08 Nov Weekly Rundown: Pen Testers, Malware Analysts, Security Researchers In Short Supply
News and resources to keep you on the cutting edge of cybersecurity
– Steve Morgan, Editor-in-Chief
Northport, N.Y. – Nov. 8, 2018
The cybersecurity stories we’re following this week, and you should too:
- There’s a mad dash to find a cybersecurity workforce – against a backdrop of 3.5 million jobs that are predicted to be unfilled by 2021, according to an article in The New York Times.
- 7 best cybersecurity funds are poised to benefit from positive growth in spending trends within the space.
- Cybercrime Magazine has a new Twitter account for you to follow – @WomenKnowCyber – which aims to become the largest list of women in cybersecurity.
- AI has the potential to change the cybersecurity landscape – and it could have the same power to change our world as Isaac Newton, Nikola Tesla, Albert Einstein or Alan Turing.
- 3 women absolutely crushing the bug bounty field explain how they got started, why they do what they do, and some of their most memorable discoveries.
- Oracle’s new Autonomous Database address the dire shortage of security experts in a landscape of constantly multiplying and mutating security threats.
- A publicly-traded Long Island semiconductor maker’s computer systems were hacked by “a highly sophisticated actor.”
- Microsoft Store offers eight tips to help small businesses lessen cyber threats – and the last but not least of them is – “Plan for the worst.”
- How a major insurance company is using cybersecurity apprenticeships to help develop talent to fill full-time cyber positions.
- In 10 years’ time, insurance coverage for cyberattacks could be standard for every homeowner.
Cybercrime Magazine interview with Jim Routh, Chief Security Officer at Aetna.
Cyber alerts from AlienVault Open Threat Exchange (OTX) — The world’s first truly open threat intelligence community:
- Inception Attackers Target Europe with Year-old Office Vulnerability
- Spam campaign that attempts to target Mac users that use Exodus, a multi-cryptocurrency wallet.
- Rising from the deep, Kraken Cryptor ransomware has had a notable development path in recent months.
- Android/TimpDoor phishing campaign using text messages tricks users into downloading and installing a fake voice-message app.
- Email trojan claims user has missed an invoice, includes Microsoft Word macro malware.
Join OTX for free to share your threat research and subscribe to other contributors.
– Curated by the Editors at Cybercrime Magazine
Community resources to keep you on the cutting edge of cyber:
- Quarterly cybercrime diary of data breaches and cyberattacks
- Hack blotter with cybercriminal Investigations, arrests and convictions
- 20 cybersecurity experts to follow on Twitter for crowd-sourced opinions and insights
- Cybersecurity events calendar featuring conferences and expos globally
- Big list of hacker and cybersecurity movies from 1969 to present
Check back every Thursday for a new edition of the Weekly Rundown!
– Steve Morgan is founder and Editor-in-Chief at Cybersecurity Ventures. Georgia Reid is Deputy Editor and Podcast Host at Cybercrime Magazine.
Go here to read all of my blogs and articles covering cybersecurity. Go here to send me story tips, feedback and suggestions.