pre”‘hardened images over managing vulnerabilities themselves First seen on theregister.com Jump to article: www.theregister.com/2026/01/30/java_developers_container_security/
-
Employment Fraud Hiring Risk: When Access Becomes Risk
Nisos Employment Fraud & Hiring Risk: When Access Becomes Risk Hiring has long been treated as an administrative function. Once a candidate clears background checks and completes onboarding, trust is assumed… First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/employment-fraud-hiring-risk-when-access-becomes-risk/
-
France Travail fined Euro5 million for failing to protect job seeker data
France data protection authority CNIL has fined public employment agency France Travail Euro5 million for failing to ensure the security of personal data of job seekers. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/29/france-travail-5-million-eur-fine/
-
France fines unemployment agency Euro5 million over data breach
The French data protection authority fined the national employment agency Euro5 million (nearly Euro6 million) for failing to secure job seekers’ data, which allowed hackers to steal the personal information of 43 million people. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/france-fines-unemployment-agency-5-million-over-data-breach/
-
Cybercriminals Leverage AI-Generated Malicious Job Offers to Spread PureRAT Malware
A Vietnamese threat actor is using AI-authored code to power a phishing campaign that delivers the PureRAT malware and related payloads, leveraging realistic job-themed lures to compromise corporate systems. The campaign, first documented by Trend Micro in December 2025, initially used malicious ZIP and RAR attachments posing as job opportunity documents. More recent activity observed…
-
From Triage to Threat Hunts: How AI Accelerates SecOps
If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the “Autonomous SOC” and suggested a future where algorithms replaced analysts.That future has not arrived. We have not seen mass layoffs or empty security operations centers. We have…
-
Delegation is a risk decision every leader makes, not an ops choice
Tags: access, ai, awareness, breach, business, communications, compliance, control, finance, governance, infrastructure, jobs, resilience, risk, risk-assessment, service, toolAirlines and booking platforms, overwhelmed by volume and operational pressure, delegated financial decision-making to automated systems that could issue credits, delay refunds, or apply preset rules at scale.In many cases, those systems operated exactly as configured. They stayed within internal thresholds, followed approved logic, and reduced immediate operational load. The problem surfaced later. Customers challenged outcomes.…
-
Skills CISOs need to master in 2026
Tags: access, ai, business, ciso, cloud, compliance, credentials, cyber, cybersecurity, data, endpoint, finance, firewall, group, Hardware, identity, infrastructure, intelligence, jobs, resilience, risk, risk-management, skills, strategy, threat, tool, trainingTop technical skills: In addition to strong knowledge of AI systems, today’s CISOs need a solid foundation in the technologies that define modern enterprise environments. The (ISC)² CISSP is still widely regarded as the gold standard for broad expertise in security architecture, risk management, and governance. “Regulators will expect this, and it still appears in…
-
Overcoming AI fatigue
Tags: access, ai, awareness, business, ciso, cloud, control, data, finance, governance, incident response, jobs, metric, monitoring, privacy, risk, strategy, supply-chain, technology, tool, training, zero-trustbefore it becomes fully entrenched in every corner of the business. It’s a rare opportunity, one we shouldn’t waste. A big part of the confusion comes from the word “AI” itself. We use the same label to talk about a chatbot drafting marketing copy and autonomous agents that generate and implement incident response playbooks. Technically,…

