The Latest

It's official: Most of President Trump's tariffs are illegal. The Supreme Court struck down the president's signature economic orders on Friday in a 6-3 ruling, spelling the end of a controversial policy that added an estimated $1,000 tax increase for each American household, raised prices on consumer goods, and alienated key U.S. allies.

Not all of Trump's tariffs need to end because of this ruling. The court acknowledged that presidents have the power to "unilaterally impose tariffs of unlimited amount, duration, and scope." Instead, the court found that tariffs enacted based on the International Emergency Economic Powers Act (IEEPA) were done so improperly, as the administration "points to no statute" from Congress that says the IEEPA could be used for tariffs. That means tariffs against steel and aluminum could continue, since those were enacted from other laws, but both the "reciprocal" tariffs placed against other countries, and the flat 25% tariff placed on goods from countries like Canada, China, and Mexico, cannot currently stand.

That raises a lot of questions. Will the Trump administration seek to impose these tariffs through other means, avoiding the IEEPA altogether? Will companies that have paid tariffs already get their money back? And, perhaps most pressing to the average consumer, will prices for common goods, like tech, finally come down?

How will the Supreme Court's ruling affect tech prices?

There's no clear answer to this one, since there's really no precedent here. Trump is the first president to use the IEEPA as a reasoning to enact tariffs, and, as such, this is an enormous flip-flop that doesn't have a previous framework to look back to.

The reason tariffs are inflationary, or raise prices on goods, is because they make it more expensive for U.S. companies to import foreign goods. People can confuse this point: Tariffs place a tax on the importer of a good, not necessarily the manufacturer of that good. When a company exports its products to the U.S. with a tariff in place, it does not directly pay the tariff: The company that imports those products pays. As a result, importers raise their prices to compensate. Look at Nintendo: The company raised its original MSRPs for Switch 2 accessories like the Pro Controller and Joy-Con 2, as well as the original Switch, in the wake of tariffs. As these products cost more to import to the U.S., prices go up to give the company a cushion. It could've been worse, too, since Nintendo didn't raise the price of the Switch 2 or its games—though there's no telling whether those MSRPs were set with tariffs in mind, too.

As such, you might expect that if these tariffs disappear, these prices will come down. If Nintendo felt the need to raise Pro Controller prices by $15 in response to tariffs, it might reverse course now that Trump's tax is no longer placing a burden on U.S. importers. While anything's possible, I don't think it's very likely. For many goods, prices can rise quickly, especially with factors like tariffs, but can take a long time to fall—if at all. Some economists think that ending tariffs would cause prices to rise slower, but not stop: a disinflationary effect, rather than deflationary.

We the consumer may be to blame. If companies raise prices in response to tariffs, and consumers continue to buy those products regardless, it shows that the market supports those prices. The consumer doesn't necessarily see the impact of the tariff going away, so why lower prices? It's only in that company's best interest anyway, since they'll sell goods at higher prices without paying the tariff tax. If the company was struggling to sell inflated goods, perhaps prices will come down: If Nintendo is selling far fewer Switch units following its tariff increases, maybe it'll cut the price back down to encourage sales. But it's truly difficult to say without being on the inside.

Not all price increases are due to tariffs

Then, of course, there are the forces at play that push prices north besides tariffs. Computer components come to mind, particularly RAM. These components are becoming more expensive—and harder to find—not necessarily because of tariffs, but because AI companies are scooping them up for data processing. All of a sudden, everything that runs on these components is at risk of rising in price, since one section of the market has such a high demand. It doesn't matter if RAM is cheaper to import next month after tariffs are gone, if there's no RAM left to buy.

That means your gaming consoles, laptops, smart displays, cars—anything that runs on RAM, GPUs, and CPUs—could rise in price, unless more components can be made to meet demand. SCOTUS might've taken the burden of tariffs away from these imports, but it might not bring prices down, or, worse yet, do anything to stop them skyrocketing. Micron, the only American-based producer of RAM, didn't think memory shortages would end this year, even ahead of the tariff news. The company is investing in more facilities to produce components, but that takes time, which means price increases could continue for the foreseeable future.

