El Diario del CISO El Diario del CISO (The CISO Journal) Edición 13 | Page 6
News0
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
International InfoSec & Cybersecurity News
Bulgarian Tax Breach Nets All the
Records
20 Questions to Ask During a Real (or Manufactured) ...
6 Actions That Made GDPR Real in 2019
79% of US Consumers Fear Webcams Are Watching
800K Systems Still Vulnerable to BlueKeep
A Lawyer's Guide to Cyber Insurance: 4 Basic Tips
Answer These 9 Questions to Determine if Your Data ...
BitPaymer Ransomware Operators Wage Custom, ...
Bluetooth Bug Enables Tracking on Windows 10, iOS & ...
Britain Looks to Levy Record GDPR Fine Against ...
Bug Bounties Continue to Rise as Google Boosts its ...
Business Email Compromise: Thinking Beyond Wire ...
Calculating the Value of Security
CISO Pressures: Why the Role Stinks and How to Fix It
Competing Priorities Mean Security Risks for Small ...
Equifax to Pay Up to $700M for Data Breach Damages
Europol Head Fears 5G Will Give Criminals an Edge
Ex-NSA Contractor Gets 9 Years for Retaining ...
FBI Publishes GandCrab Decryption Keys
Firmware Vulnerabilities Show Supply Chain Risks
Flaws in Telegram & WhatsApp on Android Put Data at ...
For Real Security, Don't Let Failure Be Your ...
Frank Taylor: Better Processes Lead to Tighter Security
How Attackers Infiltrate the Supply Chain & What to ...
How Cybercriminals Break into the Microsoft Cloud
Is 2019 the Year of the CISO?
Johannesburg Ransomware Attack Leaves Residents in ...
Malware in PyPI Code Shows Supply Chain Risks
Malware-based Attacks Dropped 20% Worldwide
Microsoft Patches Zero-Day Vulnerabilities Under ...
Mirai Groups Target Business IoT Devices
Mirai-Like Botnet Wages Massive Application-Layer ...
MITRE ATT&CK Framework Not Just for the Big Guys
New 'WannaHydra' Malware a Triple Threat to Android
NSA to Form New Cybersecurity Directorate
Penetration Test Data Shows Risk to Domain Admin ...
Persistent Threats Can Last Inside SMB Networks for ...
RDP Bug Takes New Approach to Host Compromise
Russia Attempted to De-Anonymize Tor Browser: Report
Russian Threat Group May Have Devised a ...
Security Considerations in a BYOD Culture
Security Lessons From a New Programming Language
Security Training That Keeps Up with Modern Development
Smash-and-Grab Crime Threatens Enterprise Security
Sprint Reveals Account Breach via Samsung Website
The 10 Essentials of Infosec Forensics
The Commoditization of Multistage Malware Attacks
The Edge
The Truth About Vulnerabilities in Open Source Code
The War for Cyber Talent Will Be Won by Retention ...
There's a Security Incident in the Cloud: Who's ...
Toyota's Car-Hacking Tool Now Available
With Data Breach Costs, Time is Money
Comprehensive Cyber Security for Digital
Era! | Cyber Defense Magazine
Defensive Measures for Non Profits
Intelligently Developed Assessment for Cyber Training
New APT34 campaign uses LinkedIn to deliver fresh malware
Note to HR: InfoSec Applicants are not Necessarily Mainstream
Securing V2I & the Future of Intelligent Transportation Systems
Startups Get a Jump on Success with the LaunchPad Technology Accelerator
What You Need To Know About Anti Phishing Standards Part 1
When Phishing Succeeds The Alternate Inbox Method
Why You Need a Good Head-Hunter to Help Fight Cyber Crime
Equifax Negotiates Potential $700
Million Breach Settlement
Audit Finds More Security Vulnerabilities at IRS
BEC Scams Cost U.S. Companies $300 Million Per Month: Study
Broadcom Reportedly Suspending Bid for Symantec
Consumer Advocates Criticize Equifax Settlement Plan
Ex-NSA Contractor Harold Martin Hit With 9-Year Sentence
FIN8 Group Returns, Targeting POS Devices With New Tools
Impact of AMCA Breach Continues to Grow
iNSYNQ Continues Recovery From MegaCortex Ransomware Attack
Ireland Assessing Minors' Profiles on Instagram
Is the Equifax Settlement Good Enough?
