El Diario del CISO El Diario del CISO (The CISO Journal) Edición 26 - Page 22

Facebook ’ s fact-checkers train AI to detect “ deep fake ” videos # 44CON : In a Time of Genuine Threats , Talk Sensibly & Act Efficiently . KOK08 Files Virus – Remove It and Restore Data ‘ Web hackers held my data hostage ,’ says Wiltshire police commissioner 1-15 August 2018 Cyber Attacks Timeline 12 New iOS 12 Features That Promise to Enhance Enterprise Device Management 2 Billion Bluetooth Devices are Still Vulnerable to Dangerous BlueBorne Attack After 1 Year 2 Billion Bluetooth Devices Remain Exposed to Airborne Attack Vulnerabilities 2 Billion Bluetooth Devices Still Affected by the Blueborne Vulnerability 20 / 20 malware vision , ( Sun , Sep 16th ) 2018-09-14 – Quick post : Emotet infection with Trickbot 40 % of Managers Say Boards Should Oversee Cybersecurity , Survey Shows 42 Million Emails And Passwords Uploaded To A Free , Public Hosting Service 8 300 officers join forces to tackle crime from the Western Balkans 8 critical safety tips for safer online banking A cyberattack could trigger the next financial crisis , new report says A Decade-Old Attack Can Break the Encryption of Most PCs A group of researchers showed how a Tesla Model S can be hacked and stolen in seconds using only $ 600 worth of equipment A lil Saturday morning computer programming A practical guide to testing the security of Amazon Web Services ( Part 1 : AWS S3 ) Adaptiva debuts new Windows endpoint health checks and remediations Address Bar Spoofing Attacks by Safari Browser Almost 42 Million E-Mail Usernames and Passwords Found on Kayo An Overview of the OWASP Security Champions Playbook Analysis of half-a-billion emails reveals malware-less email attacks are on the rise Apple Donating $ 1 Million to American Red Cross as Hurricane Florence Makes Landfall Apple Has Started Paying Hackers For iPhone Exploits Apple Releases New iPhone Handsets , New Watch Apple removes top anti-malware apps from its store for “ stealing data ” Apple Shares ‘ Shot on iPhone XS ’ Video Demoing Slo-mo , 4K , and Time-Lapse Modes Apple Shares Full Video of ‘ Gather Round ’ iPhone and Apple Watch Event on YouTube Apple Shares New Minute-Long Video Highlighting iPhone XS Features [ Updated ] Apple Watch Series 4 Now Available for Pre-Order Apple Watch Series 4 vs . Apple Watch Series 3 Apple , Amazon , Google , others called to testify on consumer privacy protections Apple ’ s Online Store Down Ahead of iPhone XS , iPhone XS Max , and Apple Watch Series 4 Pre-Orders APT10 Targeting Japanese Corporations Using Updated TTPs Army Futures Command to set up DIU-like innovation lab Arxan launches advanced protection for client-side web apps August ’ s Most Wanted Malware : Banking Trojan Attacks Turn up the Heat Aviation & Logistics : Island Hopping – A Growing Threat www . itsecuritynews . info ( Weekly Resume )

Leveraging Segmentation to Secure IoT Leviathan – Mass Audit Toolkit for Networks and Applications Lin . Security – Vulnhub CTF Challenge Walkthrough Listen to the Music of Technology With Integration Engineer Tone Johnson Lucky Break LuckyMouse Group is back and using a legitimate certificate to sign Malware Magecart are coming for you , are you ready ? MageCart Attackers Compromise Cloud Service Firm Feedify Magecart Back Again as Feedify is Hit Magecart compromises Feedify to get to hundreds of e-commerce sites Magecart Threat Group Racks Up More Hack Victims Major US mobile carriers want to be your password Malicious Kodi Add-ons Install Windows & Linux Coin Mining Trojans Malware Delivered Through MHT Files , ( Thu , Sep 13th ) Malware-as-a-Service – New Black Rose Lucy Malware Targets Android Devices With a Special Logic for Xiaomi Phones Mapping Social Networks With Gephi Mark Zuckerberg Defends Facebook ’ s Privacy , Security Improvements Masergy appoints James Parker as CEO Mastering Container Security : Docker , Kubernetes and More Microsoft ‘ Tests ’ Pop Up Warning For Rival Browsers Microsoft Clears the Air About Fighting CLOUD Act Abuses Microsoft Is Updating Office Desktop on Windows With New Features for Insiders Microsoft Office 365 Customers Get Protection Against Malicious Macros Microsoft Office is more dangerous than you think : Doc deliver 45 % of all malware Microsoft Office is more dangerous than you think : Docs deliver 45 % of all malware Microsoft Office Macros Still No . 1 Malware Delivery Microsoft releases new Windows 10 preview with acrylic sign-in screen Microsoft releases new Windows 10 preview with promise of Tencent games compatibility Microsoft revs up government cloud drive Microsoft September Patch Fixed 61 Vulnerabilities Including A Zero-Day Microsoft Takes Down More than 3000 Tech Support Scam Ads Mobile Device Access Predicted to Surpass Desktop This Holiday Season Mobile fraud is increasing , attack rates rising 24 % year-over-year More Bay Area Jurisdictions Adopt Civilian Control of Police Spy Tech Morgan Stanley to offer bitcoin swap trading Morpheus – TCP / UDP Manipulation Framework Most Important Web Server Penetration Testing Checklist Most Modern Computers Vulnerable to Cross-Platform Cold Boot Attack MS-ISAC Releases Advisory on PHP Vulnerabilities MY TAKE : Here ’ s how diversity can strengthen cybersecurity — at many levels N . Korea Calls Sony , Wannacry Hack Charges Smear Campaign NanoLock Security selected to Thales CYBER @ Station F program
