A new campaign tracked as "Dev Popper" is targeting software developers with fake job interviews in an attempt to trick them into installing a Python remote access trojan (RAT).
But everything checked out, and I love the job. It's not a tech company, but it has the best parts of one (proper AGILE processes, separated QA, dev, and devOPs roles, modem tech stack, etc).
So be careful of scams, but not so careful you miss out on great opportunities.
1 Is pretty standard in the industry for people with experience. I haven't actually applied to any jobs myself in a while. Job hunting for me is sifting through the recruiter messages that hit my inbox.
Being a developer at a non tech company is great. My role tends to blur between salesforce amin and developer, but that's partly because of the small size of the company (less than 100 employees total, less than 10 in IT).
My current job is taking advantage of the market and drastically changing things for the worse and I'm feeling stuck, far away from my family and friends.
That's a bad take. Unless you get your knowledge purely from shady tutorials or have a fast track bootcamp education, it's unlikely you never touch on security basics.
I'm a software design undergrad and had to take IT Sec classes. Other profs also touched on how to safely handle dependencies and such.
While IT Security is its own specialisation, blindly trusting source code others provide you with is something a good programmer shouldn't do.
If you need a metaphor: Just because a woodworker specialises in tables, doesn't mean they can't build a chair.