The Latest

Home ownership is a key goal for many Americans despite the financial and environmental challenges posed in today's real estate market—and the transition from renting an apartment to owning a house is, in itself, a challenge in many ways. One of those challenges is adjusting your approach to furnishing and decorating your living spaces, especially if you’re going from a small rental to a large house.

Decking out a house you own can be a different experience from making a rental into a comfortable space because the scale is different: Budgets have to be bigger because you’re usually filling more space, purchases tend to be more long-term because you’re not sweating the end of a lease, and suddenly, that couch you’ve been moving from place to place since college is no longer socially acceptable. Here’s how to approach decorating a house when you’ve only ever lived in an apartment.

Pause and plan

Step one is to take a moment and slow down, resisting the urge to be “moved in” as quickly as possible. Moving into an apartment is often an exercise in making your existing furniture somehow work in the new space, which encourages a haphazard approach and a utilitarian feel. The key to decorating a house, though, is to embrace what’s known as “slow decorating”:

  • Instead of just dragging all your existing furniture in and filling rooms with stuff, be thoughtful about what you plan to use the room for.

  • Measure each space so you can pick and arrange your furniture thoughtfully.

  • Choose furniture and accents that fit that plan. If an existing piece works in that plan, great! Otherwise, consider whether it fits elsewhere or if it needs to be replaced with something different.

Think in terms of rooms

Moving from a small rental to a sprawling house poses another psychological challenge: scale. Going from a modest and maybe even crowded place to a home with a lot more square footage can be overwhelming. Going from a small space you didn’t have a stake into a more permanent place that requires a lot more stuff can be overwhelming.

Instead of trying to come up with a comprehensive plan (and budget) to furnish and decorate the entire new space, take it room by room:

  • Start with the rooms you will use immediately and all the time: the primary bedroom, the kitchen, bathroom, and living room. Narrowing down your decisions to a specific room at a time will make the whole process more psychologically and financially manageable.

  • You can create a sense of cohesion by using the same “pop” color in each space and repeating decorative elements like vases or other decorative objects. Wall art that’s part of a series, for example, can link rooms even if you’re approaching them individually.

  • Once you have the main rooms set up, you can tackle the remaining rooms one at a time.

Another reason this works is the fact that small apartments often require you to make rooms multi-functional, but houses often have dedicated spaces—dining rooms, offices, living rooms, etc. If you’re going from a space where one room was your office, living room, and exercise space, taking each room individually will help you envision what your ideal version of that space would be instead of what you can fit or what can easily be stashed out of sight.

Embrace space

In smaller rental spaces, we often make decisions around furniture that solve apartment-related problems, like a lack of a guest bedroom (resulting in a heavy, bulky sleeper sofa) or a lack of useful storage (resulting in buying everything with extra storage space, like an Admiral bed). But a house may not present those same challenges, so it’s time to ask yourself if that sleeper sofa or other storage piece still makes sense.

The size of the rooms also has to be taken into consideration. In an apartment, for example, cramming a couch and a coffee table into a room is all it takes to make a living room, but a larger room in a house might feel empty, requiring more thought about how you’re going to use the room. Will it mainly be a viewing experience, with lots of comfortable seating arranged in front of a screen? Or do you want to foster more of a conversation space, with seating facing each other? Or, if you have the space, will it be both?

Finally, a house with more space can benefit from larger “statement”-type pieces of furniture—oversized furniture, or large artwork on the walls. Remind yourself that you can go big and go home in a house.


from Lifehacker https://ift.tt/uZqWejL

The White Lotus fans have much to look forward to in February: The third season of the satirical anthology series will premiere on Max on Feb. 16, with additional episodes airing weekly at 9 p.m. ET. This installment was filmed around Thailand, including Koh Samui, Phuket, and Bangkok, and stars season one's Natasha Rothwell (reprising her role) along with heavy hitters like Carrie Coon, Scott Glenn, Walton Goggins, Leslie Bibb, Michelle Monaghan, and Parker Posey.

Also returning in February is the Emmy-winning series Last Week Tonight with John Oliver (Feb. 16), now in its 12th season.

On the film side, Max will stream A24's We Live in Time (Feb. 7), a romantic drama about a decade—shown in nonlinear fashion—in the life of a couple played by Andrew Garfield and Florence Pugh. The film premiered at the Toronto Film Festival in September 2024 and is mostly known for inspiring an excellent meme.

