El Diario del CISO El Diario del CISO (The CISO Journal) Edición 15 | Page 10
Octubre (October), Volumen 15/2019
against India on Twitter
We are trying to make
freight trains accurate and
predictable: CISO, CRIS
Why you should read 'Why
Cyber Criminals Succeed'
Industry Calls for
Standardization of CISO
Role
Personal Data 8.7 Million
Beeline Customers
Pitney Bowes Hit by
Ransomware
Twitter used your phone
numbers “inadvertently” to
Third Parties
Victim who Paid Bitcoin
Ransom Turns the Table
Back
Articles Vulnerable D-Link Home
Routers remains Unpatched
The Hot 150 Cybersecurity
Companies To Watch In
2020 Hack-ception: Benign
Hacker Rescues 26M Stolen
Credit Card Records
First Bank explains
Securing the Unsecured:
cybersecurity threats facing State of Cybersecurity 2019
financial institutions
– Part I
Securing the Unsecured:
2019 Was a Fruitful Year for
State of Cybersecurity 2019
Cybercriminals
– Part II
500 Million UC Browser
The Open Cybersecurity
Android Users are
Alliance - Building for the
Vulnerable to mitm Attacks Future
10 Reasons Your
ATM Jackpotting - Cutlet
Organization Is Potentially
Maker Malware Spike
at Risk of a Ransomware
Around the World
Attack
Bug In Sudo Let the
11 Stats on CISO Spending to
Restricted Linux Users to
Inform Your 2020
Run Commands as Root
Cybersecurity Budget
Chinese APT Hackers
"Mustang Panda" Attack
Public & Private Sectors
How Cybersecurity Salaries
Fit Experience and
Specialization
Click2mail Hacked - Hackers
Stay Calm, Your Incident
Stolen Customers Email
Response Is Ready
Address
Why a Cybersecurity
FIN6 Hacking Group Inject
Assessment Needs to Be
Skimmers into Thousand of
Part of Your M&A Due
E-commerce Sites
Diligence Checklist
FIN7 APT Hackers Released Will the Future of
New Hacking Tools in Their Authentication Run Into a
Malware Arsenal
Privacy Wall?
Hackers Embedded the
Ransomware Attack Hits
Malicious Code Within WAV Pitney Bowes in Time of IRS
Audio Files
Tax Fillings
Hiding a $200 Tiny Spy Chip European risk report flags
Countermeasures
Phony Company Used to
Plant macOS Malware:
Report
Phorpiex Botnet Behind
Large-Scale 'Sextortion'
Campaign
the right to be forgotten
Privacy legislation: The road
ahead
Rebuilding after NotPetya:
How Maersk moved forward
Report: China supported
Regional Trends in Payment
C919 airliner development
Fraud
through cyberespionage
Rising complexity, higher
Report: Android Banking
stakes for enterprise risk
Botnet Targeted Russians
management
The Benefits of Developing
'Silent Librarian' Revamps
a Cyber Aware Workforce
Phishing Campaign:
With Non-Traditional
Proofpoint
Training
Twitter Apologizes For
The Five Pillars of
Repurposing Phone Numbers Leadership
Unpatched VPN Servers
Targeted by Nation-State
Attackers Understanding the
Intersection of Security and
IT-as-a-Service
Update: Internet Security
Threat Report When and how to write a
GDPR DPIA
Volusion Payment Platform
Sites Hit by Attackers Zero-day vulnerability gives
attackers full control of
Android phones
European Airport Systems
Infected With Monero-
Mining Malware 2 Sure Ways To Prevent
Cyber Crime
A new Mac malware dubbed
FIN7 Hackers Load New RAT
Tarmac has been
Malware Into ATM Maker's
distributed via malvertising
Software
campaigns
Iranian Hackers Create
Benefits of Conducting
Credible Phishing to Steal
Crown Jewels Analysis
Library Access
Muhstik Ransomware Victim Charming Kitten Campaign
Hacks Back, Releases
involved new impersonation
Decryption Keys
methods
Cybersecurity Roundup:
Scary Stats, Vade Secure,
eSentire and Forcepoint Chinese-speaking
cybercrime gang Rocke
changes tactics
Cutlet Maker Malware Used
to Attack ATMs in Germany Cybersecurity Awareness Is
Not Just For October!
Cybersecurity Is More Even NASA Has Issues!
10