El Diario del CISO El Diario del CISO (The CISO Journal) Edición 15 | Page 11
Octubre (October), Volumen 15/2019
Inside IT Equipment for
Backdoor Access
NCSC Warns that APT
Groups Exploiting Bug in
Popular Enterprise VPN
Odix - Enterprise-Grade
File-Based Attack and
Malware Protection
5G security challenges
Do smartwatches pose a
cyber security risk?
A Comprehensive Guide On
How to Protect Your
Websites From Hackers
Feds Shut Down Largest
RCE Bug in D-Link Routers
Dark Web Child Abuse Site;
Let Hackers Access Router
South Korean Admin
Admin Page
Arrested
Microsoft to Reward Hackers
Underground Black-Market
for Finding Bugs in Open
Website 'BriansClub' Hacked
Source Election Software
Report to Your Management
Welcome to Video - Shut
with the Definitive 'Incident
down the Largest Darknet
Response for Management'
Child Sex Website
Presentation Template
Winnti Hackers Group
10 Steps for Ransomware
Launching New Malware via
Protection
Supply-chain Attacks
Alleged “Psycho” hacker in
Alabama Hospitals Pay Up in
court over EtherDelta
Ransomware Attack
cryptocurrency robbery
APT Groups Exploiting Flaws
CEOs in the dark on
in Unpatched VPNs, Officials
Cybersecurity
Warn
Under The Hood:
Cybercrime Tool Prices
Cybercriminals Exploit
Bump Up in Dark Web
Automotive Industry's
Markets
Software Features
20 Data Security Risks Your
Execs Could Face Jail Time
Company Could Face in
For Privacy Violations
2020
Patch Tuesday Lowdown,
Fin7 Cybergang Retools With
October 2019 Edition
New Malicious Code
Imperva: Data Breach
When Card Shops Play Dirty,
Caused by Amazon Cloud
Consumers Win
Misconfiguration
Microsoft: Iran-Backed
Iran-Linked 'Charming
Group Targeted a
Kitten' Touts New
Presidential Campaign
Spearphishing Tactics
Nigerian Man Charged in
Phishing Scam Targeting US
Agencies Major Airport Malware
Attack Shines a Light on OT
Security
350+ hackers hunt down
missing people in first such
hackathon
Bitcoin money trail leads
cops to ‘world’s largest’ Software, Supply-Chain
Dangers Top List of 5G
Cyber Risks
‘Special report: Why cyber
security is essential for
Important Than Ever -
Honolulu Civil Beat
65% of stressed-out
cybersecurity, IT workers
think about quitting
4 Ways to Balance
Cybersecurity with Tech
Innovation
Cybersecurity Perspectives:
IT Pros and the Business
Finding Common Ground
SIM cards used in 29
countries are vulnerable to
Simjacker attack
Software Forensics: Beyond
the Law
The reasons to
catastrophical events within
a critical infrastructure
Why You Need a Good Head-
Are there any positives from
Hunter to Help Fight Cyber
the first year of GDPR?
Crime
How privacy could breathe 14 Hot Cybersecurity
new life into personalisation Certifications Right Now
Pitney Bowes ‘considering
options’ after malware
attack
Researchers reveal the
cyber campaign that built
China's new airliner
Security Think Tank: Embed
security professionals in
your risk strategy
5 Steps to Protect Against
Ransomware Attacks - ...
7 Considerations Before
Adopting Security Standards
7 SMB Security Tips That
Will Keep Your Company ...
Security Think Tank: Risk
management must go
beyond spreadsheets 8 Ways Businesses
Unknowingly Help Hackers
Sweden’s first GDPR fine
sets regulatory tone A Realistic Threat Model for
the Masses
The IoT Security Landscape About 50% of Apps Are
Accruing Unaddressed ...
5 Step Guide To Building
Attackers Hide Behind
Your Email Security Strategy Trusted Domains, HTTPS
Ascena Retail Group: A Case
For Community And Finding
Strength In Numbers
Don’t Be A Creeper:
Benefits Of Data Loss
Protection Prevent Data
Access Creep
Global Security Trend:
Email Attacks Shifting From
Endpoints To People
Global SMBs Report Third
Straight Year Of Cyber-
Business Email Compromise
Attacks Spike 269%
Can the Girl Scouts Save the
Moon from Cyberattack?
Cryptojacking Worm Targets
and Infects 2,000 Docker ...
Cyber Theft, Humint Helped
China Cut Corners on ...
11