Here's everything else coming to Max in February, including Puppy Bowl XXI (Feb. 9), the annual Super Bowl Sunday event featuring 142 rescue puppies. Kickoff airs at 1 p.m. ET followed by the competition at 2 p.m. ET.

What’s coming to Max in February 2025

Available February 1

42 (2013)

Accidentally Brave (2023)

Bad Boys (1995)

Bad Boys II (2003)

Brian Banks (2019)

Cabin in the Sky (1949)

Cleats & Convos with Deebo Samuel, Episode 114 (B/R)

Crouching Tiger, Hidden Dragon (2000)

Deepwater Horizon (2016)

Dr. Jekyll and Mr. Hyde (1932)

Dredd (2012)

Duplicity (2009)

Entertainment (2015)

Experimenter (2015)

Final Destination (2000)

Final Destination 2 (2003)

Final Destination 3 (2006)

Final Destination 5 (2011)

Ivanhoe (1952)

Jackie (2016)

Jezebel (1938)

Jupiter's Darling (1955)

Just Mercy (2020)

King Solomon's Mines (1950)

Kitty Foyle (1940)

Kusama: Infinity (2018)

Lady Be Good (1941)

Lassie Come Home (1943)

Life Partners (2014)

Lili (1953)

Little Women (1949)

Love & Basketball (2000)

Mad Money (2008)

Malcolm X (1992)

Mary of Scotland (1936)

Massacre (1934)

Mechanic: Resurrection (2016)

Mildred Pierce (1945)

Mister Roberts (1955)

Mr. Church (2016)

Mrs. Miniver (1942)

Neptune's Daughter (1949)

Noma: My Perfect Storm (2015)

One Way Passage (1932)

Safe in Hell (1931)

Shadow on the Wall (1950)

Skate Kitchen (2018)

Skiptrace (2016)

Sleepwalking (2008)

Speed (1994)

Story of Louis Pasteur (1936)

Support the Girls (2018)

Take Out (2004)

Taxi Driver (1976)

The Bank Job (2008)

The Color Purple (1985)

The Conjuring (2013)

The Guilty (2018)

The Harvey Girls (1946)

The Host (2007)

The Last Circus (2011)

The Last Days on Mars (2013)

The Last Time I Saw Paris (1954)

The Life of Emile Zola (1937)

The Lost Patrol (1934)

The Notebook (2004)

The Picture of Dorian Gray (1945)

The Search (1948)

The Tall Target (1951)

The Wave (2016)

The Window (1949)

The Woman in Red (1935)

They Were Expendable (1945)

Thirty Seconds Over Tokyo (1944)

Traitor (2008)

Unknown (2011)

Vacation from Marriage (1945)

Waitress (2007)

Watch on the Rhine (1943)

We Are the Best! (2014)

Available February 2

The Edge with Micah Parsons, Episode 122 (B/R)

We Baby Bears, Season 2C (Cartoon Network)

Available February 3

90 Day Fiancé Pillow Talk: Before the 90 Days, Season 7 (TLC)

Common Side Effects, Season 1 (Adult Swim)

Dog Detectives, Season 1 (Animal Planet)

Very Scary Lovers (ID)

Available February 4

Celebrity IOU, Season 9 (HGTV)

The Whole Story with Anderson Cooper, Season 3 (CNN Originals)

Available February 6

Destinations of the Damned with Zak Bagans, Season 1B (Discovery)

Izzy Does It, Season 1 (HGTV)

The Takedown: American Aryans (Max Original)

Available February 7

Lu & The Bally Bunch, Season 1A

How I Left the Opus Dei (El Minuto Heroico: Yo También Dejé El Opus Dei) (Max Original)

We Live in Time (A24) (2024)

Available February 8

Luther Vandross: Never Too Much (CNN Films)

Available February 9

Puppy Bowl XXI Kickoff (Animal Planet)

Puppy Bowl XXI (Animal Planet)

Available February 11

Central Intelligence (2016)

Central Intelligence: Extended Edition (2016)

Father Stu (2022)

Available February 12

Guy's Grocery Games, Season 37 (Food Network)

Available February 13

Home Sweet Rome, Season 1B (Max Original)

Available February 14

Silly Sundays, Season 1A

Waitress: The Musical (2023)

Available February 16

Have I Got News for You, Season 2 (CNN Originals)

Last Week Tonight with John Oliver, Season 12 (HBO Original)

Love & Marriage: Huntsville, Season 9 (OWN)

Pearl: The X-Traordinary Origin Story (2022)

