El Diario del CISO El Diario del CISO (The CISO Journal) Edición 12 | Page 8

News2 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Grahamcluley Comptia 400GB of hacked files from US border surveillance contractor are available for anyone to download Bella Thorne releases her own topless photos after hacker threats NHS service accidentally reveals identities of HIV patients in email blunder WeTransfer security failure results in file transfer emails being sent to the wrong people Cybersecurity Awareness: A Critical Piece of the Security Puzzle Cybersecurity Basics: Don't Forget to Lock the Door How to Start a Career in Cybersecurity What Is the Difference Between IT Security and Cybersecurity? Forbes Infosecurity-magazine 10 Questions With Chase Cunningham On Cybersecurity Forbes Insights: Zero Trust: The Modern Approach To Cybersecurity How Cybersecurity Is Turning Users Into Security Experts The Cybersecurity Skills Gap Won't Be Solved in a Classroom Dashboard Act' Would Force Orgs to Disclose Data Dramatic Increase in Abuse of File Sharing Services ICO Issues Notices After Met Police Contravenes GDPR Recipe for Disaster as Tech Support Scammers Use Paid Search KrebsonSecurity Securitynow Breach at Cloud Solution Provider PCM Inc. Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers Tracing the Supply Chain Attack on Android Best Defense: 5 Key Trends in Application Security Defense Discovered for Defending Against BGP Hijacking & Off-Path DNS Attacks Millions of Dell PCs at Risk Due to Software Flaw Zero Trust Doesn't Trust You at All Digitalshadow Securereading Critical Flaw Discovered in Dell SupportAssist Software Critical Zero-Day Flaw Discovered in TP-Link Wi-Fi Extender Models Exim Worm Found Targeting Azure Customers Leaky SMB File Shares – So Many Bytes! Managing Digital Risk: 4 Steps to Take Managing Infosec Burnout Weekly Intelligence Summary 06 Jun - 13 Jun 2019 Trendmicro Govtech Cyberespionage Campaigns and Botnet Malware Malvertising and Internet of Things Malware ShadowGate Returns to Worldwide Operations With Evolved Greenflash Sundown Exploit Kit Over a Month On, Baltimore Still Grappling with Hack Fallout Riviera Beach, Fla., Works Toward Normalcy Post-Cyberattack Wanted: Effective CISOs Who (Happily) Stay Longer Bitdefender Techrepublic 645,000 people warned their personal health data at risk after phishing attack Bought a second-hand Nest Cam? It might have been spying on you Millions of Dell PCs vulnerable to attack, due to a flaw in bundled system-health software Office 365 Proves Popular with Phishers Two brothers arrested for Bitfinex hack and multi-year cryptocurrency phishing campaign How to fail at digital transformation: 3 pitfalls to avoid at all costs Why half of enterprises struggle to keep pace with cloud security Why your business should consider paying a ransom to hackers Cnbc Fortune Cyberattacks in UAE, Middle East: DarkMatter report Large bank spends money on cybersecurity aesthetic: "Kingdom of Lies" Hackers Breached NASA JPL Using a $25 Raspberry Pi Computer Microsoft Excel Vulnerability Could Put 120 Million Users At Risk BBC Nakedsecurity How a ransomware attack cost one firm £45m The fake French minister in a silicone mask who stole millions Serious Security: Rambleed attacks blunted – the OpenSSH way Social engineering forum hacked, user data dumped on rival site Weforum Tripwire $1.1 million in two weeks - Florida cities pay out big to ransomware gangs DDoS attack that knocked Telegram secure messaging service offline 3 technologies that could define the next decade of cybersecurity 3 ways AI will change the nature of cyber attacks Other News Sandboxes Are Vulnerable but Not Obsolete. Can a Secure Web Gateway with Internet Isolation Save the Day? ‘Cyber security is just people and problems’ 11 Eye Opening Cyber Security Statistics for 2019 15 Small Business Cyber Security Statistics That You Need to Know - Hashed Out by The SSL Store™ 4 Social Engineering Threats to Keep an Eye on — and How to Stop Them A Battle-Ready Problem in Cyber All the countries where someone shut down the entire internet Avoid These Top Four Cybersecurity Mistakes Beware of Fake John McAfee and Tesla Cryptocurrency Giveaways Chinese Hackers Play Operator With Global Telcos Cybersecurity Cybersecurity: Three hacking trends you need to know about to help protect yourself Cyber-Terrorism: How the US and Israel Attacked Iran—and Failed Data Privacy and Security – Everybody’s Buying Cyber… Why Aren’t You? Deidentification versus anonymization European regulators are already pressing Facebook about its cryptocurrency Gartner's Top IT Security Projects for 2019 Inside the Federal Cyber Reskilling Academy » Posts Iran vows to ditch more nuclear curbs in war of words with US IT Security Market 2019: IoT, Cyber and Cloud Securities www.cisos.club [email protected]