Jan. 25, 2023, 9:15 p.m. | N2K Networks

CyberWire Daily thecyberwire.com

How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shouldn't get cocky. DevSecOps survey results show tension between innovation and security. Russian hacktivist auxiliaries hit German targets. Tim Starks from the Washington Post Cyber 202 shares insights from his interview with Senator Warner. Our …

business campaign crypto cryptoapi crypto theft cyber cyber ops distributed hacktivists headspace macos malware malware campaign may north ops phishing python run spoofing start start-up ta444 theft vulnerability windows

Technology Risk & Controls Manager

@ LegalAndGeneral | London, United Kingdom

Solutions Architect - Prisma Cloud

@ Palo Alto Networks | Munich, Germany

Security Operations Engineer

@ Cognite | Oslo

Ingénieur Cybersécurité PKI

@ Alter Solutions | PARIS, France

Cyber Security Project Engineer

@ Dezign Concepts LLC | Chantilly, VA

Cloud Cybersecurity Incident Response Lead

@ Maveris | Martinsburg, West Virginia, United States