El Diario del CISO El Diario del CISO (The CISO Journal) Edición 12 | Page 6
News0
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
International InfoSec & Cybersecurity News
Mozilla plugs critical Firefox zero-day
used in targeted attacks
1 in 10 open source components downloaded in 2018 had a known security
vulnerability
41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025
Anatomy of a ransomware attack: How attackers gain access to unstructured
data
Another Oracle WebLogic Server RCE under active exploitation
Are U.S. companies overpaying to attract new talent?
Botnets shift from Windows towards Linux and IoT platforms
Cloud security exacerbated by immature security practices
Consumers believe privacy is not possible, leading to a change in online
behavior
Countering industrial cyberthreats with secure, standards-based, licensed
wireless networks
Cybercriminals leverage malicious Office docs, Mac malware, web app exploits
Cybersecurity professionals are outgunned and burned out
Dell fixes high-risk vulnerability in pre-installed SupportAssist software
Download: eSentire Q1 2019 Quarterly Threat Report
Economic cycles and disruption are where top CFOs set their firms apart from
the competition
Eurofins ransomware attack affected UK police work
Every year, millions of web domains are registered to defraud businesses
Executives now recognize cybersecurity as a key business driver
Finding skilled pros remains a challenge, cloud and security in high demand
How can organizations leverage AI technologies to achieve project success?
How employees and their organizations are prioritizing data privacy
How much risk small businesses really pose to supply chain cybersecurity?
How to add security to digital transformation processes
Human error still the cause of many data breaches
Insured losses from a cyber catastrophe could reach billions
Interoperability and security remain critical factors in any smart city
deployment
IoT explodes worldwide, researchers investigate security issues present in the
devices real users own
New EU-funded project aims to disrupt wildlife cybercrime
One year of GDPR application: Europeans well aware of their digital rights
Only 12% of banks appear to be fully committed to digital transformation
OpenSSH adds protection against Spectre, Meltdown, RAMBleed
Organizations more likely to accelerate business when protecting their cloud
data
Regulation readiness: Embracing the privacy legislation wave ahead
Review: Specops uReset
Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps
The biggest SecOps burdens hindering progress for enterprises and MSSPs
Threat actors are doing their homework, researchers identify new
impersonation techniques
What does runtime container security really mean?
When it comes to cybersecurity, perfection is the enemy of progress
Where are organizations stalling with cybersecurity best practices?
Why businesses need IAM to push their zero trust frameworks forward
Why phishing education has never been more critical to your business
Why poor visibility is hampering cybersecurity
Why simplifying cybersecurity is essential for mutual fund boards of directors
Worldwide IoT spending forecast to reach $726 billion this year
You don't just acquire a company, but also its cybersecurity posture
14-year-old teenager creates malware to
destroy smart devices - ET CISO
As cyber crimes rise, insurers bat for individuals to opt for risk cover
Average DNS attack cost rises by 19% to $814,150 in APAC
Data Strategy: Essential elements to enhance it
Florida city pays $600,000 ransom to save computer records
Hacker used $35 computer to steal sensitive NASA data
Infosys: Infy's cyber security unit sees rising demand as threats mount
State cyber-attack poses big danger for UK banks: Bank of England
Suspected Chinese hackers attack global telecom carriers
The risk of cyberwarfare during blackouts
US launched cyber strikes on Iranian spy group after oil tanker attacks: Officials
Cost per Cyberattack Jumps to $4.6M in
2019
7 Ways to Mitigate Supply Chain Attacks
A Socio-Technical Approach to Cybersecurity's Problems
AWS CISO Talks Risk Reduction, Development, Recruitment
Better Cybersecurity Research Requires More Data ...
Breaking the Endless Cycle of 'Perfect' Cybercrimes
Critical Firefox Vuln Used in Targeted Attacks
Customers of 3 MSPs Hit in Ransomware Attacks
Cybersecurity Accountability Spread Thin in the C-Suite
DDoS-for-Hire Services Doubled in Q1
Developers and Security Teams Under Pressure to ...
DHS Tests Remote Exploit for BlueKeep RDP Vulnerability
Florida Town Pays $600K to Ransomware Operators
Global Cyberattack Campaign Hit Mobile Carrier ...
How GDPR Teaches Us to Take a Bottom-Up Approach to ...
How Hackers Infiltrate Open Source Projects
Inside the FBI's Fight Against Cybercrime
Machine Learning Boosts Defenses, but Security Pros ...
MageCart Launches Customizable Campaign
More Supply, More Demand: Cybersecurity Skills Gap ...
New Decryptor Unlocks Latest Versions of Gandcrab
New Linux Worm Attacks IoT Devices
NIST Issues IoT Risk Guidelines
Pledges to Not Pay Ransomware Hit Reality
Power Outage Hits Millions in South America
Sensory Overload: Filtering Out Cybersecurity's Noise
Small Businesses May Not Be Security's Weak Link
The Rise of 'Purple Teaming'
The Rise of Silence and the Fall of Coinhive
What 3 Powerful GoT Women Teach Us about ...
NASA's Jet Propulsion Lab a Frequent
Hack Victim: Audit
10 Highlights: Infosecurity Europe 2019 Keynotes
Analysis: The Cybersecurity Risks Major Corporations Face
Are You APT-Ready? The Role of Breach and Attack Simulation
Be Proactive: Fight and Mitigate Future Attacks with Cyber Threat Hunting
DHS: Conflict With Iran Could Spur ‘Wiper’ Attacks
Facebook's Libra Cryptocurrency Prompts Privacy Backlash
Florida City Paying $600,000 to End Ransomware Attack
GAO: After Equifax Breach, KBA No Longer Effective
GDPR: Where Do We Go From Here?
Instagram Shows Kids’ Contact Details in Plain Sight
More US Cities Battered by Ransomware
Police Arrest 6 in $28 Million Cryptocurrency Fraud Probe
Second Florida City Pays Up Following Ransomware Attack
Step Away From the Artificial Intelligence
Troy Hunt: Why Data Breaches Persist
Two Weekend Outages, Neither a Cyberattack
2nd Florida City Pays Hackers, as 3rd
City Faces Breach
645,000 Clients Affected in Oregon Department of Human Services Data Breach
ENISA Transforms to European Union Agency for Cybersecurity
Essential IIoT Security Trends for 2020
Former Equifax Executive Gets 4 Months for Insider Trading
Industry Reactions to Nation-State Hacking of Global Telcos
Investigation and Response is a Team Sport
Iranian Cyberspies Update Infrastructure Following Recent Report
Italy Fines Facebook Over Cambridge Analytica Case
Mission Possible: ICS Attacks On Buildings Are a Reality
Provider of Data Integration Services for Fortune 100 Firms Exposed Sensitive
Files
Russian Tech Giant Yandex Targeted With 'Regin' Malware: Report
Security Doesn't Have to be a Losing Battle
Silexbot Malware Bricks IoT Devices
US Cyber Attack on Iran: Search to Exploit Flaw
Why Diversity of Thought in the Workplace Matters