El Diario del CISO El Diario del CISO (The CISO Journal) Edición 1 | Page 5

EL DIARIO DEL CISO (THE CISO JOURNAL) Pensando y Trabajando por un Líder de Seguridad Digital Data Breach Collection Contains 773 Million Unique Emails Australian security expert Troy Hunt says an 87 GB compilation of username and password combinations - drawn from more than 2,000 databases - includes 773 million unique email addresses, for apparent use in credential- stuffing attacks. A New View of Threat Intelligence: The Last Line of Defense Airline Booking System Exposed Passenger Details Dharma Gang Pushes Phobos Crypto-Locking Ransomware Emotet Malware Returns to Work After Holiday Break Facebook Deletes More Bogus Accounts Linked to Russia Feds Urge Private Sector ’Shields Up’ Against Hackers France Hits Google With $57 Million GDPR Fine German Police Identify Suspect Behind Massive Data Leak Germany's Mega-Leak Takeaway: Noisy Young Hacker Got Caught Government Shutdown: Experts Fear Deep Cybersecurity Impact Hackers Leak Hundreds of German Politicians' Personal Data Hackers Wield Commoditized Tools to Pop West African Banks Hard-Coded Credentials Found in ID, Access Control Software Insider Trading: SEC Describes $4.1 Million Hacking Scheme Making the Case for Zero-Trust Security Marriott Mega-Breach: Victim Count Drops to 383 Million Neiman Marcus Settles Lawsuit Over Payment Card Breach Ransom Moves: The Dark Overlord Keeps Pressuring Victims Ransomware Claims to Fund Child Cancer Treatments Report: FTC Considers Fine Against Facebook 'Right to Be Forgotten' Should Be EU-Only, Adviser Says Solving 3rd Party Cybersecurity Risk UK Sentences Man for Mirai DDoS Attacks Against Liberia Webinar Your Garage Opener Is More Secure Than Industrial Remotes Sunset of Windows Server 2008: Migrate with Docker Police Arrest IOTA Cryptocurrency Theft Suspect The Application Security Team's Framework For Upgrading Legacy Applications 5 Malware Trends: Emotet Is Hot, Cryptominers Decline DHS Issues More Urgent Warning on DNS Hijacking How to build a better CISO - Help Net Security The technology industry has long been categorized by its ability to transform at the blink of an eye. 2019 cybersecurity workforce: Recruiting vs. re-skilling 43% of businesses are still running Windows 7, security threats remain 773 million records exposed in massive data breach 90% of companies face significant obstacles with digital transformation A new taxonomy for SCADA attacks Compromised ad company serves Magecart skimming code to hundreds of websites Cyber risk management and return on deception investment Email security predictions: What we can expect in 2019 Four cybersecurity trends every CIO should know Hackers who DDoSed African telecom and US hospital get long prison sentences How IT organizations are transforming to meet the demands of the digital economy New requirements for the secure design and development of modern payment software Risk managers see cybersecurity as the biggest threat to business Security analytics to reach $12 billion by 2024 SmokeLoader malware downloader enters list of most wanted malware The costs of cyberattacks increased 52% to $1.1 million Why security by design and security DevOps are so critical to success The most effective security strategies to guard sensitive information 83% of global respondents experienced phishing attacks in 2018 PHP PEAR supply chain attack: Backdoor added to installer Cyberattacks fueled by geopolitical tension are increasing Cybercriminals increasingly taking aim at businesses Business resilience should be a core company strategy, so why are businesses struggling to take action? Cybercrime could cost companies trillions over the next five years The 5 Stages of CISO Success, Past & Future In cybersecurity, as in history, security leaders who forget the lessons of the past will be doomed to repeat them. 2018's Most Common Vulnerabilities Include Issues ... 773 Million Email Addresses, 21 Million Passwords ... Are You Listening to Your Kill Chain? Cryptomining Continues to Be Top Malware Threat Hijacking a PLC Using its Own Network Features New Attacks Target Recent PHP Framework Vulnerability Oklahoma Data Leak Compromises Years of FBI Data Online Fraud: Now a Major Application Layer ... Redefining Critical Infrastructure for the Age of ... Report: Bots Add Volume to Account Takeover Attacks SEC Issues Charges in 'Edgar' Database Hack Simulating Lateral Attacks Through Email The Security Perimeter Is Dead; Long Live the New ... Triton/Trisis Attack Was More Widespread Than ... VC Investments in Cybersecurity Hit Record Highs in ... 'We Want IoT Security Regulation,' Say 95% of IT ... Why Cyberattacks Are the No. 1 Risk Cisco Study Finds Fewer Data Breaches at GDPR-Ready ... Database of 24 Million Mortgage, Loan Records Left ... Collateral Damage: When Cyberwarfare Targets ... Enterprise Malware Detections Up 79% as Attackers ... Think Twice Before Paying a Ransom Google Creates Online Phishing Quiz Internet Society to Issue Privacy Code of Conduct Security Talent Continues to Fetch Top Dollar on IT ... Shadow IT, IaaS & the Security Imperative Top 10 IT security stories of 2018 - computerweekly.com Search Data Center. HCI, acquisitions led 2018 data center news. London cyber innovation centre expands global ties Name and shame firms with poor cyber security, government told Public procurement key to cyber security Ransomware in decline, report confirms Crime stats show switch in focus by cyber criminals Budding UK cyber strategists gear up for national competition UK cyber security agency investigates DNS hijacking New tech putting sensitive data at risk, report confirms UK police target hundreds of DDoS attackers Unconfigured IoT is a security risk, warns researcher Global cyber attack could cost up to $193bn, study shows How the government shutdown impacts the nation's security EXECUTIVE SUMMARY: If your company was in a temporary stall waiting for a Anatomy of how Russia penetrated the US electric grid At the White House, good cybersecurity is still a challenge CryptoMix ransomware takes an altruistic angle - not Cyber insurance firm refuses to pay up for NotPetya DX.Exchange trading site leaks user data Employee unwittingly interviews for job with hackers Supersized password breach affects 773 million Supreme Court foregoes hearing Fiat Chrysler appeal in cybersecurity case WEF: Cyberattacks, data breaches among top global threats