Don't rely on tariffs ending to make big purchases

We can speculate all day about how the end of these tariffs will affect prices, but it's just that: speculation. Companies will do what they're going to do with the prices, and there's nothing in the Supreme Court's ruling to tell us whether our iPhones, Switches, or Echos are going to be cheaper later this year or not. Prices could plummet, come down slightly, stay the same, go up slowly, or go up quickly. My best guess is that the average consumer product previously affected by these tariffs will stay about the same price it is now, barring some other major change in the markets—but again, that's just a guess.

As such, my advice is to make your purchase decisions based on other, more stable factors: Research the products you're interested in to determine which has the best value; compare prices across different stores, both in-person and online; wait for traditional sales events if you're looking for major deals.

The most concrete risk of price increases right now comes from that computer-component shortage. If you've been in the market for a new computer, or a device that relies heavily on these components (like gaming consoles), it might be a good time to buy. Prices can easily go up, but take a long time to come back down.


from Lifehacker https://ift.tt/45sPLSl

From coordinating pickups for road trips to helping organize yard sales, WhatsApp groups are at the center of all kinds of events in people's daily lives. As someone who's a member of far too many WhatsApp groups, I've always been very annoyed by the app's inability to show group chat history to new group chat members. In the lead up to my most recent meditation retreat, the admins ended up sending the same document seven (!) times, just because new members kept joining the group and they had no way to access attachments that were previously sent to the group chat. Thankfully, WhatsApp is finally changing that.

WhatsApp is finally adding a feature called Group Message History, which means that group admins and members can now choose to share recent messages with new members. Now, when adding new members to a WhatsApp group, you'll be able to let them access up to 100 recent messages already sent to the rest of the group chat, which should good enough to stop people from spamming the group with the same messages as new people are added.

Speaking personally, this will be a great quality of life upgrade. In order to help new group chat members feel less lost, I've previously done everything from forwarding all relevant messages to them via DMs to sending screenshots of all our previous messages. All of this is incredibly tedious, and thankfully, I won't have to do it for much longer.

A message notifying the group that chat history was shared with a new WhatsApp group member.
Credit: WhatsApp

I also like the idea of limiting new group members to 100 recent messages or less. Quite often, my WhatsApp groups start off with a small number of people who know each other extremely well, and then the group expands to add acquaintances. The dynamics of the group chat change significantly when newer members are added, and not everyone feels comfortable with the idea of an unknown person seeing messages that were sent with a more intimate group in mind. Limiting chat history is a great move that allows people to maintain some privacy, as opposed to sharing the group's entire chat history with every new member.

Still, if 100 messages seems like too much of an invasion of privacy to you, WhatsApp also says that admins will have the option to disable this feature for regular members. This way, only the admin will be able to share chat history with new members.

The company says that everyone in the group chat will be notified when a new member is granted access to chat history, so you won't be blindsided if your new group member starts referring to in-jokes from a few days ago.

WhatsApp says it is gradually rolling out this feature across the world, so you can expect it to be available on your device in the coming weeks.


from Lifehacker https://ift.tt/Fam1iph

Google acquired the excellent photo editor Snapseed back in 2012—not long after Apple had crowned it one of its apps of the year—and despite having plenty to offer and being completely free to use, it remains one of Google's lesser-known apps. That might be about to change. Snapseed's latest update for iOS, version 3.15.0, comes with a full camera app inside—and there's a case to be made that it's better than Apple's default Camera app. It certainly offers more in the way of manual shooting controls, with the added benefit of an entire integrated suite of editing features.

Using Snapseed's built-in camera on iPhone

Once you've installed or updated Snapseed to the latest version, you'll see the new camera icon up in the top right corner. While you can start your session by opening up an existing image as always, you can also opt to capture a new one by tapping here:

Snapseed iOS
Look out for the new camera button in Snapseed. Credit: Lifehacker

If you want an easier way to launch the camera, you can add it to the Lock Screen: Press and hold on your iPhone's display when it's locked, tap "Customize," then pick a shortcut spot and choose "Camera" under "Snapseed." There's also a Control Center shortcut you can make use of, if you prefer.

Once you've swiped through the introductory spiel and given Snapseed access to your iPhone's camera, you'll need to pick one of the classic camera film presets to get started, though you can adjust the look of your shots afterwards. There are 11 different film simulations available—emulating film from Kodak, Fuji, Agfa, Polaroid, and Technicolor—and each one gives you slightly different variations in terms of color, contrast, texture, and tone. You can tap the film selector at the bottom of the camera interface (designed to look like a rewind button) to change at any time.

