El Diario del CISO El Diario del CISO (The CISO Journal) Edición 26 - Page 23
Back to school with the Cisco Umbrella Chromebook client
Barrage of Mobile Fraud Attacks Will Increase
BEC scam artist ordered to pay back $2.5 million, lands hefty prison sentence
BEC Scammer To Serve Five Years And Pay $2.5 Million
Beginners Guide to Blockchain Technology (Part 2)
Benefits Of Biometrics
Best Way to Find the Stolen Android Phones with the Help of Google
BlackBerry Massively Steps Up Security Efforts to Address Threat Storm
Blockchain betting app mocks competitor for getting hacked. Gets hacked four days later
Blockchain hustler beats the house with smart contract hack
Bomgar announces acquisition of BeyondTrust to expand PAM offerings
Bomgar Buys BeyondTrust
British Airways Customer Data Stolen in Website and Mobile App Hack
British Airways data breach may be the work of Magecart
British Airways data breach shows why every company needs a Cyber Incident Response and Crisis
Communication Plan
British Airways Hack Update: Caused by Injected Script & PCI DSS Non-Compliance is Suspected
British Airways Site Infected with Card Skimming Code
Browser security hole on Macs and iPhones – just how bad is it?
California bill regulates IoT for first time in US
Can Google Cloud IAM Be Used as a Directory?
Canadian town forced to pay Bitcoin after nasty ransomware attack
Channel Scoop: September 14, 2018
Chaotic Digital Transformation Strategies And Disjointed Network Environments – The Perfect Legal Storm Is
Brewing
Checklist: Essential Factors to Consider While Switching to HTTPS
China’s MSS Leveraging Students In, From U.S.
China-linked APT10 group behind new attacks on the Japanese media sector
China-linked APT10 Hackers Update Attack Techniques
Chinese Cyber Espionage Group APT10 Delivers UPPERCUT Backdoor Via Malicious Word Documents
Chrome 69 Shows the WWW & M Subdomains Again, but It’s Only Temporary
City of Stockholm Selects MobileIron Threat Defense to Detect and Mitigate Mobile Threats
Click Here to Kill Everybody Reviews and Press Mentions
Cloud data management firm exposes database with over 440M emails & IP addresses
Cloud-Native Attacks Executed Against Known CVEs
Cobalt crime gang is using again CobInt malware in attacks on former soviet states
Cold Boot Attack from 2008 Still Affects PCs and Macs
Cold Boot Attacks – Hackers Can Unlock All the Modern Computers and Steal Encryption Keys & Passwords
Cold-Boot Attack Steals Passwords In Under Two Minutes
Companies Should Gear Up To Handle Data Privacy Laws
Critical infrastructure will have to operate if there’s malware on it or not
CrowdStrike Makes The Forbes Cloud 100 List for Second Straight Year Rising to No. 6
Cryptomining malware infects Windows and Linux Kodi users
Culture change starts with you: How you can take steps to improve your working life
Current Security Measures Not Enough to Protect Data in Lost or Stolen Laptops, Experts Warn
Nasty Piece Of CSS Code Crashes And Restarts iPhones
NCSC: Time for Boards to Get Cyber Literate
New Android Botnet Pops Up on Malware-as-a-Service Market
New Brrr Dharma Ransomware Variant Released
New cold boot attack affects “nearly all modern computers”
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs
New Cold Boot Attacks Can Evade Current Mitigations
New Copyright Powers, New “Terrorist Content” Regulations: A Grim Day For Digital Rights in Europe
New CSS Attack Restarts an iPhone or Freezes a Mac
New Firmware Flaws Resurrect Cold Boot Attacks
New GandCrab ransomware variant hammers Florida school district
New GandCrab Variant Attacks Florida School District
New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value
New infosec products of the week: September 14, 2018
New modification of the old cold boot attack leaves most systems vulnerable
New PyLocky Ransomware Attack on Various Organization that Encrypt More than 100 File Extensions
New PyLocky Ransomware stands out for anti-machine learning capability
New Ransomware Named PyLocky Discovered
News of the Week: September 15, 2018
Nigerian Fraudster Who Stole Millions Heads to U.S. Prison
North Korea claims hacker responsible for WannaCry outbreak does not exist
North Korea Claims NHS And Sony Hack Suspect Doesn’t Exist
Novel Browser Locker Technique Hijacks Google Chrome
Npower Investigating Personal Data Breach
Official mobile version of Tor Browser released for Android – Download now
Offline: Activists and Technologists Still Face Grave Threats for Expression
OilRig APT Continues Its Ongoing Malware Evolution
OilRig Launching Attack Campaigns With Updated BONDUPDATER Trojan
One Year Later, Over 2 Billion Devices Still Exposed to BlueBorne Attacks
One-Third of Data Breaches Led to People Losing Jobs: Kaspersky
Open Source Security Research Group gets a new office
Operator at kayo.moe found a 42M Record Credential Stuffing Data ready to use
Outdated Duplicator Plugin RCE Abused
Over 3000 Tech Support Scam Ads Eschewed by Microsoft
Over 60 Vulnerabilities Patched In Microsoft September Updates
Overcoming information governance inertia
Partner Perspectives: VMRay + Carbon Black Bridge the Gap Between Threat Hunting & Incident Response
Partnerstroka: Large tech support scam operation features latest browser locker
Paul Manafort Guilty Plea Highlights Increased Enforcement of Foreign Agents Registration Act
Persistent EternalBlue-Powered Wannamine Cryptominer Still Alive
Phished credentials caused twice as many breaches than malware in the past year
Police hit Australian immigration centre over alleged AU$3m business email scam
Potential Hurricane Florence Phishing Scams
Preventing exfiltration of sensitive docs by flooding systems with hard-to-detect fakes