El Diario del CISO El Diario del CISO (The CISO Journal) Edición 4 - Page 6

News2 EL DIARIO DEL CISO (THE CISO JOURNAL) Pensando y Trabajando por un Líder de Seguridad Digital Thehackernews Adobe Releases February 2019 Patch Updates For 75 Vulnerabilities Ex-US Intelligence Agent Charged With Spying and Helping Iranian Hackers Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups Microsoft Patch Tuesday — February 2019 Update Fixes 77 Flaws New Unpatched macOS Flaw Lets Apps Spy On Your Safari Browsing History Researchers Implant "Protected" Malware On Intel SGX Enclaves Snapd Flaw Lets Attackers Gain Root Access On Linux Systems WARNING – New Phishing Attack That Even Most Vigilant Users Could Fall For Threatpost Data Breach Bonanza: Dating Apps, Equifax, Mass Credential Dumps Eight Cryptojacking Apps Booted From Microsoft Store Ever-Changing Emotet Evolves Again with Fresh Evasion Tactic Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security Tips on How to Fight Back Against DNS Spoofing Attacks Where's the Equifax Data? Does It Matter? Welivesecurity Attack at email provider wipes out almost two decades’ worth of data Bank of Valetta resumes operations after cyberheist-induced shutdown When love becomes a nightmare: Online dating scams Why you should choose a pseudonym at Starbucks Securitynow Botched Mumsnet update allowed users to see details of strangers' accounts Smashing Security #115: Love, Nests, and is 2FA destroying the world? Some OkCupid users have their accounts compromised. Why don't more dating apps use 2FA? VFEmail suffers 'catastrophic' attack, as hacker wipes email service's primary and backup data ITspmagazine Securitymagazine Are We Investing In InfoSec To Solve Problems Or Make Money? Prevention Is Always Better Than Reaction When It Comes To Safety. Cybersecurity Is No Different, But What To Do If You Become A Victim Of Cybercrime? Snake Oil or Silver Bullet? Blockchains Are Neither Zdnet Adobe’s massive patch update fixes critical Acrobat, Reader bugs Doomsday Docker security hole uncovered Error: Page Not found Malvertising campaign hits US users hard over Presidents' Day weekend POS firm says hackers planted malware on customer networks Two cybersecurity myths you need to forget right now, if you want to stop the hackers Grahamcluley 8 Cybersecurity Risks That May Impact Organizations in 2019 80 Percent of U.S. Businesses Expect a Critical Breach in 2019 Departing the Profession: Why Infosec Burnout is a Bigger Deal Than We Think Other news $31.82 Bn MEA Cybersecurity Market - Forecast to 2023 122 K-12 cybersecurity threats reported last year 7 Security Tips for Online Business Owners A Road Map for CISOs AI, DL: salvation or demise for cybersecurity? Another flaw found in macOS Mojave’s privacy protection CISO Burnout is Real: Nominet Survey Exposes Soaring CISO Stress Correctly Understanding the Cyber Security Triads CrowdStrike: Nation-state cyber operations gaining steam -- FCW Cyber attack on Malta bank tried to transfer cash abroad Increased Cryptomining: a Toehold for Attackers Lessons Learned From 2018 Security Breaches Six Large Data Dumps Add Fuel to Collection #1's Fire The Rise of 'Fileless' Malware What You Need to Know About Arbitrary Code Execution Vulnerabilities Cyware ATM-jackpotting WinPot malware now features a slot machine interface Critical vulnerabilities spotted in the Amtrak mobile application Dunn Brothers, Chino Latino and other Minnesota businesses hit by data breach Mississippi hospital struck by phishing attack exposing data of nearly 30,000 patients White hats flooded VKontakte social media network with a spam campaign as a part of a revenge prank Lawjournalnewsletter ‘Dark Overlord’ Hack Shows Mounting Cyber Risks for Law Firms 2019 Trends Overview: Compliance, Privacy and Security Family Tree Causation and Harm In Data Breach Litigation Implications of GDPR & CCPA on Public Records Legal Operations Chiefs Say Managing Technology and Cutting Costs Are Main Priorities, Not Blockchain or AI Cybertalk Critical resources at risk across the globe due to cyberattacks Hackers know how to show the love on Valentine's Day Leaking of Bezos' personal data suggests cybersecurity weakness Pitfalls and Progress: Cyber Security in the Education Sector VFEmail knocked out by hackers - calls it 'catastrophic' Cyber Security Compliance Requirements Deadline March 1st, 2019 Cybersecurity and the C-Suite: What Executives Need to Know Cybersecurity for marketers: Teamwork is key to protect data Dependencies: It's not just your code you need to secure. Future-of-IT-Audit-Position-Paper_mis_Eng_0818.pdf Hard-to-detect credential-theft malware has infected 1,200 and is still going HIMSS 2019: Cybersecurity Is a War — Here’s How Providers Can Fight Back How Adaptive Cyber Security Can Enable Digital Health Adoption How could Bashe-style ransomware threats impact cyber insurance? How to prevent IoT hacks: Focus on security, not features How your stolen personal data is sent to the dark web, and what hackers can do with it InfoSec Institute's Top Podcasts to Take Your Computer Skills to the Next Level Intermountain CISO West: Cybersecurity for revenue cycle should be a KPI Investment Property for Sale UK Major Flaw in Runc Poses Mass Container Takeover Risk Most Companies Are Confident in Their Compliance Controls: eSecurity Planet Survey Neobanks face cyber security struggle to match big banks New Malware Kills Rival Miners Upon Installation Old Phantom Crypter upends malicious document tools – Sophos News Russian hackers targeted US think tanks in Europe Russian to shut down Internet to test its cyber deterrence Special Report: Cybersecurity Texas AG: Business Must Implement and Maintain Reasonable Cybersecurity Safeguards The week in security: With breaches soaring, is cybersecurity just minutes to midnight? These Are the Countries With the Best and Worst CybersecuritySecurity Affairs Trend Micro Survey Finds 80 Percent of U.S. Businesses Expect a Critical Breach in 2019 Understanding and Implementing US Air Force Veteran Charged in Iran Hacking Scheme WhatsApp vulnerability discovered that lets you bypass Face ID or Touch ID security feature Where cybersecurity legislation 'goes to die' in Congress Why Building a Security First Culture is Business-Critical Why cybersecurity education matters Why Visibility is Critical to Protecting Machine Identities. An Interview with CISO John Graham Working Within a New Cyber Framework » Posts www.cisos.club [email protected]