Snapseed iOS
You've got some classic film styles to choose from. Credit: Lifehacker

Your saved looks and edits are also included in the film selector, and can be used as preset filters for the images you're capturing. In the main image editor, after you've applied whatever adjustments you want to a photo, you can tap Looks > Add look to save it and access it through the camera.

Up in the top left corner of the camera interface, you'll find a Pro toggle switch, which gives you some controls the default iPhone camera does not. You get three new settings on screen, for ISO, shutter speed, and focus, and you can change any of them by selecting a setting and using the dial underneath. You've also got controls for flash (left) and zoom (right). Besides the big shutter button, you have a camera swap button (lower right), a button for going back to your photo library (lower left), and a camera capture screen theme button (upper right). Tap on this to pick a different color scheme for the screen.

Snapseed iOS
Pro controls can be called up in a couple of taps. Credit: Lifehacker

You're not stuck with the look of any of the photos you shoot through Snapseed: All of the changes applied by your film preset, from exposure to curves, can be changed later on. Select your picture from the main library screen, then use the Faves and Tools tabs to make changes.

Most filters and effects are applied by adjusting a slider underneath your image. The layers button (two squares) at the top gives you access to the current editing stack, and there's also an undo button to the left. When you're happy with what you've made, you're able to save over your existing image or make a copy.

It's an interesting new addition to the selection of superb third-party camera apps available for the iPhone, and yet another alternative to the Apple default. Meanwhile, Android users are within their rights to feel left out by all this: Snapseed for Android hasn't been updated since May 2024, and lacks both the camera feature and the most recent editing interface revamp that are now available on iPhones.


from Lifehacker https://ift.tt/2GyRFil

Adidas confirmed it is investigating a possible data breach involving one of its third-party customer service providers.

Adidas data breach

The company stated that there is no indication its IT infrastructure, e-commerce platforms, or consumer data were impacted by the incident.

An individual claiming to belong to the Lapsus$ Group posted on BreachForums alleging they had compromised the sportswear giant’s extranet. The stolen dataset is described as containing 815,000 rows of information, including names, email addresses, passwords, birthdays, company names and technical data.

Lapsus$ is part of the hacker collective Scattered Lapsus$ Hunters, specializing in social engineering attacks. If confirmed, Adidas would be the latest organization linked to the group’s activity in recent years.

This is not the first time Adidas has experienced a cybersecurity incident. In May 2025, the company notified customers that some of their data had been compromised after an unauthorized individual gained access to a third-party system.


from Help Net Security https://ift.tt/eTuVmfH

We're heading toward the back half of February—and according to your weird aunt on Facebook, this is an unusual, maybe magical month. Some say it is a "miraclein," a lucky calendar configuration that only occurs once every 823 years. Others say February 2026 is a "perfect month." Some say it is the beginning of an extremely unlucky year. Some say that a late-month planetary alignment will cause great upheaval.

The February 2026 "miraclein"

Though it is not a word used by astronomers (or even astrologers, to my knowledge), some are describing this month as a "miraclein," a month in which every day of the week falls four times during the month. This only happens every 823 years, they say. A variation of the miraclein month has some people calling February "moneybags" and making the claim that it's a good month for abundance. (The markets don't agree: February has been volatile.)

Here's a video explaining the theory:

A quick check of a calendar reveals that miracleins happen almost every year. Every day of the week falls exactly four times every February (except leap years), because four times seven is 28, and there are 28 days in the month. It's not a miracle—it's math. It's not even new. People spread this every February. This is an example of a pervasive strain of myths and superstitions based on the calendar.

Is February 2026 a "perfect month"?

If you dig a little deeper into the lore of February 2026, you'll find people describing it as a "perfect month," in that it begins on a Sunday and ends on a Sunday. There's logic to this, because the calendar is a perfect grid, with no days overhanging. This is nice and orderly, but it's not that unusual. February 2015 was a "perfect" month and February 2037 will be perfect as well.

February's planetary parade

The "miraclein" and perfect month only exist because that's how we decided to write calendars, but there is a cosmic event happening this month that goes beyond humanity. On the 28th of February, six planets—Mercury, Venus, Jupiter, Saturn, Uranus, and Neptune—will appear to be "lined up" in the sky. Some describe it as a "once every 6,000 years planetary conjunction" that will create a "paradigm shift for the entire planet" or cause gravitational anomalies. Some warn: "Do not look at the sky during the planetary alignment;" other, funnier, people say "The planets are having some type of conference or gang meeting on February 28." But whether you call it a "conjunction" or a "conference," it's not rare. Five or six planet line ups happen every few years, and last February, seven planets attended a gang meeting.

