El Diario del CISO El Diario del CISO (The CISO Journal) Edición 6 | Page 9

News2 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Threatpost Citrix Falls Prey to Password-Spraying Attack Insider Threats Get Mean, Nasty and Very Personal Lenovo Patches Intel Firmware Flaws in Multiple Product Lines RSA Conference 2019: Emotet Takes Aim at Latin America RSA Conference 2019: Firms Continue to Fail at IoT Security RSA Conference 2019: NIST's Privacy Framework Starts to Take Shape RSA Conference 2019: Operational Technology Widens Supply Chain Attack Surfaces RSA Conference 2019: Picking Apart the Foreshadow Attack RSA Conference 2019: The Expanding Automation Platform Attack Surface RSA Conference 2019: Ultrasound Hacked in Two Clicks RSAC 2019: An Antidote for Tech Gone Wrong RSAC 2019: Malicious Emailed URLs See Triple-Digit Increase RSAC 2019: Microsoft Zero-Day Allows Exploits to Sneak Past Sandboxes RSAC 2019: Most Consumers Say ‘No’ to Cumbersome Data Privacy Practices RSAC 2019: New Operation Sharpshooter Data Reveals Higher Complexity, Scope RSAC 2019: The Dark Side of Machine Learning Threatlist: IMAP-Based Attacks Compromising Accounts at 'Unprecedented Scale' ThreatList: Phishing Attacks Doubled in 2018 Zero-Days in Counter-Strike Client Used to Build Major Botnet CSHUB Cyber Security Challenges, Focuses 2019 Cyber Security Continues To Drive Tech Spending in 2019 Education Is Key When Selling Security Services Incident Of The Week: Malware Attack Exposes Patient Data Magecart Web-Based Supply Chain Attacks Increasing NIST Privacy Framework Announced At RSAC RSAC Day 1 Theme: People And Tech Are ‘Better Together’ RSAC Opening Day Focuses On Cyber Security Talent TF 7 Radio Covers What's Going On At RSAC This Week Forbes A CEO Cheat Sheet For The Cybersecurity Big One Chinese Data Breach Exposes 'Breed Ready' Status Of Almost 2 Million Women Council Post: Challenges That Cause CISOs To Fail Council Post: Continuous Risk, Security And Compliance For Cybersecurity Posture Management: A Unified Approach Huawei Denies Then Plays The Blame Game Over Cybersecurity Vulnerabilities Tech Companies Put Onus On Women To Protect Themselves From Cyber Crime Was The Facebook Outage A Cyber-Attack? Why Should They Listen to the CISO? Securitynow Boosted Rowhammer & Cache Attacks Spell Bad News for Intel Can Social Media Chatter Predict the Severity of Cybersecurity Threats? Convergence: Real Problems When it Comes to Securing the IoT/IIoT Is China as Bad as Russia When It Comes to Trying to Influence America? North Korea Circumvents Sanctions Through Cybercrime, Says Report Qbot Mutation Poses Global Threat Study Finds 77% of Mobile Users Compromised by Leak of PII Data Welivesecurity Facebook suffer most severe outage ever, family of apps also impacted International Women’s Day 2019: How can we be better allies? IoT security meets SMB on the floor of RSA 2019 Over 2 billion records exposed by email marketing firm RSA 2019: Protecting your privacy in a NIST and GDPR world RSA conference, USA 2019: Keynotes and key words Information-management 5 steps to performing an effective data security risk assessment 600,000 affected by huge data breach in Michigan 7 emerging data security and risk management trends 9 steps organizations can take to get ahead of new data privacy laws Artificial intelligence and cybersecurity: Attacking and defending Delaware Guidance pays ransom to get its records back How regular phishing drills keep providers’ data safe Pressured by pending procedures, surgical practice pays ransom SSL/TLS-based data security threats are on the rise Success with the IoT starts with understanding 'Thing Management' Computerweekly Almost half UK firms hit by phishing attacks Avoid infosec mistakes of the past, urges Robert Hannigan Citrix breach once again highlights password weaknesses Cyber attackers favouring stealthier attacks, says Darktrace Cyber espionage group behind SingHealth attack Many firms unaware of data exfiltration threat National Cyber Security Programme at risk of missing targets Is it true you can't manage what you don't measure? No one key risk indicator is generic across all businesses Thehackersnews BEWARE – New 'Creative' Phishing Attack You Really Should Pay Attention To Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data Google Launches Backstory — A New Cyber Security Tool for Businesses Microsoft Releases Patches for 64 Flaws — Two Under Active Attack New WordPress Flaw Lets Unauthenticated Remote Attackers Hack Sites Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates Telegram Gained 3 Million New Users During WhatsApp, Facebook Outage Zero-Day Flaws in Counter-Strike 1.6 Let Malicious Servers Hack Gamers' PCs ETCiso ‘Ransomware’ attack on Lucknow’s 5-star hotel, cyber-cell grapples for clues 6 things small businesses can do to improve cybersecurity 60% online users fear unauthorised data collection, only 11% users read privacy policies: Survey As the web turns 30, is it an 'out-of-control monster'? Demat account fraud: How to safeguard against demat account fraud Hackers steal data from Citrix Phishing attacks more than double in 2018: Kaspersky Zdnet Cybersecurity: Why bosses are confident, and tech workers are scared NSW Electoral Commission claims physical separation mitigates Swiss voting flaw Proof-of-concept code published for Windows 7 zero-day Singapore proposes new security guidelines to beef up financial resilience Smart 'unhackable' car alarms open the doors of 3 million vehicles to hackers Study shows programmers will take the easy way out and not implement proper password security WordPress shopping sites under attack SCmagazine Are employees the weakest (cybersecurity) link? Sometimes Celebrating 30 years in cybersecurity Columbia Surgical Specialists pay $15,000 ransom to unlock files DoS vulnerability found in Cisco SPA514G IP phones Dozens of high-profile Box accounts found leaking sensitive data Facebook phishing campaign hitting iOS users www.cisos.club [email protected]