www.itsecuritynews.info(Weekly Resume) Facebook’s fact-checkers train AI to detect “deep fake” videos #44CON: In a Time of Genuine Threats, Talk Sensibly & Act Efficiently .KOK08 Files Virus – Remove It and Restore Data ‘Web hackers held my data hostage,’ says Wiltshire police commissioner 1-15 August 2018 Cyber Attacks Timeline 12 New iOS 12 Features That Promise to Enhance Enterprise Device Management 2 Billion Bluetooth Devices are Still Vulnerable to Dangerous BlueBorne Attack After 1 Year 2 Billion Bluetooth Devices Remain Exposed to Airborne Attack Vulnerabilities 2 Billion Bluetooth Devices Still Affected by the Blueborne Vulnerability 20/20 malware vision, (Sun, Sep 16th) 2018-09-14 – Quick post: Emotet infection with Trickbot 40% of Managers Say Boards Should Oversee Cybersecurity, Survey Shows 42 Million Emails And Passwords Uploaded To A Free, Public Hosting Service 8 300 officers join forces to tackle crime from the Western Balkans 8 critical safety tips for safer online banking A cyberattack could trigger the next financial crisis, new report says A Decade-Old Attack Can Break the Encryption of Most PCs A group of researchers showed how a Tesla Model S can be hacked and stolen in seconds using only $600 worth of equipment A lil Saturday morning computer programming A practical guide to testing the security of Amazon Web Services (Part 1: AWS S3) Adaptiva debuts new Windows endpoint health checks and remediations Address Bar Spoofing Attacks by Safari Browser Almost 42 Million E-Mail Usernames and Passwords Found on Kayo An Overview of the OWASP Security Champions Playbook Analysis of half-a-billion emails reveals malware-less email attacks are on the rise Apple Donating $1 Million to American Red Cross as Hurricane Florence Makes Landfall Apple Has Started Paying Hackers For iPhone Exploits Apple Releases New iPhone Handsets, New Watch Apple removes top anti-malware apps from its store for “stealing data” Apple Shares ‘Shot on iPhone XS’ Video Demoing Slo-mo, 4K, and Time-Lapse Modes Apple Shares Full Video of ‘Gather Round’ iPhone and Apple Watch Event on YouTube Apple Shares New Minute-Long Video Highlighting iPhone XS Features [Updated] Apple Watch Series 4 Now Available for Pre-Order Apple Watch Series 4 vs. Apple Watch Series 3 Apple, Amazon, Google, others called to testify on consumer privacy protections Apple’s Online Store Down Ahead of iPhone XS, iPhone XS Max, and Apple Watch Series 4 Pre-Orders APT10 Targeting Japanese Corporations Using Updated TTPs Army Futures Command to set up DIU-like innovation lab Arxan launches advanced protection for client-side web apps August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat Aviation & Logistics: Island Hopping – A Growing Threat Leveraging Segmentation to Secure IoT Leviathan – Mass Audit Toolkit for Networks and Applications Lin.Security – Vulnhub CTF Challenge Walkthrough Listen to the Music of Technology With Integration Engineer Tone Johnson Lucky Break LuckyMouse Group is back and using a legitimate certificate to sign Malware Magecart are coming for you, are you ready? MageCart Attackers Compromise Cloud Service Firm Feedify Magecart Back Again as Feedify is Hit Magecart compromises Feedify to get to hundreds of e-commerce sites Magecart Threat Group Racks Up More Hack Victims Major US mobile carriers want to be your password Malicious Kodi Add-ons Install Windows & Linux Coin Mining Trojans Malware Delivered Through MHT Files, (Thu, Sep 13th) Malware-as-a-Service – New Black Rose Lucy Malware Targets Android Devices With a Special Logic for Xiaomi Phones Mapping Social Networks With Gephi Mark Zuckerberg Defends Facebook’s Privacy, Security Improvements Masergy appoints James Parker as CEO Mastering Container Security: Docker, Kubernetes and More Microsoft ‘Tests’ Pop Up Warning For Rival Browsers Microsoft Clears the Air About Fighting CLOUD Act Abuses Microsoft Is Updating Office Desktop on Windows With New Features for Insiders Microsoft Office 365 Customers Get Protection Against Malicious Macros Microsoft Office is more dangerous than you think: Doc deliver 45% of all malware Microsoft Office is more dangerous than you think: Docs deliver 45% of all malware Microsoft Office Macros Still No v&RFVƗfW'֖7&6gB&VV6W2WrvFw2&WfWrvF7'Ɩ26v֖67&VV֖7&6gB&VV6W2WrvFw2&WfWrvF&֗6RbFV6VBvW26F&ƗG֖7&6gB&Wg2WvfW&VB6VBG&fP֖7&6gB6WFV&W"F6fVBcgVW&&ƗFW26VFrW&F֖7&6gBFW2Fv&RF3FV67W'B66G0&RFWf6R66W72&VF7FVBF7W'72FW6FF2ƖF6V6&Rg&VB27&V6rGF6&FW2&6r#BRV"fW"זV &R&&VW&6F7F2FB6fƖ6G&bƖ6R7FV6&v7FWFffW"&F67vG&Fp'WW2( 5D5TEVFg&Wv&7B'FBvV"6W'fW"VWG&FFW7Fr6V6Ɨ7@7BFW&6WFW'2gVW&&RF7&72Ff&6B&BGF62ԕ42&VV6W2Gf6'gVW&&ƗFW0ՒDSW&^( 2rFfW'6G67G&VwFV7&W'6V7W&G( BBWfV0&V626v7'66&vW26V"6v66V7W&G6VV7FVBFFW25$U$7FFb&w&