The planets aren't actually lining up, anyway. They'll just look lined up from our perspective on earth. Nothing will happen to your eyes if you look at it (you won't even be able to see Uranus and Neptune without a telescope anyway) and it won't affect gravity or cause a paradigm shift. It's just planets doing their thing in space.

Is 2026 unusually unlucky?

In 2026, there will be three Friday the 13ths—one just passed in February, one is coming in March, and there's a third in November—this leads some to believe that 2026 is a particularly unlucky or cursed year. Jury's out on whether the year is cursed, but if so, it's not because of Friday the 13ths. While three is the maximum number of Friday the 13ths that can happen in a calendar year, it's not unusual. There were three Friday the 13ths in 2015, and there will be three in 2037 too.

Speaking of the 13th, the belief that it's a bad, or unlucky day dates back to 19th-century France, but it's not entirely clear why people think it's unlucky. One guess is that Judas was the 13th apostle, but there's also a Norse myth about Loki showing up to as the thirteenth guest at a dinner party and doing mischief. Other cultures have other unlucky days. The 4th is unlucky in China. In Italy, the 17th is unlucky because XVII can be rearranged to form "VIXI," Latin for "my life is over," a common inscription on tombstones. The through-line is that none of these superstitions have anything to do with the physical world. They're examples of seeing connections where none exist.

All hail Apophenia, ruler of human thought

I don't have research to back this up, but I imagine the Venn diagram of people who believed the Rapture was coming, that Leviathan was rising from the oceans, and aliens were landing has serious overlap with the people who think there's something portentous about the planets aligning or that February is moneybags month. You'd think that when the aliens didn't land and the rapture didn't happen, folks would be more discerning about spreading future predictions, but that doesn't seem to be the case. But it's not just because people are gullible. It's a byproduct of how our brains are wired.

Apophenia is the tendency to perceive meaningful connections between unrelated things. Neurologist Klaus Conrad coined the term in a 1958 study of schizophrenics, describing "a specific feeling of abnormal meaningfulness," but apophenia goes beyond schizophrenics. It's in every gambler on a "lucky streak," everyone who sees a "man in the moon," and everyone who ever mistook correlation for causation. So: everyone. Our brains evolved to find patterns in data because it kept us alive and led to things like the scientific method, but the trade-off is that we think a rally cap is going to help our ball club win the series.

Pascal's Wager

Apophenia isn't the only thing at play here. Spreading a TikTok video promising abundance is a cranked-up version of Pascal's Wager, the philosophical argument that it’s smarter to bet on a reward when the cost of entry is low—hitting "share" takes almost no effort, and what if it works? While none of these beliefs are new, in the Before Times, if you wanted to be a doomsayer, you'd have to stand on a street corner with a sign reading "the end is near." That's a lot of effort and you wouldn't have an algorithm ensuring your message got to the people who would be most receptive to it.

Even misinformation that doesn't promise a monetary reward offers something to the person who spreads it. Sometimes it's the momentary high of feeling like you possess secret knowledge. Or it's a way of signaling belonging to an in-group ("I'm the kind of person who thinks the position of the stars has mystical significance!") or maybe it's just to get some attention.

I don't choose to post about "moneybags February" because my "cost of entry" would be my friends thinking I'm weird for sharing Facebook glurge, and a general sense that it's harmful to spread lies, but really, your weird aunt on Facebook and I are doing the same thing. We're both out here matching patterns and hitting "share"; we just have different ideas about which patterns to pay attention to. I'll still take bets on any conspiracy theory, but February is a cold month, and if it warms your aunt's heart to think it's bringing money, who am I to call her wrong? It's just that the same wiring that spreads "February is magic" also spreads beliefs and ideas that are legitimately dangerous, even deadly—at least according to the way I read the patterns.


from Lifehacker https://ift.tt/WCSPsV9

There's little worse than losing an hour or two of hard work, just by clicking on the wrong button or pressing the wrong key in Microsoft Word—a mistake that sees your well-crafted document (or a sizable portion of it) disappear before your eyes.

