
Security

Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme – Krebs on Security
Cybercriminal groups peddling sophisticated phishing kits that convert stolen card data into mobile wallets have recently shifted their focus to targeting customers of brokerage services, new research shows. Undeterred by security controls at these trading platforms that block users from wiring funds directly out of accounts, the phishers have pivoted to using multiple compromised brokerage…

9 hottest IT security certs for higher pay today
With change a constant, IT professionals looking to improve their careers can benefit from the latest insights into employers’ needs. Data from Foote Partners on the skills and certification most in demand today may provide helpful signposts. Analyzing more than 640 certifications as part of its 2Q 2025 “IT Skills Demand and Pay Trends Report,” Foote Partners…

How military leadership prepares veterans for cybersecurity success – Help Net Security
In this Help Net Security interview, Warren O’Driscoll, Head of Security Practice at NTT DATA UK and Ireland, discusses how military leadership training equips veterans with the mindset, resilience, and strategic thinking needed to excel in cybersecurity. Drawing on habits such as disciplined preparation, blunt honesty, and adaptive decision-making, veterans bring a blend of defensive…

AI SOC 101: Key Capabilities Security Leaders Need to Know
Aug 13, 2025The Hacker NewsArtificial Intelligence / Threat Hunting Security operations have never been a 9-to-5 job. For SOC analysts, the day often starts and ends deep in a queue of alerts, chasing down what turns out to be false positives, or switching between half a dozen tools to piece together context. The work is…

How Brandolini’s law informs our everyday infosec reality – Help Net Security
Brandolini’s law, also known as the “bullshit asymmetry principle”, is simple but devastating: “The amount of energy needed to refute bullshit is an order of magnitude bigger than to produce it.” While it’s often thrown around in political debates and social media flame wars, I’ve been thinking a lot about how brutally relevant it is…

Who Got Arrested in the Raid on the XSS Crime Forum? – Krebs on Security
On July 22, 2025, the European police agency Europol said a long-running investigation led by the French Police resulted in the arrest of a 38-year-old administrator of XSS, a Russian-language cybercrime forum with more than 50,000 members. The action has triggered an ongoing frenzy of speculation and panic among XSS denizens about the identity of the…

Security tooling pitfalls for small teams: Cost, complexity, and low ROI – Help Net Security
In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large enterprises don’t work well for leaner, cloud-native teams. He explains how simplicity, integration, and automation are key for SMBs with limited resources. Choudhry also shares how AI is beginning to make a difference for mid-market…

Scammers Unleash Flood of Slick Online Gaming Sites – Krebs on Security
Fraudsters are flooding Discord and other social media platforms with ads for hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. Here’s a closer look at the social engineering tactics and remarkable traits of this sprawling network of more than…

Phishers Target Aviation Execs to Scam Customers – Krebs on Security
KrebsOnSecurity recently heard from a reader whose boss’s email account got phished and was used to trick one of the company’s customers into sending a large payment to scammers. An investigation into the attacker’s infrastructure points to a long-running Nigerian cybercrime ring that is actively targeting established companies in the transportation and aviation industries. Image:…

How to implement security control rationalization | TechTarget
Cybersecurity complexity is continuously compounded with the adoption of new security controls, point products and platforms — an issue that ironically creates more vulnerabilities than it solves. In research from Enterprise Strategy Group, now part of Omdia, 37% of respondents said their organization uses more than 26 security products, with 10% of those saying they…