Archive for May 7, 2025

69% of Canadians Want a Less Painful Job Search — LinkedIn Has an AI Fix

Posted in Commentary with tags on May 7, 2025 by itnerd

From vague job titles to time-wasting applications, the job hunt is often more draining than empowering. According to new LinkedIn data, 69 per cent of Canadians want a less painful process, and 73 per cent are looking for roles that match their skills — not just their job titles. The message is clear, job seekers want smarter, more personalized support.  

To meet this demand, LinkedIn is rolling out a new AI-powered job search aimed at putting clarity, control, and confidence back in the hands of job seekers.  

Instead of relying on filters or job titles, users can now describe what they want in plain language, and LinkedIn’s AI will interpret intent and deliver more relevant, personalized results. The reality is, people don’t find their ideal jobs by checking boxes like salary, title or location. It starts by expressing what you want, and now, with AI, Canadians can finally turn their aspirations into real opportunities.  

Additional updates now live in Canada: 

  • Hiring Insights: New transparency features show how active and responsive a company is before you apply, so you can move faster and with more confidence.  
  • AI-powered coaching in LinkedIn Learning: All members can now run mock interviews tailored to their goals, while Premium subscribers can build fully customizable scenarios and get actionable feedback.  
  • More ways to upskill: LinkedIn is offering free access to its top 10 AI courses of 2025 through May 31, plus curated job-seeking courses free to all members through June 30.  

Guest Post – The browser blind spot: Hidden security risks behind employee web activity

Posted in Commentary with tags on May 7, 2025 by itnerd

From leaking sensitive corporate data to selling industry secrets — a cybersecurity expert outlines dangerous employee browser activity that can go undetected.

Enterprise reliance on browsers is growing, and so are the associated risks stemming from dangerous employee web behavior. According to a cybersecurity expert at NordLayer, a toggle-ready network security platform for business, some employee activity that may go undetected by security teams can result in confidential data and industry secrets leaks or violations of GDPR. 

Research has found that 80% of employees can complete 80% of their work tasks using the browser. While the shift to the browser can increase productivity and collaboration by speeding up processes, it’s also accompanied by risks.

“Companies are embracing web-based software as a service (SaaS) applications for various benefits, such as cost reduction and increased efficiency. However, due to increasing dependency, the browser is becoming a significant cybersecurity concern,” says Buinovskis. “Aside from attracting the attention of cybercriminals, it’s also become a hub for insider threats or employee error, which can result in devastating security breaches. The most concerning element is the lack of observability security teams might have into employee activity in the browser, creating an alarming blind spot.”

Can security teams see what employees are doing in the browser? 

According to Buinovskis, if employees use a traditional browser, security teams’ observability of what people do in the browser is existent yet limited. Solutions like ADR (automated detection and response) and XDR (extended detection and response) can incorporate TLS (transport layer security) inspection and provide extensive activity monitoring and securing capabilities. However, they require significant financial and human resources to implement and maintain. The hefty price tag might ward off small to medium-sized businesses from the investment, exposing them to browser-based threats. 

“Traditional browsers are not built with security and observability in mind — their primary target is to provide a user-friendly interface. These capabilities are more or less sufficient for personal use but are inadequate to safeguard a business,” says Buinovskis. “Even if a company has an extensive cybersecurity strategy and a large team of security experts at their disposal, the lack of built-in security and monitoring features in a traditional browser still leaves them vulnerable and more likely to experience a safety incident.” 

The most dangerous threats to look out for

According to Buinovskis, the most dangerous threats that can result from employee activity in the browser include:

  • Data exfiltration. Ill-intended employees can use the browser’s limited observability to steal confidential company information, such as industry secrets or client data stored on web-based apps, and share it through email or social media without being detected.
  • Install unauthorized browser extensions. Some of these extensions are malicious and prey on unsuspecting users to collect sensitive data, modify browser behavior, and create security vulnerabilities. If a company uses a traditional browser, it’s challenging to monitor and control which extensions employees can download and minimize the risk of them installing malicious add-ons. 
  • Engage with unauthorized browser-based applications (shadow IT). Not all web-based SaaS applications are safe to use — some might have significant security vulnerabilities, resulting in data leaks or compliance violations. Without proper monitoring, these applications can go undetected, expanding the scope of unmanaged apps (shadow IT).
  • Other insider threats. The traditional browser’s lack of observability and behavioral analytics makes it easier for malicious employees to fly under the radar and access sensitive data or converse with third parties. Depending on the scope, these actions can have dire consequences, such as industry secrets ending up in the hands of the competition. 

“To safeguard against browser-based threats, companies need to invest in building and maintaining a comprehensive cybersecurity strategy that would provide a higher level of observability into employees’ activity on the browser or opt for browsers with built-in monitoring and security features,” says Buinovskis. “However, it’s worth noting that even with comprehensive cybersecurity measures, monitoring browser usage across an organization remains challenging if it lacks built-in security features. This gap allows certain user activity to go undetected.”

Buinovskis highlights that cybersecurity awareness training for employees is also a worthwhile investment. It helps to minimize the possibility of user error, such as interacting with unauthorized apps or downloading malicious browser extensions.