A slip of the fingers isn't the only way you can potentially lose work, either. Maybe you just have the misfortune to be busy at your computer when a power outage happens—taking your desktop, Microsoft Word, and your unsaved work along with it.

However, before you begin all over again, there are some tricks you can try to bring your work back.

Use Undo (Ctrl+Z or Cmd+Z)

Word undo
Word keeps an undo history. Credit: Lifehacker

Sometimes, all you need is the undo command—hit Ctrl+Z (Windows) or Cmd+Z (macOS) to undo your last action in Word. It might be enough to restore that table you accidentally deleted, or bring back that huge block of text you moved to the clipboard and have since lost track of.

This won't save you from a power outage, and it doesn't include all actions (it won't bring back a file you've closed, for example). However, it'll work a lot of the time when you've made a mistake, and Word always keeps a record of your last 100 actions in the app, so you can go back a fair way.

There's also an undo button up in the top left corner of the Word interface: Click on this to undo the last action, or click the arrow next to it to see a list of previous actions and choose where you want to go back to. To the right of the undo button is the redo button, which works the same way but in the opposite direction.

Open previous file versions

Word version history
Accessing previous versions in Word. Credit: Lifehacker

Word also has a file version history feature you can utilize to bring back lost work: It essentially saves past versions of your document at regular intervals, so you can go back in time, and even all the way back to the file's creation. It's like a super undo, which works between app restarts as well.

In Word for Windows, you can find these older incarnations of your document by heading to File > Info > Version History. If you're using Word on macOS, it's File > Browse Version History. A new sidebar opens on the right, showing all the available previous versions, and the date and time they were saved.

There is a caveat to this, though, which is you have to have your document saved in the cloud (in OneDrive) for this to work. If you're working with a local file that's only saved on your computer and you try and access version history, you'll be prompted to save it to OneDrive instead (which will turn on version history).

Find unsaved documents on your system

Word recovery
Unsaved documents are sometimes still available. Credit: Lifehacker

Word actually saves files temporarily to your computer every so often, so if the program crashes without warning, you should see an autorecovery dialog pop up the next time you load Word, asking if you want to recover the old file. If not, you can see partially saved files by clicking Click File > Info > Manage Document > Recover Unsaved Documents.

That's only for Windows, however—if you're on macOS, you're relying on the auto-recovery process. Word for both Windows and macOS lets you set how often auto-recovery files are saved: Head to File > Options > Save (Windows) or Word > Preferences > Save (macOS). The default is every 10 minutes, but you can adjust this if needed.

If you're still not seeing your file, you can try checking the temporary cache folder manually. On Windows, check "C:\Users\

Save your work to the cloud

Word AutoSave
OneDrive gives you various extra options—including AutoSave. Credit: Lifehacker

These days, Microsoft Word will tend to push you to save your work in OneDrive in the cloud. There are multiple benefits for this, including the version history feature mentioned above, and the option to collaborate on documents with other people. It also enables another handy feature: AutoSave.

This is exactly what it sounds like, and means that every time something is changed in your document, it quickly syncs to the cloud. You'll see the AutoSave button in the top left hand corner enabled when it's active, and the document name at the top of the app window will indicate when saves are in progress.

Should Word or your PC crash, your work should be safe. AutoSave is enabled by default for files saved to OneDrive, but you can customize this behavior by heading to File > Options > Save on Windows) or Word > Preferences > Save on macOS.


from Lifehacker https://ift.tt/t1nFwel

cybersecurity jobs February 2026

Chief Security Officer

Seven Eleven Club & Hotels | India | On-site – View job details

As a Chief Security Officer, you will oversee physical, operational, and cybersecurity programs, protect sensitive data and infrastructure, and assess risks to prevent incidents. You will lead incident response, ensure compliance with safety and data privacy regulations, educate staff on security best practices, advise leadership and the board, and manage day-to-day security operations, personnel, surveillance systems, and access controls.

Cryptography Expert

IDEMIA | France | On-site – View job details

As a Cryptography Expert, you will mprove chip security based on certification feedback, integrate and verify cryptographic mechanisms and countermeasures, and stay current on evolving attack techniques. You will balance security with system constraints, support validation and certification efforts, collaborate across engineering teams, and contribute to technology and design methodology improvements.

Cyber Security Analyst

CyPro | United Kingdom | Hybrid – View job details

As a Cyber Security Analyst, you will support security assessments by creating deliverable templates, assist with developing security policies and controls, monitor and analyze security incidents, collaborate with clients on security needs, and help prepare clear reports and presentations.