The White Lotus, Season 3 (HBO Original)

Available February 17

90 Day Fiance, Season 11 (TLC)

Evil Lives Here, Season 17 (ID)

Tournament of Champions: The Qualifiers (Food Network)

Watchmen: Chapter II (2025)

Available February 18

We Beat The Dream Team (TNT & HBO Original)

Available February 19

Exposed: Naked Crimes, Season 3 (ID)

Moonshiners: Master Distiller, Season 7A (Discovery)

Renovation Aloha, Season 2 (HGTV)

Available February 20

Bea's Block, Season 1B (Max Original)

Available February 21

Elevation (2024)

Available February 22

House Hunters Renovation, Season 18 (HGTV)

Available February 24

End of Watch (2012)

Homestead Rescue, Season 12 (Discovery)

Available February 25

Eyes on the Prize III: We Who Believe in Freedom Cannot Rest (HBO Original)

Wipeout, Season 2B (TBS)

Available February 27

Cóyotl: Hero and Beast (Cóyotl: Héroe y Bestia), Season 1 (Max Original)

Available February 28

Christina on the Coast, Season 6B (HGTV)

Morbius (2022)

Toad and Friends, Season 1A


from Lifehacker https://ift.tt/H2Uu1dC

Rimini Street announced Rimini Protect Advanced Hypervisor Security (AHS), an exclusive solution powered by proven Vali Cyber AI/ML security technology.

The Rimini Protect AHS solution leverages these innovative capabilities that are already protecting mission-critical hypervisor infrastructure, including US military VMware deployments.

The Rimini Protect AHS solution combines Vali Cyber technology with Rimini Street’s professional hardening, installation, and managed services. This solution creates a secure, locked-down hypervisor environment, 24/7/365, allowing businesses to manage hypervisor risk.

Hypervisor exploits can have devastating impacts

Ransomware attacks are at an all-time high as of December of 2024. The number of victims has risen by 43% from Q3 to Q4 of 2024 and is up 47% YoY from 2023 to 2024. Ransomware payments have also shot up from a median of $199 thousand in early 2023 to $1.5 million in June of 2024.

Exploits against hypervisors can be particularly devastating, compromising all the virtual machines running on a single hypervisor. A hypervisor, also known as a virtual machine monitor, is software that creates, runs, and manages virtual machines.

One hypervisor can manage dozens of virtual machines, which are essential for handling critical business workflows and processes. If an exploit compromises a hypervisor, it could gain access to all the virtual machines on that host and their data.

Protection for VMware ESXi and all Linux-based hypervisors

Rimini Protect AHS offers protection for VMware ESXi, Nutanix, XenServer, Citrix Hypervisor, Proxmox, Red Hat Enterprise Virtualization (RHEV), and all Linux-based KVM hypervisors. The Rimini solution protects against security breaches with these key, unique features:

  • AI/ML Technology: Runtime protection solution that uses AI/ML behavioral-based detection techniques to detect file and in-memory malware with high efficacy. It automatically remediates file damage without human intervention, delivering resilience to the business. Proprietary algorithms are designed to identify and stop both traditional and in-memory attacks in real-time.
  • MFA: Multi-Factor Authentication (MFA) as a solution to help to protect against potentially stolen credentials in connected and air-gapped environment to provide alerts and prevent unauthorized access attempts. Credential theft, often obtained through unethical methods such as phishing campaigns or poor credential management, has led to a record increase in security breaches of hypervisors and underlying systems.
  • Process control: Prevents living off the land attacks as well as processes from escaping their designated environments, such as virtual machines or containers used for containerized applications. This protection keeps exploits from “escaping” into the underlying hypervisor, thereby safeguarding the entire filesystem from being encrypted or exported.

Rimini Protect AHS provides peace of mind

Rimini Protect AHS for VMware is supported by Rimini Street’s renowned Global Security Services team comprised of dozens of security specialists globally, available 24/7/365.

“Whether to enhance and add to your defense strategy or to maximize the value of existing systems, Rimini Protect Advanced Hypervisor Security offers peace of mind from a trusted, proven partner that has been providing mission-critical security solutions for complex, large, mission-critical, high-security government and military organizations across the globe. We take great pride in protecting the systems and irreplaceable data of our clients that is always under threat of attack,” said Gabe Dimeglio, CISO, SVP & GM of Rimini Protect and Rimini Watch solutions.


from Help Net Security https://ift.tt/5ou3Jdq

It’s January 2025. The main character of this story is drowning in uncertainty. She has barely recovered from the holiday season, monumental goals for the new year are looming, and a wall of self-doubt and societal pessimism obscures any view of what the immediate future might look like. The Oracle of Instagram Ads appears, recommending an app that’s like a “shamanic journey” for mental health. 

