El Diario del CISO El Diario del CISO (The CISO Journal) Edición 16 | Page 12
Noviembre (November), Volumen 16/2019
‘CCleaner’ Targeted Again in a Supply
Chain Attack
Chinese APT Group Targets Mobile
Networks: FireEye Mandiant
Chinese APT group, Calypso, hacked state
‘Clicker Trojan Malware’ found in iOS Apps
institutions in six countries
“CISO is key to inspiring a change of heart Chinese-Linked APT41 Can Read Your
around security”
Texts
10 Cybersecurity Terms Every Business
CISA Releases Cyber Essentials for Small
Leader Should Know
Businesses and Governments
10 Infamous Cyberattacks: The List You
CISOs and CMOs – Joined At The Hip in the
Don’t Want to Be On
Era of Big Data
12 year jail sentence for man who hacked
CISOs Search for Startup Gold in Mountain
Los Angeles Superior Court to send two
of Cybersecurity Pitches
million phishing emails
12-Year Prison Term for Hacking LA Court Clinics Serving Uninsured Hit by
System
Ransomware
Combating Cybercrime: Key Challenges for
2 Ransomware Attacks Reported in Spain
2020s and Beyond Facebook: Developers Wrongfully
Accessed User Data
Failure to Encrypt Mobile Devices Leads to
$3 Million HIPAA Settlement
Fancy Bear resumes Olympic hacks ahead
of Tokyo games
Fast-Food Chain Krystal Investigates Card
'Security Incident'
5 phishing scams your business needs to
know about Complex Q3 DDoS Can Have 11 Attack
Vectors First Cyber Attack 'Mass Exploiting'
BlueKeep RDP Flaw Spotted in the Wild
5 Tips for Starting a Campus Security
Department from Scratch Compliance: Keeping Up with Rapidly
Changing Privacy and Security Laws 5,000 USD XSS Issue at Avast Desktop
AntiVirus for Windows (Yes, Desktop!)
63% of Indian businesses worry about
cyberthreats due to staff error - The
Economic Times Council Post: Grading Our 2019
Cybersecurity Predictions, Part 2
Council Post: How Enabling Smart
Cybersecurity Can Lead To A More
Productive Workforce
Council Post: If You Want Cybersecurity,
Prepare For Cybercrime
Council Post: Seven Common
Cybersecurity Mistakes Made With AI
Crowe BrandVoice: 4 Cyber Financial Risks
And How To Defend Against Them
A Cybersecurity Drought Is Coming
A Security Failure in the White House
Action Fraud? Inaction Fraud
After months of worry, BlueKeep
vulnerability is now being exploited in
mass-hacking campaign
Alexa and Google Home devices can be
exploited to eavesdrop on users, phish
passwords
Android bug lets hackers plant malware
via NFC beaming
Are Cybercriminals Winning the
Mainframe Security Cat-and-Mouse
Game?
As cyber risks grow, provider preventive
measures still falling short
Australia Cyber Threat Landscape report
(H1 2019)
Australian Govt Warns of Active Emotet
and BlueKeep Threats
Fighting Fraud 2019 Archives
Financial fraud: why are tech-savvy
millennials so vulnerable?
Find out the 26 remote jobs with salaries
of $100K or more
First cyberattack on solar, wind assets
revealed widespread grid weaknesses,
analysts say
Five ways to strengthen employee
cybersecurity awareness
ITRC Blog - Identity Theft Resource Center
Japan Cyber Threat Landscape report (H1
2019)
Japanese hotel robots can be hacked to
spy on guests in their bedrooms
Johannesburg Struggles to Recover From
Ransomware Attack
Johannesburg's city e-services disrupted
by ransomware strike
Johnson City replacing nearly 300
computers after ransomware attack
Joker's Stash Lists 1.3 Million Stolen Indian
Payment Cards
Kaspersky uncovers zero-day in popular
web browser exploited in the wild by
threat actor
Katelyn Bowden: The Cyberattack That
Changed My Life
Kudankulam, India's biggest Power Plant
Hit by the Cyber Attack
Following Massive Breach, Capital One
Replacing CISO: Report Lack of education is the leading cause of
successful ransomware attacks
Former Twitter CISO shares his advice for
IT security hiring and cybersecurity
Former Twitter employees charged with
spying for Saudi Arabia Las Cruces school district to scrub 30,000
computers after cyber attack
Latest BEC Victims: Nikkei, City of Ocala
Four principles for security metrics Law enforcement can plunder DNA profile
database, judge rules
Cyber attack on Asia Pacific ports could
cost $110bn :: Lloyd's List Global security workforce must more than
double to meet demand Leadership Through Security: The
Changing Role of the CISO
Cyber Daily: The Fate of a CISO After a
Breach Golidlocks problem of mobile device
security in organizations Leveraging Automation to Boost Your
Cybersecurity
Gone Phishing: Stealth Hits the Corner
Office List of data breaches and cyber attacks in
October 2019 – 421 million records
breached
Google Cloud BrandVoice: Security Means
Understanding Assets, Adversaries, And
Threats LogMeIn CISO Joins The National Cyber
Security Alliance Board of Directors
Google Patches Chrome Zero-Day Under
Active Attack Managed Service Providers Hit with
Ransomware Attacks
Govt knew of Pegasus, say experts, post
ministry webpages as proof Marriott Reports Exposure of Associates'
Social Security Numbers
Alleged Capital One Hacker Released From Cyber insurance becomes big business
Prison
with the resurgence of ransomware
American Express Global Business Travel's
David Levin on data security challenges:
Travel Weekly
Feds Allege Saudi Spies Infiltrated Twitter
Italy’s UniCredit: Breach Went Undetected
for Four Years
Cyber Security Maturity Stagnates
Because CISOs Are Structurally Prevented
From Looking Beyond Day-to-Day
Firefighting
Cyber Security Strategy 2020: Civil society
experts slam 'national security' agenda
Cyber security trends: InfoSec leads
Twitter mentions in Q3 2019
Cyberattack on Indian nuclear power plant
should come as “no surprise”
Cybercriminal credit card stores: Is Brian
out of the club?
Cybercriminal Platforms: AVCs,
Marketplaces, and Forums
Grantor Trust: The Good and the Bad
Hacker claims to have stolen personal
data of Universiti Malaysia Sabah students
Hackerpom ThreatFeed
Massive Cyberattack Slams Country of
Georgia
Maze Ransomware Attacks Italy in New
Email Campaign
McAfee: Malicious Voicemails Target
Office365 Users
Australian organisations suffering ‘cyber
fatigue’ Cybercriminals using Google Analytics to
enhance phishing efforts Hackers Eavesdrop and Obtain Sensitive
Data of Users Through Home Smart
Assistants Measure and Improve the Maturity of
Your Incident Response Team
Avast fends off hacker who breached its
internal network in copycat CCleaner
attack CyberheistNews Vol 9 #45 [Heads-Up]
Scam of the Week: Phishing Attacks Using
Better Benefits and Pay Raise Bait Half of all Organizations Unprepared to
Handle Cyber-Attacks: Report Media Giant Nikkei Loses $29 Million to
BEC Scammers
Banks do not report most cybercrimes,
says top cop Cybersecurity Considerations for Drones Beam Me Up, Alexa: Digital Assistants Cybersecurity experts say insider spying is Have you updated your browser yet?
Severe Chrome Zero-day vulnerability
getting actively exploited
Healthcare Data Breaches Costs Industry Medical data is being leaked by NHS
pagers, and then broadcast for the world
to see...
Microsoft Ignite 2019: How CISOs Should
12