Get weekly updates on new cybersecurity job openings. Subscribe here!

Cyber Threat Landscape Researcher

Check Point Software | Israel | On-site – View job details

As a Cyber Threat Landscape Researcher, you will analyze cyber threat actors and emerging trends, monitor underground and open sources, and execute the full intelligence lifecycle from collection to validation. You will turn raw data into high-confidence insights, produce threat assessments, maintain trusted intelligence sources, and identify long-term shifts in adversary behavior.

Cyber Security Engineer

Sécheron | Italy | On-site – View job details

As a Cyber Security Engineer, you will ensure compliance with railway security standards, support product certifications, and coordinate with regulators and certification bodies. You will conduct penetration testing, vulnerability scanning, and security audits across hybrid OT/IT environments, manage product security incidents and responsible disclosure, track remediation efforts, and support post-incident analysis and continuous improvement.

Cyber Security Manager

Tuesday Health | USA | Remote – View job details

As a Cyber Security Manager, you will lead the enterprise security program aligned with HIPAA, SOC 2 Type II, and HITRUST CSF, own risk management and executive reporting, and enforce secure coding standards. You will ensure security controls across CI/CD pipelines, identity and access management, and data protection, including DLP, encryption, and key management in Azure Key Vault.

Cyber Security Operations Engineer

Intertec Systems | UAE | On-site – View job details

As a Cyber Security Operations Engineer, you will handle L2 incident response and investigations, manage and tune security controls, monitor platform health, support patching and upgrades, and contribute to reporting, compliance, and post-incident reviews.

Cybersecurity Analyst

Mercor | USA | Remote – View job details

As a Cybersecurity Analyst, you will evaluate AI models by probing them with adversarial inputs to surface vulnerabilities and enhance safety. You will generate high-quality human data by annotating failures and classifying vulnerabilities, while applying structured frameworks and benchmarks to ensure consistent testing. You will also document findings in a reproducible manner to produce actionable reports and datasets for customers.

Cybersecurity Developer

Alpitronic | Italy | On-site – View job details

As a Cybersecurity Developer, you will design and build secure software mechanisms, monitor and remediate vulnerabilities, and support secure coding standards across the product lifecycle. You will integrate and configure security controls, document and debug software, and work with technical documentation for microprocessors and microcontrollers.

Data Loss Prevention Specialist

Ubank | Australia | On-site – View job details

As a Data Loss Prevention Specialist, you will operate and optimize DLP and information protection tools, analyze incidents and drive remediation, and deliver clear reporting on data protection effectiveness. You will act as a trusted advisor to the business and collaborate with security teams and vendors to improve risk posture and tool performance.

Engineer 2, Cyber Security Engineer

Comcast | India | On-site – View job details

As an Engineer 2, Cyber Security Engineer, you will support security architects in designing and implementing controls across networks, systems, and infrastructure, including firewalls, IDS, and endpoint protections. You will build, configure, operate, and maintain security measures, conduct technical reviews and vulnerability testing, support security policies and standards, and apply strong expertise in networking, protocols, secure routing, DNS, automation, and large-scale, high-availability environments.

Head of Cybersecurity

Accent Group | Australia | On-site – View job details

As a Head of Cybersecurity, you will define and deliver the cybersecurity roadmap aligned with business objectives, lead and mentor a high-performing team, and drive a proactive, risk-based security culture. You will oversee risk management, security architecture, incident response, and compliance programs, ensuring effective protection, regulatory alignment, and coordinated responses to security events.

NMC Cyber Security Detection Engineer

Police Digital Service | United Kingdom | Hybrid – View job details

As a NMC Cyber Security Detection Engineer, you will develop, deploy, and maintain SIEM detection rules, stay current on threat actor TTPs, and collaborate across NMC teams to ensure effective detections. You will build custom solutions, optimize log collection, document detection logic for analysts, and scope, test, and implement new SIEM data connectors.

Principal Engineer Threat Intelligence

Infineon Technologies | Germany | Hybrid – View job details

As a Principal Engineer Threat Intelligence, you will design and scale internal applications and automation to support intelligence ingestion, enrichment, correlation, and reporting. You will guide implementation efforts while monitoring and analyzing threats from OSINT, dark web, and proprietary sources, conducting deep research on threat actors, TTPs, and emerging vulnerabilities.

