El Diario del CISO El Diario del CISO (The CISO Journal) Edición 13 | Page 6

News0 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader International InfoSec & Cybersecurity News Bulgarian Tax Breach Nets All the Records 20 Questions to Ask During a Real (or Manufactured) ... 6 Actions That Made GDPR Real in 2019 79% of US Consumers Fear Webcams Are Watching 800K Systems Still Vulnerable to BlueKeep A Lawyer's Guide to Cyber Insurance: 4 Basic Tips Answer These 9 Questions to Determine if Your Data ... BitPaymer Ransomware Operators Wage Custom, ... Bluetooth Bug Enables Tracking on Windows 10, iOS & ... Britain Looks to Levy Record GDPR Fine Against ... Bug Bounties Continue to Rise as Google Boosts its ... Business Email Compromise: Thinking Beyond Wire ... Calculating the Value of Security CISO Pressures: Why the Role Stinks and How to Fix It Competing Priorities Mean Security Risks for Small ... Equifax to Pay Up to $700M for Data Breach Damages Europol Head Fears 5G Will Give Criminals an Edge Ex-NSA Contractor Gets 9 Years for Retaining ... FBI Publishes GandCrab Decryption Keys Firmware Vulnerabilities Show Supply Chain Risks Flaws in Telegram & WhatsApp on Android Put Data at ... For Real Security, Don't Let Failure Be Your ... Frank Taylor: Better Processes Lead to Tighter Security How Attackers Infiltrate the Supply Chain & What to ... How Cybercriminals Break into the Microsoft Cloud Is 2019 the Year of the CISO? Johannesburg Ransomware Attack Leaves Residents in ... Malware in PyPI Code Shows Supply Chain Risks Malware-based Attacks Dropped 20% Worldwide Microsoft Patches Zero-Day Vulnerabilities Under ... Mirai Groups Target Business IoT Devices Mirai-Like Botnet Wages Massive Application-Layer ... MITRE ATT&CK Framework Not Just for the Big Guys New 'WannaHydra' Malware a Triple Threat to Android NSA to Form New Cybersecurity Directorate Penetration Test Data Shows Risk to Domain Admin ... Persistent Threats Can Last Inside SMB Networks for ... RDP Bug Takes New Approach to Host Compromise Russia Attempted to De-Anonymize Tor Browser: Report Russian Threat Group May Have Devised a ... Security Considerations in a BYOD Culture Security Lessons From a New Programming Language Security Training That Keeps Up with Modern Development Smash-and-Grab Crime Threatens Enterprise Security Sprint Reveals Account Breach via Samsung Website The 10 Essentials of Infosec Forensics The Commoditization of Multistage Malware Attacks The Edge The Truth About Vulnerabilities in Open Source Code The War for Cyber Talent Will Be Won by Retention ... There's a Security Incident in the Cloud: Who's ... Toyota's Car-Hacking Tool Now Available With Data Breach Costs, Time is Money Comprehensive Cyber Security for Digital Era! | Cyber Defense Magazine Defensive Measures for Non Profits Intelligently Developed Assessment for Cyber Training New APT34 campaign uses LinkedIn to deliver fresh malware Note to HR: InfoSec Applicants are not Necessarily Mainstream Securing V2I & the Future of Intelligent Transportation Systems Startups Get a Jump on Success with the LaunchPad Technology Accelerator What You Need To Know About Anti Phishing Standards Part 1 When Phishing Succeeds The Alternate Inbox Method Why You Need a Good Head-Hunter to Help Fight Cyber Crime Equifax Negotiates Potential $700 Million Breach Settlement Audit Finds More Security Vulnerabilities at IRS BEC Scams Cost U.S. Companies $300 Million Per Month: Study Broadcom Reportedly Suspending Bid for Symantec Consumer Advocates Criticize Equifax Settlement Plan Ex-NSA Contractor Harold Martin Hit With 9-Year Sentence FIN8 Group Returns, Targeting POS Devices With New Tools Impact of AMCA Breach Continues to Grow iNSYNQ Continues Recovery From MegaCortex Ransomware Attack Ireland Assessing Minors' Profiles on Instagram Is the Equifax Settlement Good Enough? Phishing Attack Aimed at Stealing Payroll Deposits Phishing Campaign Tied to Amazon Prime Day Phishing Scheme Targets Amex Cardholders Ransomware: As GandCrab Retires, Sodinokibi Rises Report: Ransomware Targets QNAP Storage Devices Researchers Trick Cylance Into Giving Malware a Pass Software Engineer Charged With Stealing Company Secrets Suspected Rubella Toolkit Mastermind Arrested Why Hackers Abuse Active Directory Yet Again, More Victims Added to AMCA Breach Tally Louisiana Declares Cybersecurity State of Emergency [INFOGRAPHIC] Employees receive nearly five phishing emails per work week, according to Avanan [Scam of The Week] New 'US State Police' Phishing Extortion Scam Includes Contact Numbers 80% of Organizations Don’t Use DMARC Making Them Susceptible to Email Spoofing An Amazon Phishing Scam Hits Just In Time For Prime Day BEC = “Because it’s Easy Cash” Scammers Trick Employees Into Giving Away Customer Info Deep Fakes Getting Better Every Day With AI / Machine Learning Here Is Some Great InfoSec Budget Ammo From UBS Microsoft Discovers New Excel-Based Attack to Deliver the FlawedArmmyRAT Malware Netflix's New "The Great Hack" Reminds Us -- If you Don't Pay For the Product You *Are* The Product New Study Finds Employees Pose the Greatest Cybersecurity Risk NSA Launches Cybersecurity Arm To Defend The U.S. From Foreign Adversaries NSO spyware ‘targets Big Tech cloud services’ OSINT – a Hacker’s First Asset in Targeted Attacks Q2 2019 Top-Clicked Phishing Email Subjects from KnowBe4 [INFOGRAPHIC] Ransomware Attacks Costs Nearly Triple in 2019 to over $36K Per Attack Romanian Cybercriminals Sentenced for Phishing Campaign TrickBot Malware May Recently Have Hacked 250 Million Email Accounts U.S. Coast Guard Warns of Phishing Attacks Designed for Data Theft and Malware Infection Whoa Nellie. BEC Scams Average USD 300 Million Per Month In Illegal Transfers La Porte County Pays $130,000 Ransom To Ryuk Ransomware Amazon Accounts Targeted by 16Shop Phishing Kit BlueKeep Scanner Discovered in Watchbog Cryptomining Malware Cracked Tesla 3 Windshield Leads to $10,000 Bug Bounty Hackers Exploit Recent WordPress Plugin Bugs for Malvertising iNSYNQ Cloud Hosting Provider Hit by Ransomware Attack Keep Calm, Carry On. VLC Not Affected by Critical Vulnerability NCSC Issues Alert About Active DNS Hijacking Attacks New Okrum Malware Used by Ke3chang Group to Target Diplomats Phishing Campaign Bypasses Email Gateways via WeTransfer Alerts ProFTPD Vulnerability Lets Users Copy Files Without Permission Ransomware Attack Cripples Power Company’s Entire Network Ransomware Attacks Prompt Louisiana to Declare State of Emergency Real-Time Location of Millions Exposed by Mobile Loan Apps Russian FSB Intel Agency Contractor Hacked, Secret Projects Exposed Sodinokibi Ransomware Distributed by Hackers Posing as German BSI Trojan-Riddled WinRAR, Winbox, IDM Spreads StrongPity Spyware US Govt Rolls Out New DNS Security Measures for .gov Domains Windows 10 SmartScreen Sends URLs and App Names to Microsoft