08 Nov Weekly Rundown: Pen Testers, Malware Analysts, Security Researchers In Short Supply
News and resources to keep you on the cutting edge of cybersecurity
– Steve Morgan, Editor-in-Chief
Northport, N.Y. – Nov. 8, 2018
The cybersecurity stories we’re following this week, and you should too:
- There’s a mad dash to find a cybersecurity workforce – against a backdrop of 3.5 million jobs that are predicted to be unfilled by 2021, according to an article in The New York Times.
- 7 best cybersecurity funds are poised to benefit from positive growth in spending trends within the space.
- Cybercrime Magazine has a new Twitter account for you to follow – @WomenKnowCyber – which aims to become the largest list of women in cybersecurity.
- AI has the potential to change the cybersecurity landscape – and it could have the same power to change our world as Isaac Newton, Nikola Tesla, Albert Einstein or Alan Turing.
- 3 women absolutely crushing the bug bounty field explain how they got started, why they do what they do, and some of their most memorable discoveries.
- Oracle’s new Autonomous Database address the dire shortage of security experts in a landscape of constantly multiplying and mutating security threats.
- A publicly-traded Long Island semiconductor maker’s computer systems were hacked by “a highly sophisticated actor.”
- Microsoft Store offers eight tips to help small businesses lessen cyber threats – and the last but not least of them is – “Plan for the worst.”
- How a major insurance company is using cybersecurity apprenticeships to help develop talent to fill full-time cyber positions.
- In 10 years’ time, insurance coverage for cyberattacks could be standard for every homeowner.
Cybercrime Magazine interview with Jim Routh, Chief Security Officer at Aetna.
Cyber alerts from AlienVault Open Threat Exchange (OTX) — The world’s first truly open threat intelligence community:
- Inception Attackers Target Europe with Year-old Office Vulnerability
- Spam campaign that attempts to target Mac users that use Exodus, a multi-cryptocurrency wallet.
- Rising from the deep, Kraken Cryptor ransomware has had a notable development path in recent months.
- Android/TimpDoor phishing campaign using text messages tricks users into downloading and installing a fake voice-message app.
- Email trojan claims user has missed an invoice, includes Microsoft Word macro malware.
Join OTX for free to share your threat research and subscribe to other contributors.
– Curated by the Editors at Cybercrime Magazine
Community resources to keep you on the cutting edge of cyber:
- Quarterly cybercrime diary of data breaches and cyberattacks
- Hack blotter with cybercriminal Investigations, arrests and convictions
- 20 cybersecurity experts to follow on Twitter for crowd-sourced opinions and insights
- Cybersecurity events calendar featuring conferences and expos globally
- Big list of hacker and cybersecurity movies from 1969 to present
Check back every Thursday for a new edition of the Weekly Rundown!
– Steve Morgan is founder and Editor-in-Chief at Cybersecurity Ventures. Georgia Reid is Deputy Editor and Podcast Host at Cybercrime Magazine.