That is how I came to download Betwixt, put on my headphones, and enter a frozen wasteland where a disembodied voice guided me to transfigure my inner landscape.

What is Betwixt? 

Betwixt, which the creators describe as “an epic journey of self-discovery,” is a text-based choose-your-own-adventure type game that scratches multiple itches: gameplay, storytelling, meditation, mental wellness education, audio engagement, and aesthetics.

To use the app, you should ideally wear headphones and be in a space where you won’t be disturbed for 15-20 minutes. For each session or segment of the story, you enter “the in-between,” a sort of liminal space that exists inside your mind and outside reality. While atmospheric audio plays, the story scrolls across your screen. There are frequent prompts for you to choose the next action or respond to a direct question from the voice accompanying you. 

With storytelling and self-reflection, you are guided through milestones while being prompted to meditate on your strengths, hangups, and tools for coping. You can experience the first three dream sessions for free, then you will be prompted to pay a one-time fee to continue through all 11 chapters. When I signed up, membership tiers ranged from $20-200.

Each dream session includes some or all of these features:

  • The interactive dream/story

  • An article relevant to the story’s topic

  • An audio track

  • Replayable activities from the session

  • A journal prompt

  • A meditation

  • A quote to save or share

I chose the membership tier ($59) that would allow me to replay any of the dream sessions and have access to the Infinite Dream, a supplemental at-your-own-pace experience.

How the game helped me

The narrative format of this app has allowed me to grasp some mental health skills that have been elusive through therapy or other forms of psycho-education. 

For example, the technique of psychological distancing—seeing my problem from a perspective outside my own frantic mind—actually clicked because the story in Betwixt guided me through the whole process of leaving my body and seeing my problem from a different angle, considering an outsider’s interpretation, and refocusing on the future.

Betwixt co-founder Ellie Dee said this way of learning through story is one key benefit of an app like Betwixt. “Rationally, you can understand the maladaptive thinking patterns behind negative emotions and behaviors, but understanding the problem doesn’t necessarily solve it,” she said. “People learn best experientially, through play."

Each dream session provides one or more mental health tools like psychological distancing; after playing, you have the opportunity to read more on the topic and journal about it.

How apps like Betwixt fit into mental health care

You could easily pack your phone with apps that support meditation, self-care, mood tracking, journaling, breath work, self-discovery, goal setting, and therapy. I use apps like that along with traditional therapy. Betwixt felt like something different that got me excited about where my story could go.

Psychologist Dr. Alexandra Stratyner said apps like Betwixt can supplement traditional mental health care by helping users work toward their goals between sessions.

“They offer an interactive and engaging alternative to traditional methods like journaling or traditional forms of guided meditation, which may not work for everyone,” Stratyner said. “The immersive gameplay allows users to explore their emotions in a non-threatening, creative way, which may make self-reflection less intimidating. Some apps like this give users the ability to get immediate support, which can be especially helpful in moments of heightened stress or anxiety.”

Who is Betwixt for?

Consider Betwixt if you enjoy gaming or immersive storytelling, struggle with traditional mindfulness or meditation practices, or if you're looking for a unique mental wellness tool.

Betwixt could also benefit people with anxiety, Stratyner said.

“Interactive, narrative-driven tools can be particularly effective for addressing mental health issues that benefit from self-reflection, emotional exploration, and stress reduction,” she said. “For example, anxiety can be alleviated through the immersive, controlled environment these tools provide, which allows users to confront fears and uncertainties in a safe, virtual space. Immersive, narrative games that target mental health objectives may also offer therapeutic support that enables users to work through difficult experiences at their own pace.”

Betwixt and other apps are not a substitute for therapy and psychiatric care, however. Stratyner said mental health apps fall short when it comes to personalizing interventions based on your history and needs, managing complex and severe mental health issues like suicidal thoughts and trauma-related distress, and monitoring long-term mental health care.

