Be on the lookout folks.
Something that stuck with me from my time in the Marine Corps was that "secondary" attacks can often be worse than the original one.
Skip to main content
Be on the lookout folks.
I help AI-powered companies manage cybersecurity, compliance, and privacy risk | NIST AI RMF and ISO 42001 expert | Harvard MBA | Marine veteran
1moSomething that stuck with me from my time in the Marine Corps was that "secondary" attacks can often be worse than the original one.
To view or add a comment, sign in
This is why you should do proper screening before hiring someone.
To view or add a comment, sign in
I just watched an enlightening cybersecurity YouTube video with Paula Januszkiewicz on Hacker’s Paradise: Top 10 Biggest Threats When Working From Home. Here are two key takeaways and a quote from the video: The current working environment has significantly shifted towards remote work, which brings unique cybersecurity challenges and threats. "Phishing being the number one threat currently in the world is the generic recommendation that [CISA] are making." Understanding and identifying cybersecurity threats is crucial, but it's more important to implement effective measures to mitigate these threats. Explore the video here: https://lnkd.in/epDqFGJT
To view or add a comment, sign in
Hey Boston! If there was a secret weapon to ransomware, DRaaS would be it! A multipronged approach that combines cloud-based and on-site DR is the fastest way to ensure full application and data availability. To find out more, connect with me an let's start a conversation!
Have you recently found yourself searching the Internet on how to avoid a cyber-attack or data breach? Look no further than FirstLight. We offer solutions that keep your organization secure and help you to recover quickly. Interested? Learn more: https://bit.ly/3K3jLUc
To view or add a comment, sign in
Job adverts ARE the best recon tool ever for hackers……. Many job adverts give away entire tech stacks & could therefore be used for mega reconnaissance gains on Red Team engagements. Some agree! But some say by simply scanning public facing infra you can easily see who’s using which tech stack anyway….. Talking to a sever also tells us all lots of things especially when servers are set up poorly &/or misconfigured…………. So should organizations be sharpening up when it comes to security surrounding job descriptions or is this just me being another paranoid member of the security community……….🤔
To view or add a comment, sign in
North Korean threat actors have been linked to two campaigns in which they masquerade as both job recruiters and seekers to distribute malware and obtain unauthorized employment with organizations based in the U.S. and other parts of the world. The activity clusters have been codenamed Contagious Interview and Wagemole, respectively, by Palo Alto Networks Unit 42. While the first set of attacks... Read more on the following blog article!
To view or add a comment, sign in
North Korean threat actors have been linked to two campaigns in which they masquerade as both job recruiters and seekers to distribute malware and obtain unauthorized employment with organizations based in the U.S. and other parts of the world. The activity clusters have been codenamed Contagious Interview and Wagemole, respectively, by Palo Alto Networks Unit 42. While the first set of attacks... Read more on the following blog article!
To view or add a comment, sign in
Footprinting through job posting advertisement It’s common nowadays for hackers to understand the target infrastructure by faking a job posting on platforms such as LinkedIn or Indeed. By detailing the skills required specifically, hackers can expects that these products which the person who applied to have experience on the same since they are already existed on their work place. Hence, well know vulnerabilities discovered in an easy trick. Some hackers use the same method to attract victims to submit their CVs in order to know basic security questions suck as mobile number, Place of birth, parents name and so on. I personally got 3 calls last Two months from people acting as employees trying to pull some answers from me. Don’t let any scammer fools you fox
To view or add a comment, sign in
Checkout whats new in this edition of LWIS including more Ivanti 0-days, U.S. disruption of China's botnet, warnings from the FBI and many techniques, write-ups, and tools! #cybernews #LWIS #hiringnow #clearedjobs #cyberjobs #cybersecurity
To view or add a comment, sign in
📈Cybercriminals are increasingly targeting SLED organizations, 🏛️ such as local governments, public schools, and public agencies. Unfortunately, several challenges make effective security challenging for these organizations and leave fertile ground for threat actors: 💸Tight budgets – SLED orgs often have limited funding to begin with making it hard to find budget for critical security solutions 🖥️Legacy Systems – SLED orgs often run old, legacy systems and software, creating unique challenges 🕵️Workforce limitations – SLED orgs are often at a disadvantage vs. the private sector in hiring experienced technical experts. Learn more about how teams can overcome these challenges at our latest blog: https://lnkd.in/e7bAW4AS #Cybersecurtiy #SLED #AtlanticDataSecurity
To view or add a comment, sign in
Here are some of the top jobs which have been posted on the GuardPass platform! Just create your very own worker profile on the GuardPass App and have access to hundreds of jobs just like these ✅ #security #securityjobs #guardpass
To view or add a comment, sign in
Ryan Boerner this is a really good use case for Keep Aware. Current events often times create new subjects targeting end-users. Tragedies, political events, and world or local issues can target our end-users.