El Diario del CISO El Diario del CISO (THE CISO JOURNAL) EDICIÓN 23 | Page 8

CSOOnline Threatpos HelpnetSecurity
Hackers Can Falsify Patient ' s Vitals In Real Time
Trump Has Signed An Order Relaxing Rules Around The Use Of Cyber-
Weapons
How a Nonprofit Addresses Email Security Threats
10,644 vulnerabilities disclosed in the first half of 2018
Election systems should be considered critical infrastructure
Vulnerabilities in smart card drivers open systems to attackers
Faster , simpler , smaller , smarter : A cybersecurity dream becomes reality
AT & T sued for enabling SIM swap fraud
Five key security tips to avoid an IoT hack August 2018 Patch Tuesday : Microsoft fixes two actively exploited zero-days Hack the Marine Corps bug bounty program kicks off Cloud computing remains top emerging business risk Connecting the dots to North Korea as a threat adversary
Microsoft ADFS flaw allows attackers to bypass MFA safeguards New Office 365 phishing attack uses malicious links in SharePoint documents
Criminals can compromise company networks by sending malicious faxes
PSD2 SCA requirements will be implemented soon , are you ready ?
Critical vulnerability in Oracle Database , patch without delay !
Telecom services : Patient zero for email-based attacks ?
DDoS attackers increasingly strike outside of normal business hours
Three A ' s of SaaS adoption , and why every company goes through them
' China ' s MIT ' Linked to Espionage Campaign Against Alaska , Economic
Partners
Open MQTT Servers Raise Physical Threats in Smart Homes
AT & T Faces $ 224M Legal Challenge Over SIM-Jacking Rings
Patch Tuesday : Microsoft Addresses Two Zero-Days in 60-Flaw Roundup
Black Hat 2018 : IoT Security Issues Will Lead to Legal ' Feeding Frenzy '
Philips Vulnerability Exposes Sensitive Cardiac Patient Information
Victims Lose Access to Thousands of Photos as Instagram Hack Spreads
Podcast : Black Hat USA and DEF CON 2018 Wrap
Microsoft Cortana Flaw Allows Web Browsing on Locked PCs
Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw
Microsoft Flaw Allows Full Multi-Factor Authentication Bypass
Severe PHP Exploit Threatens Wordpress Sites with Remote Code Execution
New Variant of KeyPass Ransomware Discovered
ThreatList : Almost Half of the World ' s Top Websites Deemed ' Risky '
Office 365 Phishing Campaign Hides Malicious URLs in SharePoint Files
ThreatList : Financial-Themed Phishing Hooks Targets in Q2
Only ATM Heists Set to Accelerate After $ 13M Break-In
AI in cybersecurity : what works and what doesn ' t
Maintaining Effective Security Posture Amid Smokescreen Attacks
Balancing cybersecurity and regulatory compliance
Security flaws in police body cameras open the devices to attack
Why you should consider crowdsourcing IT security services
Take-aways from Black Hat USA 2018
Does Facebook even need a CSO ?
The state of cybersecurity at small organizations
Hack mobile point-of-sale systems ? Researchers count the ways
The unintended consequences of GDPR
Horizon Air tragedy highlights airline insider threat vulnerability
Vegas hotel room checks raise concerns at Def Con , Black Hat
How to make cybersecurity incidents hurt less
What is digital trust ? How CSOs can help drive business
Loyal to a Fault : Why Your Current DNS May Be Exposing You to Risk
Where Chicken Little meets information security