“It's important to keep in mind that this type of approach has limitations when compared to traditional therapy,” Stratyner said. “Traditional therapy offers immediate feedback and tailored strategies that are difficult to replicate in a game. While gamified tools are helpful adjuncts for skill-building and daily maintenance, they lack the adaptability and emotional support a therapist provides when navigating difficult emotional states or unearthing underlying issues. Having a living person providing therapy also has unique, relational benefits that are well substantiated with research; apps cannot replicate the human factor.”


from Lifehacker https://ift.tt/GuUBokq

We’ve entered a new era where verification must come before trust, and for good reason. Cyber threats are evolving rapidly, and one of the trends getting a fresh reboot in 2025 is the “scam yourself” attacks.

Scam Yourself attacks

These aren’t your run-of-the-mill phishing scams. They are a sophisticated evolution of social engineering designed to deceive even the most tech-savvy users. Attackers exploit our routines, trust, and overconfidence, and complacency to manipulate us into becoming unwitting accomplices in our own compromise.

Understanding the psychology and mechanics of these attacks is vital to building defenses that will protect both individuals and organizations.

What Are “Scam Yourself” attacks?

At first glance, the term “scam yourself” might sound a bit strange. But it perfectly captures the deceptive nature implemented by this attack method. Unlike the more obvious scams of the past – Nigerian Prince and windfall inheritance emails, or fake antivirus pop-ups – “Scam Yourself” attacks are much more subtle, blending seamlessly into your everyday digital experiences.

The power of these attacks lies in their psychological precision. Imagine encountering a CAPTCHA that looks completely normal, a routine browser update, or even a “helpful” tech tutorial that tells you to perform some actions. Nothing unusual, right? Yet, that seemingly harmless interaction could be a carefully crafted trap. These scams manipulate users into triggering malicious actions themselves, whether it’s copying and pasting a command line script, clicking on a fake software update, or completing what appears to be a standard security check.

What makes these attacks so dangerous is their deceptive familiarity. Gone are the glaring red flags. In their place are authentic-looking prompts designed to exploit our habits and trust in everyday technology. We are seeing a rise in these attacks across industries, with researchers reporting their activity nearly doubling in the past three months.

How “Scam Yourself” attacks work

The power of these attacks lies in their psychological manipulation. Hackers know how people think and act online, and they’ve optimized their tactics to exploit that behavior.

1. Exploiting routine actions:

Ever clicked “Accept” on a prompt without reading it? You’re not alone. Attackers know we tend to trust routine system requests. Fake CAPTCHAs or “urgent” update alerts trick users into executing hidden malicious code.

2. Overwhelming with information:

Overload can be a hacker’s best friend. Complex instructions, technical jargon, or multiple steps can push users into blindly following directions. It’s like being handed Ikea furniture instructions, and at first you might just skim and guess instead of carefully reading.

3. Authority imitation:

A fake Microsoft security warning or a phony Google alert can feel legitimate. Why? Because we instinctively trust recognizable brands. Attackers lean into this trust, posing as authoritative sources to guide users into harmful actions.

4. Creating urgency:

Messages like “Critical update required!” or “Respond immediately to avoid account suspension” ignite panic. Urgency shortcuts our critical thinking and pushes us to act fast, which is exactly what attackers want.

The psychology behind the scam

These scams are purposefully designed around deeply ingrained psychological tendencies:

  • Default bias: We often stick to the default action such as just clicking “OK” or accepting pre-filled options, without questioning it.
  • Ambiguity effect: Uncertain situations make us lean toward familiar solutions, even if they’re not safe.
  • Authority bias: We’re more likely to follow instructions when they seem to come from a credible source.
  • Urgency and scarcity: Creating a false sense of limited time pressures users into decisions they wouldn’t normally make.

Understanding these triggers is crucial because they transform our routine digital interactions into security vulnerabilities.

Defenses against “Scam Yourself” attacks

Protecting yourself against these attacks doesn’t always require the most cutting-edge technology. Often, the most effective defenses lie in returning to foundationally sound practices, leveraging security principles, disciplined processes, and fostering a culture of healthy skepticism.

Central to this approach is the power of verification, where users need to be trained to pause and scrutinize prompts, especially those that deviate from normal workflows. Implementing double confirmation steps for critical actions serves as an added layer of security, acting as a vital second check before any operations proceed.

Additionally, adopting checklists for critical tasks, much like in engineering disciplines, helps reduce impulsive decisions and ensures systematic verification.

