El Diario del CISO El Diario del CISO (The CISO Journal) Edición 12 | Page 8
News2
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
Grahamcluley
Comptia
400GB of hacked files from US border surveillance contractor are available for
anyone to download
Bella Thorne releases her own topless photos after hacker threats
NHS service accidentally reveals identities of HIV patients in email blunder
WeTransfer security failure results in file transfer emails being sent to the
wrong people
Cybersecurity Awareness: A Critical Piece of the Security Puzzle
Cybersecurity Basics: Don't Forget to Lock the Door
How to Start a Career in Cybersecurity
What Is the Difference Between IT Security and Cybersecurity?
Forbes
Infosecurity-magazine
10 Questions With Chase Cunningham On Cybersecurity
Forbes Insights: Zero Trust: The Modern Approach To Cybersecurity
How Cybersecurity Is Turning Users Into Security Experts
The Cybersecurity Skills Gap Won't Be Solved in a Classroom
Dashboard Act' Would Force Orgs to Disclose Data
Dramatic Increase in Abuse of File Sharing Services
ICO Issues Notices After Met Police Contravenes GDPR
Recipe for Disaster as Tech Support Scammers Use Paid Search
KrebsonSecurity
Securitynow
Breach at Cloud Solution Provider PCM Inc.
Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy
Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers
Tracing the Supply Chain Attack on Android
Best Defense: 5 Key Trends in Application Security
Defense Discovered for Defending Against BGP Hijacking & Off-Path DNS Attacks
Millions of Dell PCs at Risk Due to Software Flaw
Zero Trust Doesn't Trust You at All
Digitalshadow
Securereading
Critical Flaw Discovered in Dell SupportAssist Software
Critical Zero-Day Flaw Discovered in TP-Link Wi-Fi Extender Models
Exim Worm Found Targeting Azure Customers
Leaky SMB File Shares – So Many Bytes!
Managing Digital Risk: 4 Steps to Take
Managing Infosec Burnout
Weekly Intelligence Summary 06 Jun - 13 Jun 2019
Trendmicro
Govtech
Cyberespionage Campaigns and Botnet Malware
Malvertising and Internet of Things Malware
ShadowGate Returns to Worldwide Operations With Evolved Greenflash
Sundown Exploit Kit
Over a Month On, Baltimore Still Grappling with Hack Fallout
Riviera Beach, Fla., Works Toward Normalcy Post-Cyberattack
Wanted: Effective CISOs Who (Happily) Stay Longer
Bitdefender
Techrepublic
645,000 people warned their personal health data at risk after phishing attack
Bought a second-hand Nest Cam? It might have been spying on you
Millions of Dell PCs vulnerable to attack, due to a flaw in bundled system-health
software
Office 365 Proves Popular with Phishers
Two brothers arrested for Bitfinex hack and multi-year cryptocurrency phishing
campaign
How to fail at digital transformation: 3 pitfalls to avoid at all costs
Why half of enterprises struggle to keep pace with cloud security
Why your business should consider paying a ransom to hackers
Cnbc
Fortune
Cyberattacks in UAE, Middle East: DarkMatter report
Large bank spends money on cybersecurity aesthetic: "Kingdom of Lies"
Hackers Breached NASA JPL Using a $25 Raspberry Pi Computer
Microsoft Excel Vulnerability Could Put 120 Million Users At Risk
BBC
Nakedsecurity
How a ransomware attack cost one firm £45m
The fake French minister in a silicone mask who stole millions
Serious Security: Rambleed attacks blunted – the OpenSSH way
Social engineering forum hacked, user data dumped on rival site
Weforum
Tripwire
$1.1 million in two weeks - Florida cities pay out big to ransomware gangs
DDoS attack that knocked Telegram secure messaging service offline
3 technologies that could define the next decade of cybersecurity
3 ways AI will change the nature of cyber attacks
Other News
Sandboxes Are Vulnerable but Not Obsolete. Can a Secure Web Gateway with
Internet Isolation Save the Day?
‘Cyber security is just people and problems’
11 Eye Opening Cyber Security Statistics for 2019
15 Small Business Cyber Security Statistics That You Need to Know - Hashed Out
by The SSL Store™
4 Social Engineering Threats to Keep an Eye on — and How to Stop Them
A Battle-Ready Problem in Cyber
All the countries where someone shut down the entire internet
Avoid These Top Four Cybersecurity Mistakes
Beware of Fake John McAfee and Tesla Cryptocurrency Giveaways
Chinese Hackers Play Operator With Global Telcos
Cybersecurity
Cybersecurity: Three hacking trends you need to know about to help protect
yourself
Cyber-Terrorism: How the US and Israel Attacked Iran—and Failed
Data Privacy and Security – Everybody’s Buying Cyber… Why Aren’t You?
Deidentification versus anonymization
European regulators are already pressing Facebook about its cryptocurrency
Gartner's Top IT Security Projects for 2019
Inside the Federal Cyber Reskilling Academy » Posts
Iran vows to ditch more nuclear curbs in war of words with US
IT Security Market 2019: IoT, Cyber and Cloud Securities
www.cisos.club
[email protected]