El Diario del CISO El Diario del CISO (The CISO Journal) Edición 12 | Page 6

News0 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader International InfoSec & Cybersecurity News Mozilla plugs critical Firefox zero-day used in targeted attacks 1 in 10 open source components downloaded in 2018 had a known security vulnerability 41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025 Anatomy of a ransomware attack: How attackers gain access to unstructured data Another Oracle WebLogic Server RCE under active exploitation Are U.S. companies overpaying to attract new talent? Botnets shift from Windows towards Linux and IoT platforms Cloud security exacerbated by immature security practices Consumers believe privacy is not possible, leading to a change in online behavior Countering industrial cyberthreats with secure, standards-based, licensed wireless networks Cybercriminals leverage malicious Office docs, Mac malware, web app exploits Cybersecurity professionals are outgunned and burned out Dell fixes high-risk vulnerability in pre-installed SupportAssist software Download: eSentire Q1 2019 Quarterly Threat Report Economic cycles and disruption are where top CFOs set their firms apart from the competition Eurofins ransomware attack affected UK police work Every year, millions of web domains are registered to defraud businesses Executives now recognize cybersecurity as a key business driver Finding skilled pros remains a challenge, cloud and security in high demand How can organizations leverage AI technologies to achieve project success? How employees and their organizations are prioritizing data privacy How much risk small businesses really pose to supply chain cybersecurity? How to add security to digital transformation processes Human error still the cause of many data breaches Insured losses from a cyber catastrophe could reach billions Interoperability and security remain critical factors in any smart city deployment IoT explodes worldwide, researchers investigate security issues present in the devices real users own New EU-funded project aims to disrupt wildlife cybercrime One year of GDPR application: Europeans well aware of their digital rights Only 12% of banks appear to be fully committed to digital transformation OpenSSH adds protection against Spectre, Meltdown, RAMBleed Organizations more likely to accelerate business when protecting their cloud data Regulation readiness: Embracing the privacy legislation wave ahead Review: Specops uReset Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps The biggest SecOps burdens hindering progress for enterprises and MSSPs Threat actors are doing their homework, researchers identify new impersonation techniques What does runtime container security really mean? When it comes to cybersecurity, perfection is the enemy of progress Where are organizations stalling with cybersecurity best practices? Why businesses need IAM to push their zero trust frameworks forward Why phishing education has never been more critical to your business Why poor visibility is hampering cybersecurity Why simplifying cybersecurity is essential for mutual fund boards of directors Worldwide IoT spending forecast to reach $726 billion this year You don't just acquire a company, but also its cybersecurity posture 14-year-old teenager creates malware to destroy smart devices - ET CISO As cyber crimes rise, insurers bat for individuals to opt for risk cover Average DNS attack cost rises by 19% to $814,150 in APAC Data Strategy: Essential elements to enhance it Florida city pays $600,000 ransom to save computer records Hacker used $35 computer to steal sensitive NASA data Infosys: Infy's cyber security unit sees rising demand as threats mount State cyber-attack poses big danger for UK banks: Bank of England Suspected Chinese hackers attack global telecom carriers The risk of cyberwarfare during blackouts US launched cyber strikes on Iranian spy group after oil tanker attacks: Officials Cost per Cyberattack Jumps to $4.6M in 2019 7 Ways to Mitigate Supply Chain Attacks A Socio-Technical Approach to Cybersecurity's Problems AWS CISO Talks Risk Reduction, Development, Recruitment Better Cybersecurity Research Requires More Data ... Breaking the Endless Cycle of 'Perfect' Cybercrimes Critical Firefox Vuln Used in Targeted Attacks Customers of 3 MSPs Hit in Ransomware Attacks Cybersecurity Accountability Spread Thin in the C-Suite DDoS-for-Hire Services Doubled in Q1 Developers and Security Teams Under Pressure to ... DHS Tests Remote Exploit for BlueKeep RDP Vulnerability Florida Town Pays $600K to Ransomware Operators Global Cyberattack Campaign Hit Mobile Carrier ... How GDPR Teaches Us to Take a Bottom-Up Approach to ... How Hackers Infiltrate Open Source Projects Inside the FBI's Fight Against Cybercrime Machine Learning Boosts Defenses, but Security Pros ... MageCart Launches Customizable Campaign More Supply, More Demand: Cybersecurity Skills Gap ... New Decryptor Unlocks Latest Versions of Gandcrab New Linux Worm Attacks IoT Devices NIST Issues IoT Risk Guidelines Pledges to Not Pay Ransomware Hit Reality Power Outage Hits Millions in South America Sensory Overload: Filtering Out Cybersecurity's Noise Small Businesses May Not Be Security's Weak Link The Rise of 'Purple Teaming' The Rise of Silence and the Fall of Coinhive What 3 Powerful GoT Women Teach Us about ... NASA's Jet Propulsion Lab a Frequent Hack Victim: Audit 10 Highlights: Infosecurity Europe 2019 Keynotes Analysis: The Cybersecurity Risks Major Corporations Face Are You APT-Ready? The Role of Breach and Attack Simulation Be Proactive: Fight and Mitigate Future Attacks with Cyber Threat Hunting DHS: Conflict With Iran Could Spur ‘Wiper’ Attacks Facebook's Libra Cryptocurrency Prompts Privacy Backlash Florida City Paying $600,000 to End Ransomware Attack GAO: After Equifax Breach, KBA No Longer Effective GDPR: Where Do We Go From Here? Instagram Shows Kids’ Contact Details in Plain Sight More US Cities Battered by Ransomware Police Arrest 6 in $28 Million Cryptocurrency Fraud Probe Second Florida City Pays Up Following Ransomware Attack Step Away From the Artificial Intelligence Troy Hunt: Why Data Breaches Persist Two Weekend Outages, Neither a Cyberattack 2nd Florida City Pays Hackers, as 3rd City Faces Breach 645,000 Clients Affected in Oregon Department of Human Services Data Breach ENISA Transforms to European Union Agency for Cybersecurity Essential IIoT Security Trends for 2020 Former Equifax Executive Gets 4 Months for Insider Trading Industry Reactions to Nation-State Hacking of Global Telcos Investigation and Response is a Team Sport Iranian Cyberspies Update Infrastructure Following Recent Report Italy Fines Facebook Over Cambridge Analytica Case Mission Possible: ICS Attacks On Buildings Are a Reality Provider of Data Integration Services for Fortune 100 Firms Exposed Sensitive Files Russian Tech Giant Yandex Targeted With 'Regin' Malware: Report Security Doesn't Have to be a Losing Battle Silexbot Malware Bricks IoT Devices US Cyber Attack on Iran: Search to Exploit Flaw Why Diversity of Thought in the Workplace Matters