The latest iteration of “Scam Yourself” attacks are a wake-up call for the cybersecurity community. While these attacks are increasingly sophisticated, the defense doesn’t have to be complicated. Success lies in preparation, maintaining healthy skepticism, and avoiding complacency.


from Help Net Security https://ift.tt/w0dbs2r

cybersecurity jobs January 2025

CISO

Sempra Infrastructure | USA | Hybrid – View job details

As a CISO, you will develop and implement a robust information security strategy and program that aligns with the organization’s objectives and regulatory requirements. Assess and manage cybersecurity risks across the organization’s digital infrastructure, networks, and sensitive data. Implement risk mitigation strategies and ensure regular risk assessments and audits.

Cloud Security Engineer

UBX | Philippines | On-site – View job details

As a Cloud Security Engineer, you will configure and setup roles and permissions / facilitates identity and access management to access cloud environment. Monitor system performance and troubleshoot and anomalies promptly. Logging, monitoring, and responding to detected incidents in the cloud environment.

Cyber Security Engineer

IAG | New Zealand | Hybrid – View job details

As a Cyber Security Engineer, you will develop and maintain attack emulation, detection, and response methodologies, create automations and API integrations using ServiceNow, and lead CTED BAU uplift activities within scope, time, and quality.

Cyber Security Risk Officer

Ergo | Ireland | Remote – View job details

As a Cyber Security Risk Officer, you will generate and maintain a threat actor assessment model. Generate, maintain and assess cyber security incident response plans based on threat scenarios. Build and maintain a risk profile of systems to enable accurate risk assessment.

Cyber SOC Analyst

Ministry of Housing, Communities and Local Government | United Kingdom | Hybrid – View job details

As a Cyber SOC Analyst, you will conduct the daily operations of the internal SOC, including incident monitoring, analysis, and response. Monitor security events and alerts using Microsoft Sentinel and other security technologies. Implement and enhance SOC procedures, guidelines, and best practices to ensure efficient and effective incident response.

Cyber Threat Intelligence

OTORIO | Israel | Hybrid – View job details

As a Cyber Threat Intelligence, you will design, develop, and scale CTI data collection and analysis engines using diverse data sources. Define methods and data required for identifying vulnerabilities and exposures of devices, and enriching information available on wide-range of OT/IT/IoT devices at high scale.

Cybersecurity & AI Specialist

Vancouver School Board | Canada | On-site – View job details

As a Cybersecurity & AI Specialist, you will manage complex projects in collaboration with educational and technical staff to integrate AI and Cybersecurity. Develop AI systems with built-in privacy controls and security measures. Plan, implement, maintain and monitor IT security controls for all digital assets and processes (network, endpoint, server, application, etc).

Cybersecurity Officer- Manager Cloud Security

Metropolitan Transportation Authority | USA | Hybrid – View job details

As a Cybersecurity Officer- Manager Cloud Security, you will manage and plan the future technical architecture, providing insight into the future of their area of technology in order to continually improve effectiveness and efficiency. Manage and ensure disaster recovery and contingency plans for their domain(s) to provide users with minimal interruptions in service.

Digital Forensic Expert & Incident Response

Cognyte | Israel | Hybrid – View job details

As a Digital Forensic Expert & Incident Response, you will lead the investigation and remediation of security incidents, from detection to resolution. Perform detailed forensic investigations on compromised systems, networks, and applications. Develop, maintain, and continuously improve incident response playbooks to ensure the organization’s preparedness for different types of security incidents.

Director of Cyber Security

GMG | UAE | On-site – View job details

As a Director of Cyber Security, you will develop, implement, and manage the organization’s cybersecurity strategy to protect against security breaches and cyber threats. Manage and monitor MDR services, ensuring continuous threat monitoring, analysis, and incident response. Conduct regular risk assessments, vulnerability assessments, and penetration testing to identify areas of improvement in the security posture.

Identity Management Architect

Linde | Germany | On-site – View job details

As an Identity Management Architect, you will plan, support, implement, and design Microsoft Active Directory across the enterprise, includingidentity management solutions as Bravura Security suite or Beyond Trust. You will be responsible for leading Active Directory infrastructure risk assessments/audits, making decisions on threat modeling and proper security service design and implementation.

Manager, Application Security

Four Seasons Hotels and Resorts | Canada | Remote – View job details

As a Manager, Application Security, you will develop and lead the strategy and roadmap of an enterprise Application Security program. Develop and implement policies and procedures related to Application Security. Identify and implement enterprise solutions to address risks. Establish appropriate relationships and procedures with IT and business units within Four Seasons and establish roles and responsibilities for the Application Security.

Principal Network Security Engineer

EirGrid Group | Ireland | Hybrid – View job details

As a Principal Network Security Engineer, you will design and implement secure network solutions that align with the organisation’s security policies and business goals. Configure and manage next gen firewalls, intrusion detection/prevention systems (IDS/IPS), network access control (NAC), and virtual private networks (VPN).

