El Diario del CISO El Diario del CISO (The CISO Journal) Edición 10 | Page 7

News1 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Ransomware and malware attacks decline, attackers adopting covert tactics - Help Net Security There has been a major decline in ransomware and malware attacks, with Ireland having some of the lowest rates globally Microsoft Patches RDS Vulnerability Allowing WannaCry-Like Attacks | SecurityWeek.Com Microsoft’s Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including a zero-day and a flaw that can be exploited by malware to spread similar to the way the notorious WannaCry did back in 2017. The zero- day vulnerability, tracked as CVE-2019-086 Analysis of device data shines a light on cybersecurity risks in healthcare As IT companies approach digital transformation, key issues remain a struggle CEOs and business leaders trust AI, but employees are more cautious CISOs: What would you do over? Companies investing in advanced forensic capabilities to identify attackers in greater detail Consumer spending on technology to reach $1.32 trillion in 2019 Cybersecurity skills shortage still the root cause of rising security incidents Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders Data will be processed by edge computing in 59% of IoT deployments by 2025 Employees are aware of USB drive security risks, but don't follow best practices Half of companies missed GDPR deadline, 70% admit systems won't scale High-risk vulnerability in Cisco's secure boot process impacts millions of devices How can we give cybersecurity analysts a helping hand? Intel MDS attack mitigation: An overview Microsoft plugs wormable RDP flaw, new speculative execution side channel vulnerabilities Microsoft updates break AV software, again! Microsoft's Attack Surface Analyzer now works on Macs and Linux, too On the path to Zero Trust security: Time to get started Over half of all reported vulnerabilities in Q1 2019 have a remote attack vector Phishing targeting SaaS and webmail services increased to 36% of all phishing attacks Prioritizing risks in a climate of geopolitical threats SharePoint servers under attack through CVE-2019-0604 The largest breaches over the past three years have caused massive and irreparable damage The six biggest cybersecurity risks facing the utilities industry ThreatQ adds support for mobile and PRE-ATT&CK in response to rapid customer adoption Tips to spring clean your company's social media and stay protected Traditional approach to data security hindering digital transformation initiatives Week in review Archives What CISOs should focus on when deciding on a strategy What does it take to be an infosec product strategist? WhatsApp flaw used to install spyware by simply calling the target While data enables innovation, its vulnerability continues to cause anxiety among IT leaders Cloud Security Alliance Study Identifies New And Unique Security Challenges In Native Cloud, Hybrid And Multi-cloud Environments | Information Security Buzz Adware Behaving Like Malware Another Zero-day Vulnerability In Microsoft's Latest Operating Systems Blockchain Systems: Known Attack Vectors And Countermeasures Car Manufacturers Be Aware - Bluetooth Module Could Lead To Vehicle Shut Down By Hackers Comcast Wants To Track Your Bedroom And Bathroom Habits Cybersecurity Is A Market For Lemons Google Restricts Huawei's Access To Android Operating System Hackers Steal Payment Card Data Using Rogue Iframe Phishing Instagram - Unsecured Database Exposed LinkedIn Certificate Outage - Lesson Learnt One Year On And 84% Of UK Consumers Don’t Think GDPR Has Been Effective Organisations See Huge Rise In Encryption Implementation Following GDPR Enforcement TalkTalk Data Breach Customer Details Found Online Windows 10 Zero-Day Exploit Code Released Online 5 Things Every SMB Should Know to Strengthen Defenses Assange Charged With 17 New Counts Under Espionage Act Attack Combines Phishing, Steganography, PowerShell to Deliver Malware Authorities Takedown GozNym Cybercrime Group That Stole an Estimated $100 Million Awareness Training Firm KnowBe4 Acquires Awareness Measurement Firm CLTRe Business Email Compromise Still Reigns EU Adopts Powers to Respond to Cyberattacks Facebook Figures Five Percent of Accounts Are Fake GDPR: One Year Down…Now What? Georgia Supreme Court Rules that State Has No Obligation to Protect Personal Information Google Warns G Suite Customers of Passwords Stored Unhashed Since 2005 Hackers Add Security Software Removal to Banload Banking Malware Hacktivist Attacks Declined 95 Percent Since 2015: IBM How to Evaluate Threat Intelligence Vendors That Cover the Deep & Dark Web How to Securely Blend Your IoT Data with Business Data Industrial Robotics - Are You Increasing Your Cybersecurity Risk? Instagram Says Not Source of Contact Info for Influential Users LeakedSource Operator Pleads Guilty in Canada Microsoft Releases Attack Surface Analyzer 2.0 Moody's Downgrades Equifax Outlook to Negative Over 2017 Data Breach Red Cross Website Hacked in Latest Singapore Cyber Attack Researcher Drops Windows 10 Zero-Day Exploit Stack Overflow Discloses Security Breach TeamViewer Confirms It Was Hacked in 2016 UK Has Warned 16 NATO Allies of Russia Hacking Attempts: Foreign Minister US Warns Chinese Drones May Steal Data: Report User Data Exposed in Stack Overflow Hack WhatsApp Vulnerability Exploited to Spy on Users Wormable Windows RDS Vulnerability Poses Serious Risk to ICS ZombieLoad: New Class of Vulnerabilities Leak Data From Intel Chips What you need to know about WhatsApp's spyware vulnerability - ET CISO India is among WhatsApp's largest markets with over 300 million using the messaging app to send texts and make calls. Cyber' will be the cause of next financial crisis: Sopnendu Mohanty, MAS ‘RobbinHood’ ransomware attack: What we can learn? 4,000 flyers stranded as cyber attack led to delay of 30 flights Bengaluru topped cyber hitlist in 2018, says study Dedicated IT link to check cyber attack at Kolkata airport Enterprises can build a thriving blockchain team with these skill sets How to effectively align security with IT Microsoft alerts for WannaCry-like exploit, releases Windows patches No private user details leaked: Instagram Real threat: Truecaller data available for sale Reporting relationships: Who should the CISO report to? Snapchat employees abused users' private data: Report UK vows to retaliate against Russian hacking WhatsApp says it moved fast to contain spyware attack damage