El Diario del CISO El Diario del CISO (The CISO Journal) Edición 10 - Page 6
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
International InfoSec & Cybersecurity News
Equifax Has Spent Nearly $1.4bn on
Breach Costs - Infosecurity Magazine 49 Million Instagram Influencer Records
Exposed in Open Database
Equifax has incurred losses so far of over $1.35bn from a
devastating 2017 breach which affected more than half of
all Americans and millions of UK consumers, the firm
revealed in its latest financials. An AWS-hosted database was configured with no
username or password required for access to personal
“Wormable” Bug Could Enable Another WannaCry
Addressing and Solving 2019’s Top Cybersecurity Challenges
Assange Hit with 18-Count Indictment
Aussie Government IT Worker Arrested for Cryptomining
Baltimore Won’t Pay Ransom, Systems Remain Down
Chipmakers Cut Huawei Shipments
Companies' Stock Value Dropped 7.5% after Data Breaches
Critical Vulnerabilities in Cisco Products
DDoS Attacks on the Rise After Long Period of Decline
Download Hijack Flaw Patched in Slack for Windows
Encryption is Often Poorly Deployed, if Deployed at All
Europol and US Police Disrupt $100m Cybercrime Gang
Ex-CIA Man Gets 20 Years for Handing China Secrets
FCA: £27m Lost to Crypto Scams Last Year
Fifth of Docker Containers Have No Root Passwords
Firmware Vulnerability in Mitsubishi Electric
Forbes Site Up, Then Down Again after Magecart Attack
Fraud Attacks from Mobile Spiked 300% in Q1
GDPR: Security Pros Believe Non-Compliance is Rife
Google Stored Plaintext Passwords Since 2005
Hacktivist Attacks Fall 95% Since 2015
Hospitals Failing on Security Hygiene
IoT Attacks Cost UK Firms Over £1bn
LeakedSource Company Pleads Guilty
Lib Dems Come First in UK for Cybersecurity
LinkedIn Admits a Delay in Renewing TLS Cert
Malicious Attacks Cause of Most Aussie Breaches
More Orgs Use Booby Traps for Counterintelligence
Nine Charged in $2m SIM Swap Campaign
Over 460,000 E-Retailer User Accounts Hacked
Ransomware Not Gone but More Targeted, Report Says
Rights Group Win Allows Courts to Scrutinize Spy Agencies
ScarCruft APT Develops Malware to Target Bluetooth
SMS Spammers Expose 80 Million Records Online
Speculators Look to ID AVs Hacked by Russia
TalkTalk Overlooked Nearly 5000 Customers with Breach Notification
UK Fraud Complaints Surge 40%
UK Invests £22m in Army Cyber Centers as Russian Threat Looms
WannaCry Remains a Global Threat Two Years On
Washington Issues Temporary License to Huawei
WhatsApp Finds and Fixes Targeted Attack Bug
78% of Consumers Say Online Companies Must Protect ...
97% of Americans Can't Ace a Basic Security Test
A Trustworthy Digital Foundation Is Essential to ...
Attackers Are Messing with Encryption Traffic to ...
Baltimore Ransomware Attack Takes Strange Twist
Commercial Spyware Uses WhatsApp Flaw to Infect Phones
Consumer IoT Devices Are Compromising Enterprise ...
Cyber Workforce Exec Order: Right Question, Wrong ...
Data Security: Think Beyond the Endpoint
DDoS Attacks Up in Q1 After Months of Steady Decline
Demystifying the Dark Web: What You Need to Know
Exposed Elasticsearch Database Compromises Data on ...
GDPR Drives Changes, but Privacy by Design Proves ...
How a Manufacturing Firm Recovered from a ...
How Open Testing Standards Can Improve Security
How Security Vendors Can Address the Cybersecurity ...
Incident Response: 3 Easy Traps & How to Avoid Them
Introducing the Digital Transformation Architect
Killer SecOps Skills: Soft Is the New Hard
Korean APT Adds Rare Bluetooth Device-Harvester Tool
LockerGoga, MegaCortex Ransomware Share Unlikely Traits
Microsoft Patches Wormable Vuln in Windows 7, 2003, ...
Missing in Action: Cybersecurity Professionals
New Intel Vulnerabilities Bring Fresh CPU Attack ...
Old Threats Are New Again
Poorly Configured Server Exposes Most Panama ...
Proving the Value of Security Awareness with ...
Q1 2019 Smashes Record For Most Reported ...
Researcher Publishes Four Zero-Day Exploits in ...
Russian Nation-State Hacking Unit's Tools Get More ...
Satan Ransomware Adds More Evil Tricks
The 3 Cybersecurity Rules of Trust
The Data Problem in Security
To Narrow the Cyber Skills Gap with Attackers, Cut ...
US Charges Members of GozNym Cybercrime Gang
Website Attack Attempts Rose by 69% in 2018
When Older Windows Systems Won't Die
CISOs Toughest Battle: Finding the
Right Weapons to Fight the Last
One Percent of Threats – Cyber
by Liviu Arsene, Global Cybersecurity Analyst,
Bitdefender. In a fast-changing landscape where
large cyber attacks make the news virtually every
One year old, GDPR marks a number of
successes and inspirations
Since GDPR's passing, many American companies have had
to take stock of how they collect, store and utilize the data
4 dimensions of network monitoring that matter most for data security
A strong data security defense always comes back to the basics
Cyber Threat Competition helps train the next data guardians
EU agrees on powers to sanction, freeze assets over cyber-attacks
First comprehensive index of the Dark Web planned for 2020 release
G-7 authorities to war game cyber attack on bank for first time
Global hackers are thwarted by FBI, Europe in $100M heist
New software Framework intended to define, advance security features
WhatsApp urges users to update after spyware hacking report
Your next move: Vulnerability analyst
A joint operation by international police dismantled GozNym gang
Cloud Direct Connects: The Best Bet for Cyber Security
Cyber-attacks thrive the market for Managed Security Services
Data Security in the Digital Era
Don’t Leave Vulnerability Management to Chance
How We Can Secure The Energy Grid and the Smart Home Of The Future
IMPORTANCE OF “The General Data Protection Regulation” in Cyber Security World
Key Considerations for Identity Governance in the Cloud
Mobile Apps Loaded with Holes Like Swiss Cheese
On the Clock
Safer Internet Day 2018: Where You’re Falling Short on Your Online Ad Campaigns
Security Remains Top Concern for IBM AIX Community
Some of the world’s biggest crimes go unnoticed, until it’s too late
Synthetic identity fraud and social engineering are growing concerns and on the rise
The Privileged Account Security and the Internet of Things
The Seven Stages of GDPR Compliance