Security Architect

Adobe | USA | Remote – View job details

As a Security Architect, you will define security practices and effectively communicate them across Frame.io and Adobe. Handle risk assessments, provide business justifications for risk adjustments and exceptions, and ensure Frame.io meets strict security standards.

Security Consultant II (Web Application Penetration Tester)

NetSPI | India | Hybrid – View job details

As a Security Consultant II (Web Application Penetration Tester), you will perform web and mobile application penetration tests. Create and deliver penetration test reports to clients. Research and develop innovative techniques, tools, and methodologies for penetration testing services. Help define and document internal, technical, and service processes and procedures.

Senior Cybersecurity Specialist

AVIO | Italy | Hybrid – View job details

As a Senior Cybersecurity Specialist, you will analyze and identify cybersecurity threats, assess their severity, design and implement security solutions to protect IT systems and data, manage the security and protection of company data by securing applications and databases and ensuring systems are always up to date, and ensure that the company complies with standards, best practices, and internal policies related to IT security.

Security Engineer AI

AI71 | UAE | On-site – View job details

As a Security Engineer AI, you will design and implement security architectures for AI systems, cloud environments, and data pipelines. Integrate security into the software development lifecycle (SDLC) to ensure secure coding practices. Respond to security incidents, conduct root cause analysis, and implement corrective actions. Perform regular security assessments, including penetration testing and vulnerability scanning.

Senior IT Security Specialist

Röchling Automotive | Italy | On-site – View job details

As a Senior IT Security Specialist, you will develop, implement and keep updated security policies, protocols, and procedures. Conduct regular security audits and risk assessments, also travelling across the different RA locations if necessary. Respond to security breaches and lead the investigations and mitigations. Lead analysis of IT security incidents, providing mitigations and remedies.

Senior Lead Cybersecurity Architect

JPMorgan Chase | USA | On-site – View job details

As a Senior Lead Cybersecurity Architect, you will guide the evaluation of current cybersecurity principals, processes, and controls, and lead the evaluation of new technology using existing standards and frameworks. Regularly provide technical guidance and direction to support the business and its technical teams, contractors, and vendors.

Senior Privacy Engineer – Incident Response, Devices & Services Trust & Privacy (DSTP)

Amazon | USA | On-site – View job details

As a Senior Privacy Engineer – Incident Response, Devices & Services Trust & Privacy (DSTP), you will own and support the design, development, implementation, and maintenance of DSTS’ privacy incident response infrastructure, tools, and processes. Assess privacy risks, establish mitigation strategies, and work with our builders, stakeholders, partners, and peer teams to develop technical roadmaps for incident response capabilities.

Senior Threat Intelligence Analyst

Microsoft | Germany | Remote – View job details

As a Senior Threat Intelligence Analyst, you will track sophisticated adversaries and use your technical knowledge of adversary capabilities, infrastructure, and techniques. Define, develop, and implement techniques to discover and track current adversaries and identify the attacks of tomorrow. Produce actionable intelligence and proactively drive hunting, detection and Microsoft’s threat actor understanding.

Software Engineer – Cloud Security

Vanguard | United Kingdom | Hybrid – View job details

As a Software Engineer – Cloud Security, you will develop and enhance modern cloud-based cybersecurity services across all layers, from database to front-end. Implement secure authentication solutions (MFA, Passkeys, etc.). Integrate with identity providers like Auth0, Transmit Security, and Ping Identity. Build solutions to detect and prevent account takeover attempts by bad actors. Improve the efficiency and resilience of cloud services.

Software Security Engineer

Allego | France | Remote – View job details

As a Software Security Engineer, you will be responsible for designing and updating the overall cybersecurity strategy, managing security improvement projects, overseeing the security testing strategy (including vulnerability scanning and penetration testing), performing regular threat analyses to stay updated on the current security landscape, and ensuring compliance with applicable laws and regulations.

