El Diario del CISO El Diario del CISO (The CISO Journal) Edición 15 | Page 13

Octubre (October), Volumen 15/2019 Phishing Campaign Targets Stripe Credentials, ... Pitney Bowes Hit by Ransomware Report: 2020 Presidential Campaigns Still ... Rethinking Cybersecurity Hiring: Dumping Resumes & ... Russian Hackers Using Iranian APT's Infrastructure ... Sodinokibi Ransomware: Where Attackers' Money Goes The Connected Cybercrime Ecosystem & the Impact of ... What Has Cybersecurity Pros So Stressed -- And Why ... MSPs face increased risks and opportunities to rethink cybersecurity New data analysis approach could strengthen the security of IoT devices Report: 2019 eSentire Threat Intelligence Spotlight Researcher releases PoC rooting app that exploits recent Android zero-day Review: The Great Hack Security still top priority as more enterprises scale IoT solutions company-wide Viewing cybersecurity incidents as normal accidents Why risk assessments are essential for GDPR compliance Perception vs. Reality in Federal Government Security Practices Pitney Bowes Operations Cyber threats to consider Disrupted by Ransomware this Cyber Security Month Attack 15 New Ransomware Victims Russian Hackers Silently Hit Hit Since the Start of Government Targets for October! Years 2,000 Docker Hosts Infected Securing a Connected by Cryptojacking Worm Future: 5G and IoT Security 30,000 Sextortion email sent per hour due to malware attack on your PC Apple browsing history shared with Chinese company Cybersecurity and 5G Diplomats are being WAV files spotted delivering targeted by a new malware malicious code software Week in review: Insider Medical Data Exposed of 1 When Using Cloud, Paranoia threat essentials, tracing IP Million People in Tū Ora Can Pay Off hijackers, cryptojacking Breach worm hits Docker hosts Week in review: Umasking Organisations worldwide Why Bricking Vulnerable IoT cybercriminals, improving failing to adequately Devices Comes with ... incident response, macOS protect sensitive data in the Catalina security cloud Personal data from South When properly managed, Works of Art: Cybersecurity African home loan shadow IT can benefit your Inspires 6 Winning Ideas applicants exposed via organization security flaw Winning the security fight: Yahoo Breach Victims May Should Schools Teach Tips for organizations and Qualify for $358 Payout Cybersecurity? CISOs The current threat Morphisec scrambles Ransomware Attacks: STOP, landscape: How to prepare memory to thwart advanced Dharma, Phobos Dominate and protect your attacks organisation Department of Defense Security spending up, but Subcontractors: The Rise of Inside Out adoption of cutting-edge Cybersecurity Compliance is Security Threats tools is slow Top Priority Volusion data breach FBI Warns of Sharp Increase Do Your Boss a Favor and impacts 6,500 sites in Ransomware Attacks in Don't Fall for a Gift Card including the Sesame Street Certain Sectors Scam store URGENT/11 Cybersecurity Flipping Scam - Identity WAV Audio Files hides Stop Using CVSS to Score Risk The Global Reach of GDPR Threat Intelligence Firm Flashpoint Raises $34 Million Why All Security Disciplines Should Use the Intelligence Cycle macOS Catalina The Big Upgrade, Don't Get Caught Out! The Good, the Bad and the Ugly in Cybersecurity What is Deepfake? (And Should You Be Worried?) Writing Malware Configuration Extractors for ISFB/Ursnif Writing Malware Traffic Decrypters for ISFB/Ursnif You Thought Ransomware Was Declining? Think Again! Are we destined to lose? How SMEs can protect customers from cyber crime Stop Cyberattacks in Their 13