El Diario del CISO El Diario del CISO (THE CISO JOURNAL) EDICIÓN 23 | Page 6

Other Important News 'Election Protection' Aims to Secure Candidates ... 'Hack the Marine Corps' Bug Bounty Event Held in Vegas 2018 Pwnie Awards: Who Pwned, Who Got Pwned Active Third-Party Content the Bane of Web Security Assessing & Mitigating Increased Exposure to ... Austra lian Teen Hacked Apple Network Building Security into the DevOps Pipeline Election Websites, Back-End Systems Most at Risk of ... Ensuring Web Applications Are Hardened, Secure Equifax Avoided Fines, but What If ...? Facebook Awards $1M for Defense-Based Research Washington Man Sentenced in Ransomware Conspiracy Filtering the Threat Intelligence Tsunami Flaws in Mobile Point of Sale Readers Displayed at ... Gartner Says IT Security Spending to Hit $124B in 2019 Hacker Unlocks 'God Mode' and Shares the 'Key' The Economics of AI-Enabled Security Social Engineers Show Off Their Tricks Instagram Hack: Hundreds Affected, Russia Suspected Intel Reveals New Spectre-Like Vulnerability Leveraging the Power of your End-Users' Human Cognition Butlin’s Customers Face Anxious Holiday After Breach Credential-Stealing Financial Trojan Targets Banks Customer Files $223m Suit Against AT&T After SIM Swap Fraud Deals Get Phishy for Real Estate Sector Fax Attack: Researchers Warn of New Vector for Hackers Firewall Still Critical Tool in Network Security Firms at Mercy of Smarter, Faster Cyber-Criminals Hackers Target Instagram, Users Blame Russia Indian Bank Loses $13.5m in Global Attack Make a Wish: Dark Reading Caption Contest Winners Malicious Cryptomining & Other Shifting Threats Marap Malware Appears, Targeting Financial Sector Microsoft ADFS Vulnerability Lets Attackers Bypass MFA Miller & Valasek: Security Stakes Higher for ... Necurs Botnet Goes Phishing for Banks Nigerian National Convicted for Phishing US ... Open Source Software Poses a Real Security Threat Oracle: Apply Out-of-Band Patch for Database Flaw ASAP Overcoming 'Security as a Silo' with Orchestration ... Researcher Finds MQTT Hole in IoT Defenses Researchers Find New Fast-Acting Side-Channel ... Simplifying Defense Across the MITRE ATT&CK Matrix Supplementing the SOC with Cyber-as-a-Service The 5 Challenges of Detecting Fileless Malware Attacks The Data Security Landscape Is Shifting: Is Your ... The Economics of AI-Enabled Security The Rise of Bespoke Ransomware Using Threat Deception on Malicious Insiders Vulnerability Disclosures in 2018 So Far Outpacing ... More Than 10K Recorded Vulnerabilities in 2018 NHS Patient Data at Risk from Historic Breach: Report NSA Insider Teaches Next-Gen IT Strategies Pen Testers Breach Perimeter Through Web Apps PUB File That Drops Ammyy Targeted 2,700 Banks Security Experts Welcome Rise in Students Taking Computing A-Level Smart Home Alert as MQTT Errors Expose Users Trump Signs NIST Act to Benefit Small Businesses Trump Takes Offensive Cybersecurity Step Forward