Phishing Attack Aimed at Stealing Payroll Deposits
Phishing Campaign Tied to Amazon Prime Day
Phishing Scheme Targets Amex Cardholders
Ransomware: As GandCrab Retires, Sodinokibi Rises
Report: Ransomware Targets QNAP Storage Devices
Researchers Trick Cylance Into Giving Malware a Pass
Software Engineer Charged With Stealing Company Secrets
Suspected Rubella Toolkit Mastermind Arrested
Why Hackers Abuse Active Directory
Yet Again, More Victims Added to AMCA Breach Tally
Louisiana Declares Cybersecurity State of
Emergency
[INFOGRAPHIC] Employees receive nearly five phishing emails per work week,
according to Avanan
[Scam of The Week] New 'US State Police' Phishing Extortion Scam Includes
Contact Numbers
80% of Organizations Don’t Use DMARC Making Them Susceptible to Email
Spoofing
An Amazon Phishing Scam Hits Just In Time For Prime Day
BEC = “Because it’s Easy Cash” Scammers Trick Employees Into Giving Away
Customer Info
Deep Fakes Getting Better Every Day With AI / Machine Learning
Here Is Some Great InfoSec Budget Ammo From UBS
Microsoft Discovers New Excel-Based Attack to Deliver the FlawedArmmyRAT
Malware
Netflix's New "The Great Hack" Reminds Us -- If you Don't Pay For the Product You
*Are* The Product
New Study Finds Employees Pose the Greatest Cybersecurity Risk
NSA Launches Cybersecurity Arm To Defend The U.S. From Foreign Adversaries
NSO spyware ‘targets Big Tech cloud services’
OSINT – a Hacker’s First Asset in Targeted Attacks
Q2 2019 Top-Clicked Phishing Email Subjects from KnowBe4 [INFOGRAPHIC]
Ransomware Attacks Costs Nearly Triple in 2019 to over $36K Per Attack
Romanian Cybercriminals Sentenced for Phishing Campaign
TrickBot Malware May Recently Have Hacked 250 Million Email Accounts
U.S. Coast Guard Warns of Phishing Attacks Designed for Data Theft and Malware
Infection
Whoa Nellie. BEC Scams Average USD 300 Million Per Month In Illegal Transfers
La Porte County Pays $130,000 Ransom
To Ryuk Ransomware
Amazon Accounts Targeted by 16Shop Phishing Kit
BlueKeep Scanner Discovered in Watchbog Cryptomining Malware
Cracked Tesla 3 Windshield Leads to $10,000 Bug Bounty
Hackers Exploit Recent WordPress Plugin Bugs for Malvertising
iNSYNQ Cloud Hosting Provider Hit by Ransomware Attack
Keep Calm, Carry On. VLC Not Affected by Critical Vulnerability
NCSC Issues Alert About Active DNS Hijacking Attacks
New Okrum Malware Used by Ke3chang Group to Target Diplomats
Phishing Campaign Bypasses Email Gateways via WeTransfer Alerts
ProFTPD Vulnerability Lets Users Copy Files Without Permission
Ransomware Attack Cripples Power Company’s Entire Network
Ransomware Attacks Prompt Louisiana to Declare State of Emergency
Real-Time Location of Millions Exposed by Mobile Loan Apps
Russian FSB Intel Agency Contractor Hacked, Secret Projects Exposed
Sodinokibi Ransomware Distributed by Hackers Posing as German BSI
Trojan-Riddled WinRAR, Winbox, IDM Spreads StrongPity Spyware
US Govt Rolls Out New DNS Security Measures for .gov Domains
Windows 10 SmartScreen Sends URLs and App Names to Microsoft