El Diario del CISO El Diario del CISO (The CISO Journal) Edición 9 - Page 8

News1.1 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Unprotected MongoDB Database Exposes Over 275 Million Personal Records | Cyware Hacker News 190,000 Accounts in Docker Hub Database May Have Been Exposed - Security Now An unprotected MongoDB database exposed over 275 Million personal records. Potentially poisoned images could be distributed without the distributors realizing that this is occurring. Airbnb user accounts allegedly hacked; previous bookings canceled and new bookings made Amazon Hit With Extensive Fraud Campaign Impacting Hundreds Of Seller Accounts Attackers delete GitHub, GitLab, and Bitbucket repositories and replace with ransom notes Baltimore City Hall and Potter County hit with ransomware attacks Chinese threat actor group APT3 used NSA-linked tools to target organizations, says new report Cyware Weekly Threat Intelligence, May 06-10, 2019 Freedom Mobile exposed almost 5 million customer records due to a misconfigured database Hackers stole over $41 million from Binance cryptocurrency exchange Iranian cyber espionage operations exposed via Telegram channels and Dark Web websites Mirrorthief cybercrime group targets online campus stores in the US and Canada with card skimming malware Scammers are adopting cloud services such as AWS, Azure, Alibaba, and Google Docs to trick victims Turla threat actor group hijacks Microsoft Exchange mail server using sophisticated LightNeuron backdoor Unprotected database belonging to Burger King exposes 37,900 records of Kool King Shop customers MegaCortex' Ransomware Hunts 'Big Game' Enterprise Cybercrime Study Finds Increasing Costs as Well as Changing Targets & Methods Enterprise Resilience: It's the Ecosystem, Stupid Quabot Trojan Evolves to Become Harder to Detect & Remove Airbnb Superhost Secretly Recorded Guests with Hidden Bedroom Camera Small businesses spent £13.6 billion recovering from cyber crime in 2018 - IT Governance Blog The incident is only the latest in a string of disturbing horror stories of guests finding live, recording cameras hidden in their Airbnb flats. Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak FIN7 Linked to Escalating Active Exploits for Microsoft SharePoint Bug Google Patches Critical Remote Code-Execution Flaws in Android Lax Telco Security Allows Mobile Phone Hijacking and Redirects Oracle WebLogic Exploit-fest Continues with GandCrab Ransomware, XMRig The WannaCry Security Legacy and What’s to Come Security Workforce 2019: Closing the Gap Builds a Bridge to the Future Serverless Computing: A New World of Security Risks Shadow IT & Unsecured Data Still Rampant Within the Digital Workplace Top 5 Cyber Security Breaches of 2019 So Far Each Friday, Cyber Security Hub scours the internet to provide readers with a notable ‘incident of the week 4 Ways To Defend The Enterprise From Nation-State Attacks Cyber Security Cross Over: What To Expect When Making That Transition How To Measure Cyber Risk On Your Digital Assets Incident Of The Week: Impact Of Docker Security Breach Risk Management At The Forefront Of Tech Enterprises The Economic Side Of Cyber Security Risk Management One in three UK companies fell victim to cyber attacks in 2018, with the majority of the damage occurring in small businesses, according to a report by Beaming Cyber criminals conned holidaymakers out of £7 million in 2018 Different types of cyber attacks IT Governance Free Downloadable Green Papers List of data breaches and cyber attacks in April 2019 – 1.34 billion records leaked Survey reveals just how bad the UK is at creating passwords Top 5 ways to get more women in your workforce New MegaCortex Ransomware Targets Corporate Networks | SecureReading Creating a more diverse workforce can have many benefits for tech companies. Tom Merritt shares five tips for getting women interested in applying. Security researchers have discovered a new ransomware called MegaCortex targeting corporate networks. 10 warning signs you're about to get fired or laid off Communication breakdown: 10 tips to get users to listen to IT The 10 highest-paying cybersecurity jobs Why marketing teams are critical to successful cybersecurity efforts Why older employees are less likely to get tricked by phishing attacks Critical Flaw Discovered in Kaspersky Antivirus Engine that Allows Arbitrary Code Execution Critical Flaw discovered in SQLite allowing Remote Code Execution Critical Flaws Discovered in Sierra Wireless AirLink Routers Hackers Discovered Exploiting Microsoft Sharepoint RCE Flaw in the Wild Hackers Stole over $41 Million worth Bitcoins from Binance Cryptocurrency Exchange Why IT departments miss basic IT security hygiene What’s Behind the Wolters Kluwer Tax Outage? — Krebs on Security IT departments are failing to patch security holes in software because of a disconnect between security and operations teams, survey finds. Early in the afternoon on Friday, May, 3, I asked a friend to relay a message to his security contact at CCH, the cloud-based tax division of the global information services firm Wolters Kluwer Businesses unprepared for cyber breaches Cyber criminals targeting C-suite, DBIR shows Police down two dark web markets Using simulated disaster management to tackle the security skills gap Nine Charged in Alleged SIM Swapping Ring Data: E-Retail Hacks More Lucrative Than Ever Feds Bust Up Dark Web Hub Wall Street Market