El Diario del CISO El Diario del CISO (THE CISO JOURNAL) EDICIÓN 23 | Page 6
Other Important News
'Election Protection' Aims to Secure Candidates ...
'Hack the Marine Corps' Bug Bounty Event Held in Vegas
2018 Pwnie Awards: Who Pwned, Who Got Pwned
Active Third-Party Content the Bane of Web Security
Assessing & Mitigating Increased Exposure to ...
Austra lian Teen Hacked Apple Network
Building Security into the DevOps Pipeline
Election Websites, Back-End Systems Most at Risk of ...
Ensuring Web Applications Are Hardened, Secure
Equifax Avoided Fines, but What If ...?
Facebook Awards $1M for Defense-Based Research
Washington Man Sentenced in Ransomware Conspiracy
Filtering the Threat Intelligence Tsunami
Flaws in Mobile Point of Sale Readers Displayed at ...
Gartner Says IT Security Spending to Hit $124B in 2019
Hacker Unlocks 'God Mode' and Shares the 'Key'
The Economics of AI-Enabled Security
Social Engineers Show Off Their Tricks
Instagram Hack: Hundreds Affected, Russia Suspected
Intel Reveals New Spectre-Like Vulnerability
Leveraging the Power of your End-Users' Human Cognition
Butlin’s Customers Face Anxious Holiday After Breach
Credential-Stealing Financial Trojan Targets Banks
Customer Files $223m Suit Against AT&T After SIM Swap Fraud
Deals Get Phishy for Real Estate Sector
Fax Attack: Researchers Warn of New Vector for Hackers
Firewall Still Critical Tool in Network Security
Firms at Mercy of Smarter, Faster Cyber-Criminals
Hackers Target Instagram, Users Blame Russia
Indian Bank Loses $13.5m in Global Attack
Make a Wish: Dark Reading Caption Contest Winners
Malicious Cryptomining & Other Shifting Threats
Marap Malware Appears, Targeting Financial Sector
Microsoft ADFS Vulnerability Lets Attackers Bypass MFA
Miller & Valasek: Security Stakes Higher for ...
Necurs Botnet Goes Phishing for Banks
Nigerian National Convicted for Phishing US ...
Open Source Software Poses a Real Security Threat
Oracle: Apply Out-of-Band Patch for Database Flaw ASAP
Overcoming 'Security as a Silo' with Orchestration ...
Researcher Finds MQTT Hole in IoT Defenses
Researchers Find New Fast-Acting Side-Channel ...
Simplifying Defense Across the MITRE ATT&CK Matrix
Supplementing the SOC with Cyber-as-a-Service
The 5 Challenges of Detecting Fileless Malware Attacks
The Data Security Landscape Is Shifting: Is Your ...
The Economics of AI-Enabled Security
The Rise of Bespoke Ransomware
Using Threat Deception on Malicious Insiders
Vulnerability Disclosures in 2018 So Far Outpacing ...
More Than 10K Recorded Vulnerabilities in 2018
NHS Patient Data at Risk from Historic Breach: Report
NSA Insider Teaches Next-Gen IT Strategies
Pen Testers Breach Perimeter Through Web Apps
PUB File That Drops Ammyy Targeted 2,700 Banks
Security Experts Welcome Rise in Students Taking Computing A-Level
Smart Home Alert as MQTT Errors Expose Users
Trump Signs NIST Act to Benefit Small Businesses
Trump Takes Offensive Cybersecurity Step Forward