Vulnerability Assessment and Exploitation of Satellite Communication Systems Intern

Quarkslab | France | On-site – View job details

As a Vulnerability Assessment and Exploitation of Satellite Communication Systems Intern, you will identify and analyze a suitable satellite system (e.g., aging weather satellite, decommissioned research satellite) for vulnerability testing. Perform a detailed analysis of the satellite’s communication systems, including uplink (command) and downlink (data) channels, identifying potential security vulnerabilities in these pathways. Conduct simulated cyber-attacks on the selected satellite.


from Help Net Security https://ift.tt/EqwR5jX

The twin cryptocurrency and digital identity revolutions are supposed to be building a better future, where anybody can take charge of their sovereignty and security in a world where both face unprecedented threats. Yet at one crucial level, the decentralization ecosystem has a glaring vulnerability: consumer hardware wallets.

hardware wallets

Devices like Ledger sell themselves as the last word in security for the crypto economy. Most end users will accept those marketing messages, hook, line, and sinker.

Why wouldn’t they? The learning curve for Bitcoin, crypto, and decentralized finance is precipitous. People are looking for a trusted guide up the mountain. Unfortunately, the hardware wallet industry is leading users blindly to the edge of a precipice – with ruinous consequences not just for crypto investors but, before long, for everyone.

Inside the black box

What’s wrong with hardware wallets? The best place to start is by pointing out what they got right.

The early years of crypto were marked by monthly tales of hacks, frauds, and exchange insolvencies, which led to people losing their entire investment because they kept it within online wallets. People didn’t realize this is just about the most insecure thing you can do – hell, many didn’t understand that they never actually possess cryptocurrencies, only the keys that control them.

Hardware wallets were a crucial step towards self-sovereignty, enabling people to take responsibility for their own security rather than being forced to trust online exchanges and other third parties.

I come to bury Ledger, however, not to praise it. And not just Ledger; most of the wallet industry has the same problem, being built on closed source, proprietary, “black box” technology. This is, of course, completely antithetical to the principles and practicalities of the decentralization revolution, which is built on open-source foundations.

Back around the dawn of Bitcoin, hardware wallet developers chose to adopt decades-old smart card technology (the same tech that’s in your credit card) to secure the keys. At no point did it occur to them that building on this legacy, black-box, closed-source technology was a problem.

Fast forward over a decade later and the leading hardware wallet is now an impenetrable “walled garden.” And now, as decentralization is taking over the world and set to transform almost every area of digital and financial interaction, we are realizing that the industry is built on a security layer of sand.

Walled gardens are unfit for the decentralized future

Make a “fat finger” error in your mobile banking app, and your bank will rectify the mistake and refund your money. In crypto, that transaction is irreversible.

That’s why it’s so important security experts, tech partners and consumers themselves can peek over the wall, examine the underlying technology, and evaluate whether they can trust it. Yet, when you buy a hardware wallet today, you don’t know what you’re getting.

First, there’s a good chance it’s manufactured in a country like China with cavalier (or sinister) approaches to personal security. It could contain a significant bug, or a backdoor to a malicious entity that will steal your identity or your funds.

Obviously, this matters massively to anyone who holds crypto; everyone else will likely shrug. They would be wise to pay attention. Beneath our noses, a new financial and data infrastructure is being built on the blockchain, with banks and payment providers already introducing applications and payment rails on these technologies. Before very long, we’ll all be signing transactions with cryptographic keys.

Or will we? Wallets’ walled garden approach threatens more than individuals’ security: it also puts the development of the entire decentralization economy at risk. To understand why, let’s look at Ledger again. Because every “app” has access to the master seed, each one needs to be reviewed and approved by Ledger. This is terrible for innovation, antithetical to the blockchain’s open-source ethos, and puts more control in the hands of these insecure wallet providers.

Just as the “first web” tended towards centralization, putting unparalleled power in the hands of just a few tech behemoths like Google and Facebook, hardware wallets represent an incredible concentration of vulnerability. How do we fix it?

Towards an open future

It sounds paradoxical, but the blockchain industry agrees that robust security can only be achieved through openness. Open-source, decentralized networks should be secured by open-source hardware and software that support open ecosystems.

And they can be – today. New hardware architecture and next-generation microkernel operating systems already support a fully open-source approach. This not only enables anyone to inspect and evaluate the underlying security of the device; it also ensures any developer can permissionlessly build and ship apps. Malicious or corrupted apps cannot affect others because they can live side-by-side in their own sandboxes.

I can’t tell you why the wallet industry failed to realize it was perpetuating security vulnerabilities, nor how it acts as a brake on innovation. I can’t tell you whether it was laziness, lack of imagination, or that they were content to rest on their laurels. I do know that devices like Ledger are the biggest threat to security in the Age of Decentralization – and that, thanks to open-source innovation, they’re already obsolete.


from Help Net Security https://ift.tt/blC4tKR