Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
Cyber Security /
Fired US govt workers, Uncle Xi wants you! – to apply for this fake consulting gig

Fired US govt workers, Uncle Xi wants you! – to apply for this fake consulting gig

May 17, 2025 12:00 am Cyber Security 201

Phony LinkedIn recruitment ads? Groundbreaking

Chinese government snoops - hiding behind the guise of fake consulting companies - are actively trying to recruit the thousands upon thousands of US federal employees who have been fired since President Trump took office.…



Support the originator by clicking the read the rest link below.
fired workers uncle wants apply consulting
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
go.theregister.com
HubSpot vs Salesforce: Which CRM Fits Your Business? 
Prev
HubSpot vs Salesforce: Which CRM Fits Your...
Tokenization makes investing more accessible — Robinhood exec
Next
Tokenization makes investing more accessible —...

Related News

  • North Korea targets crypto workers with new info-stealing malware
    North Korea targets crypto workers with new...
  • Banana Squad Hides Data-Stealing Malware in Fake GitHub Repositories
    Banana Squad Hides Data-Stealing Malware in...
  • Scammers Insert Fake Support Numbers on Real Apple, Netflix, PayPal Pages
    Scammers Insert Fake Support Numbers on Real...
  • N. Korean Hackers Use PylangGhost Malware in Fake Crypto Job Scam
    N. Korean Hackers Use PylangGhost Malware in...
  • Capturing Screenshots Using a Fake Printer
    Capturing Screenshots Using a Fake Printer
  • Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
    Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
  • Hackers Using Fake IT Support Calls to Breach Corporate Systems, Google
    Hackers Using Fake IT Support Calls to Breach...
  • ChatGPT used for evil: Fake IT worker resumes, misinfo, and cyber-op assist
    ChatGPT used for evil: Fake IT worker resumes,...
  • Uncle Sam moves to seize $7.7M laundered by North Korean IT worker ring
    Uncle Sam moves to seize $7.7M laundered by...
  • Smashing Security podcast #420: Fake Susies, flawed systems, and fruity fixes for anxiety
    Smashing Security podcast #420: Fake Susies,...
1 Kraken Has Launched the First-Ever Native Staking Service for the Bitcoin Network — Earn Yield Without Leaving the Chain
Kraken Has Launched the First-Ever Native Staking Service for the Bitcoin Network — Earn Yield Without Leaving the Chain
Asana's cutting-edge AI feature ran into a little data leakage problem
2 Asana's cutting-edge AI feature ran into a little data...
Pavel Durov warns France is experiencing societal collapse
3 Pavel Durov warns France is experiencing societal collapse
MAT is available for trading!
4 MAT is available for trading!
China’s Bitcoin Mining Giants Quietly Shift Production to U.S. Amid Tariffs and Security Heat
5 China’s Bitcoin Mining Giants Quietly Shift Production to...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!