Principal Threat Intel Incident Commander

Huntress | USA | Remote – View job details

As a Principal Threat Intel Incident Commander, you will lead rapid response incidents end to end, coordinating across teams and driving resolution. You will research emerging adversary tradecraft to inform hunt missions, aggregate threat data into customer and marketing reports that demonstrate Huntress’ value.

Red Team Operator Associate

SMBC Group | Ireland | Hybrid – View job details

As a Red Team Operator Associate, you will lead red team engagements and adversary emulations, perform web, infrastructure, Active Directory, and cloud penetration testing, and develop attack chains aligned with MITRE ATT&CK. You will collaborate in purple team exercises, customize C2 frameworks, and build custom offensive tools and vulnerabilities.

Senior AI Platform Security Engineer

BMW Group | Germany | On-site – View job details

As a Senior AI Platform Security Engineer, you will define security architecture, standards, and policies for scalable AI platforms, design layered defenses against AI-specific threats, and own the security lifecycle for LLMs and agents. You will collaborate with legal and compliance teams on governance, and drive operational excellence through KPIs, reliability, and secure scaling.

Senior AI Security Architect

NVIDIA | Israel | On-site – View job details

As a Senior AI Security Architect, you will define the secure SDLC for NVIDIA Networking AI products, guide the safe use of AI tools in development, and support architecture and R&D teams in building secure AI solutions. You will perform threat modeling, provide security architecture recommendations, and mentor teams on AI security best practices.

Senior Cyber Security Engineer

Bihr | France | On-site – View job details

As a Senior Cyber Security Engineer, you will reduce organizational risk by building and optimizing SIEM and SOAR detections and automation, improving MTTD and MTTR. You will investigate threats across endpoint, network, identity, and cloud environments, support incident response, track security KPIs, and ensure compliance with regulatory and SLA requirements.

Senior Cybersecurity Engineer (Detection / IR)

Pellera Technologies | USA | Remote – View job details

As a Senior Cybersecurity Engineer (Detection / IR), you will support enterprise cloud security platforms such as SIEM, EDR, and vulnerability management, act as the technical liaison between clients and the SOC, and lead threat hunting using the MITRE ATT&CK framework. You will build advanced detection and hunting use cases, manage alerts and incidents with EDR/XDR tools, and conduct incident response, root cause analysis, and post-incident reporting in collaboration with stakeholders and compliance teams.

Senior Information Security Engineer

Squarepoint | Canada | On-site – View job details

As a Senior Information Security Engineer, you will strengthen security across network, system, cloud, email, and data domains, advise IT projects on risk mitigation, and design security architectures to protect critical assets. You will manage and optimize security tools, support Security Operations, and conduct threat modeling and risk assessments to drive proactive security improvements.

Senior Principal Offensive Security Engineer

Oracle | Ireland | On-site – View job details

As a Senior Principal Offensive Security Engineer, you will conduct deep source code audits, reverse-engineer file formats and protocols, and develop custom tools such as fuzzers to uncover complex vulnerabilities. You will apply novel techniques to assess new and existing services, guide broader security initiatives, disclose findings to third-party vendors, and design systems that scale offensive security impact while collaborating with service teams to identify risks and recommend mitigations.

Senior Product Security Engineer

TRM Labs | USA | Remote – View job details

As a Senior Product Security Engineer, you will lead application security reviews and threat modeling across design, code, and testing, while developing automated testing and a mature Secure SDLC. You will own application vulnerability management, coordinate penetration testing, support engineering teams with security best practices, and develop and maintain the bug bounty program.

Senior Security Engineer, Application Security

1Password | Canada | Remote – View job details

As a Senior Security Engineer, Application Security, you will design, build, and scale security solutions for the vulnerability management program, develop tools to correlate and prioritize findings across data sources, and create dashboards and metrics tailored to technical, business, compliance, and executive audiences.

Senior Security Penetration Tester

AGAPI | UAE | On-site – View job details

As a Senior Security Penetration Tester, you will conduct full-spectrum testing across web, mobile, cloud, and internal environments, with focus on API security, authentication, and IAM. You will chain vulnerabilities into realistic attack scenarios, demonstrate business impact with reproducible PoCs, deliver reports with actionable remediation guidance, and continuously integrate new threat actor TTPs into testing.


from Help Net Security https://ift.tt/jfdCNaO