ABOUT NORDLAYER

NordLayer provides toggle-ready, scalable, and seamless network security for businesses of all sizes. Built on the standard of NordVPN, the platform empowers distributed teams with secure connections that align with today’s compliance needs. As cyber threats become more sophisticated, NordLayer utilizes the ZTNA, SWG, and FWaaS frameworks, offering tailored security plans and layered solutions that simplify network protection and scale with a business. NordLayer is part of the cybersecurity powerhouse Nord Security. For more information: https://nordlayer.com/

New Recruitment Scams: 3 Threat Actors Exploit Government of Singapore, US Logistics Recruiter, Digital Development Agenc

Posted in Commentary with tags on May 7, 2025 by itnerd

Netcraft has observed a recent spike in recruitment scams, uncovering significant impact from three unique adversaries, each leveraging different tactics to target job seekers:

  • Threat Actor #1 impersonates employers in the tech vertical using advance fee fraud (AFF) tactics – Celadonsoft & SoftServ 
  • Threat Actor #2 impersonates a logistics recruitment agency using similar AFF tactics: localized scams focused on 18 geographies & 63,000 people targeted in the U.S. alone – Picked Well
  • Threat Actor #3 impersonates the Government of Singapore to steal victims’ personal identity number and Telegram account details 

You can find the blog now live at https://www.netcraft.com/blog/diving-into-the-talent-pool-threat-actors-target-job-seekers-with-complex-recruitment-scams/

The SafetyDetectives Takes A Look Women’s Safety Around the World

Posted in Commentary with tags on May 7, 2025 by itnerd

The research team at SafetyDetectives just updated one of their past studies, where they explore countries around the world to see which are the safest and most dangerous for women, in terms of the number of crimes committed against them and the laws protecting them.

Key findings at a glance:

  • On average, 80% of women are victims of sexual harassment at some point in their lifetimeFurthermore, 1/3 of women around the world have experienced physical and/or sexual violence
  • According to their research, the top most dangerous countries for women are South Africa and Sweden. On the other hand, the safest countries are considered to be Japan, Poland, Bosnia and Herzegovina.
  • Just in the United States data shows that, 50% of native women have reported being stalked while 56% have experienced sexual violence in their lifetime.
  • In the EU, 43% of women have endured psychologically abusing or controlling behavior from their partner.

Ultimately, violence against women is not a geographically isolated phenomenon; it’s a problem all over the world, even in places that are relatively safer than others. And even those of us who do feel safe have a moral responsibility to help those that do not, for any reason and at any time.
You can access their report here: https://www.safetydetectives.com/blog/womens-safety-research/

While AI makes writing code easier than ever, CodeAnt AI secures $2M to make it easy to review

Posted in Commentary with tags on May 7, 2025 by itnerd

AI might be great at helping engineers write code, but it’s creating a new problem – all that code still needs to be reviewed by humans. CodeAnt AI is stepping in with a solution that uses AI to tackle the review process itself, raising $2 million in seed funding to help engineering teams move faster without sacrificing quality or security.

The funding, CodeAnt AI’s first institutional round, values the company at $20 million. It will be used to expand the engineering and business development teams and to scale CodeAnt AI’s code quality and application security platform. For engineering teams already feeling the pressure to ship faster, the investment comes at the perfect time. 

The funding round was led by Y Combinator, VitalStage Ventures, and Uncorrelated Ventures, and with participation from DeVC, Transpose Platform, Entrepreneur First, and a number of marquee angel investors.

CodeAnt AI’s platform plugs right into GitHub, GitLab, Bitbucket, and Azure DevOps, giving developers instant feedback on their code across more than 30 programming languages. More impressively, it doesn’t just find problems – it suggests fixes that developers can apply with a single click, turning reviews that used to take hours into proactive quick, five-minute sessions. For companies racing to get products out the door, this means fewer delays and higher quality code. It also means cost savings – fixing problems during code reviews costs 10x less compared to fixing them later during CI/CD or after production deployments. 

The company was founded by Amartya Jha and Chinmay Bharti, who both saw the same problem from different angles. Jha worked on scaling infrastructure at Zeta and ShareChat, where he noticed how easily critical bugs slipped through when reviews weren’t thorough. Bharti, with a master’s specialising in AI from IIT Bombay, faced similar issues while building high-frequency trading software at Blu Analytics – where a single bug could have serious financial consequences. Together, they built CodeAnt AI and were accepted into Y Combinator.

What makes CodeAnt AI different is the technology under the hood. The company built  a proprietary language-agnostic AST engine that actually understands how different parts of a codebase connect, letting it spot issues that isolated code reviews would miss. The platform also pulls in data from major security databases and lets companies set up their own rules based on their specific needs. For security-conscious organizations, CodeAnt AI can run entirely within their own infrastructure, ensuring code never leaves their environment.

Pricing starts at $10 per developer per month for the basic AI code review features, with a full package including code quality, security, and compliance tools available for $40 per developer per month.

As AI continues to transform how code gets written, CodeAnt AI is positioning itself as the bridge to a future where code can be both rapidly created and confidently deployed. The founders envision a world where AI doesn’t just help developers write code faster, but also ensures that every line shipped to production is secure, efficient, and ready for the real world – giving engineering teams the confidence to move at the speed their businesses demand.