El Diario del CISO El Diario del CISO (The CISO Journal) Edición 15 | Page 13
Octubre (October), Volumen 15/2019
Phishing Campaign Targets
Stripe Credentials, ...
Pitney Bowes Hit by
Ransomware
Report: 2020 Presidential
Campaigns Still ...
Rethinking Cybersecurity
Hiring: Dumping Resumes &
...
Russian Hackers Using
Iranian APT's Infrastructure
...
Sodinokibi Ransomware:
Where Attackers' Money
Goes
The Connected Cybercrime
Ecosystem & the Impact of
...
What Has Cybersecurity
Pros So Stressed -- And Why
...
MSPs face increased risks
and opportunities to rethink
cybersecurity
New data analysis approach
could strengthen the
security of IoT devices
Report: 2019 eSentire
Threat Intelligence
Spotlight
Researcher releases PoC
rooting app that exploits
recent Android zero-day
Review: The Great Hack
Security still top priority as
more enterprises scale IoT
solutions company-wide
Viewing cybersecurity
incidents as normal
accidents
Why risk assessments are
essential for GDPR
compliance
Perception vs. Reality in
Federal Government
Security Practices
Pitney Bowes Operations
Cyber threats to consider
Disrupted by Ransomware
this Cyber Security Month
Attack
15 New Ransomware Victims Russian Hackers Silently Hit
Hit Since the Start of
Government Targets for
October!
Years
2,000 Docker Hosts Infected Securing a Connected
by Cryptojacking Worm
Future: 5G and IoT Security
30,000 Sextortion email
sent per hour due to
malware attack on your PC
Apple browsing history
shared with Chinese
company
Cybersecurity and 5G
Diplomats are being
WAV files spotted delivering
targeted by a new malware
malicious code
software
Week in review: Insider
Medical Data Exposed of 1
When Using Cloud, Paranoia threat essentials, tracing IP
Million People in Tū Ora
Can Pay Off
hijackers, cryptojacking
Breach
worm hits Docker hosts
Week in review: Umasking
Organisations worldwide
Why Bricking Vulnerable IoT cybercriminals, improving
failing to adequately
Devices Comes with ...
incident response, macOS
protect sensitive data in the
Catalina security
cloud
Personal data from South
When properly managed,
Works of Art: Cybersecurity
African home loan
shadow IT can benefit your
Inspires 6 Winning Ideas
applicants exposed via
organization
security flaw
Winning the security fight:
Yahoo Breach Victims May
Should Schools Teach
Tips for organizations and
Qualify for $358 Payout
Cybersecurity?
CISOs
The current threat
Morphisec scrambles
Ransomware Attacks: STOP,
landscape: How to prepare
memory to thwart advanced
Dharma, Phobos Dominate
and protect your
attacks
organisation
Department of Defense
Security spending up, but
Subcontractors:
The Rise of Inside Out
adoption of cutting-edge
Cybersecurity Compliance is
Security Threats
tools is slow
Top Priority
Volusion data breach
FBI Warns of Sharp Increase Do Your Boss a Favor and
impacts 6,500 sites
in Ransomware Attacks in
Don't Fall for a Gift Card
including the Sesame Street
Certain Sectors
Scam
store
URGENT/11 Cybersecurity
Flipping Scam - Identity
WAV Audio Files hides
Stop Using CVSS to Score
Risk
The Global Reach of GDPR
Threat Intelligence Firm
Flashpoint Raises $34 Million
Why All Security Disciplines
Should Use the Intelligence
Cycle
macOS Catalina The Big
Upgrade, Don't Get Caught
Out!
The Good, the Bad and the
Ugly in Cybersecurity
What is Deepfake? (And
Should You Be Worried?)
Writing Malware
Configuration Extractors for
ISFB/Ursnif
Writing Malware Traffic
Decrypters for ISFB/Ursnif
You Thought Ransomware
Was Declining? Think Again!
Are we destined to lose?
How SMEs can protect
customers from cyber crime
Stop Cyberattacks in Their
13