El Diario del CISO El Diario del CISO (The CISO Journal) Edición 16 | Page 12

Noviembre (November), Volumen 16/2019 ‘CCleaner’ Targeted Again in a Supply Chain Attack Chinese APT Group Targets Mobile Networks: FireEye Mandiant Chinese APT group, Calypso, hacked state ‘Clicker Trojan Malware’ found in iOS Apps institutions in six countries “CISO is key to inspiring a change of heart Chinese-Linked APT41 Can Read Your around security” Texts 10 Cybersecurity Terms Every Business CISA Releases Cyber Essentials for Small Leader Should Know Businesses and Governments 10 Infamous Cyberattacks: The List You CISOs and CMOs – Joined At The Hip in the Don’t Want to Be On Era of Big Data 12 year jail sentence for man who hacked CISOs Search for Startup Gold in Mountain Los Angeles Superior Court to send two of Cybersecurity Pitches million phishing emails 12-Year Prison Term for Hacking LA Court Clinics Serving Uninsured Hit by System Ransomware Combating Cybercrime: Key Challenges for 2 Ransomware Attacks Reported in Spain 2020s and Beyond Facebook: Developers Wrongfully Accessed User Data Failure to Encrypt Mobile Devices Leads to $3 Million HIPAA Settlement Fancy Bear resumes Olympic hacks ahead of Tokyo games Fast-Food Chain Krystal Investigates Card 'Security Incident' 5 phishing scams your business needs to know about Complex Q3 DDoS Can Have 11 Attack Vectors First Cyber Attack 'Mass Exploiting' BlueKeep RDP Flaw Spotted in the Wild 5 Tips for Starting a Campus Security Department from Scratch Compliance: Keeping Up with Rapidly Changing Privacy and Security Laws 5,000 USD XSS Issue at Avast Desktop AntiVirus for Windows (Yes, Desktop!) 63% of Indian businesses worry about cyberthreats due to staff error - The Economic Times Council Post: Grading Our 2019 Cybersecurity Predictions, Part 2 Council Post: How Enabling Smart Cybersecurity Can Lead To A More Productive Workforce Council Post: If You Want Cybersecurity, Prepare For Cybercrime Council Post: Seven Common Cybersecurity Mistakes Made With AI Crowe BrandVoice: 4 Cyber Financial Risks And How To Defend Against Them A Cybersecurity Drought Is Coming A Security Failure in the White House Action Fraud? Inaction Fraud After months of worry, BlueKeep vulnerability is now being exploited in mass-hacking campaign Alexa and Google Home devices can be exploited to eavesdrop on users, phish passwords Android bug lets hackers plant malware via NFC beaming Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game? As cyber risks grow, provider preventive measures still falling short Australia Cyber Threat Landscape report (H1 2019) Australian Govt Warns of Active Emotet and BlueKeep Threats Fighting Fraud 2019 Archives Financial fraud: why are tech-savvy millennials so vulnerable? Find out the 26 remote jobs with salaries of $100K or more First cyberattack on solar, wind assets revealed widespread grid weaknesses, analysts say Five ways to strengthen employee cybersecurity awareness ITRC Blog - Identity Theft Resource Center Japan Cyber Threat Landscape report (H1 2019) Japanese hotel robots can be hacked to spy on guests in their bedrooms Johannesburg Struggles to Recover From Ransomware Attack Johannesburg's city e-services disrupted by ransomware strike Johnson City replacing nearly 300 computers after ransomware attack Joker's Stash Lists 1.3 Million Stolen Indian Payment Cards Kaspersky uncovers zero-day in popular web browser exploited in the wild by threat actor Katelyn Bowden: The Cyberattack That Changed My Life Kudankulam, India's biggest Power Plant Hit by the Cyber Attack Following Massive Breach, Capital One Replacing CISO: Report Lack of education is the leading cause of successful ransomware attacks Former Twitter CISO shares his advice for IT security hiring and cybersecurity Former Twitter employees charged with spying for Saudi Arabia Las Cruces school district to scrub 30,000 computers after cyber attack Latest BEC Victims: Nikkei, City of Ocala Four principles for security metrics Law enforcement can plunder DNA profile database, judge rules Cyber attack on Asia Pacific ports could cost $110bn :: Lloyd's List Global security workforce must more than double to meet demand Leadership Through Security: The Changing Role of the CISO Cyber Daily: The Fate of a CISO After a Breach Golidlocks problem of mobile device security in organizations Leveraging Automation to Boost Your Cybersecurity Gone Phishing: Stealth Hits the Corner Office List of data breaches and cyber attacks in October 2019 – 421 million records breached Google Cloud BrandVoice: Security Means Understanding Assets, Adversaries, And Threats LogMeIn CISO Joins The National Cyber Security Alliance Board of Directors Google Patches Chrome Zero-Day Under Active Attack Managed Service Providers Hit with Ransomware Attacks Govt knew of Pegasus, say experts, post ministry webpages as proof Marriott Reports Exposure of Associates' Social Security Numbers Alleged Capital One Hacker Released From Cyber insurance becomes big business Prison with the resurgence of ransomware American Express Global Business Travel's David Levin on data security challenges: Travel Weekly Feds Allege Saudi Spies Infiltrated Twitter Italy’s UniCredit: Breach Went Undetected for Four Years Cyber Security Maturity Stagnates Because CISOs Are Structurally Prevented From Looking Beyond Day-to-Day Firefighting Cyber Security Strategy 2020: Civil society experts slam 'national security' agenda Cyber security trends: InfoSec leads Twitter mentions in Q3 2019 Cyberattack on Indian nuclear power plant should come as “no surprise” Cybercriminal credit card stores: Is Brian out of the club? Cybercriminal Platforms: AVCs, Marketplaces, and Forums Grantor Trust: The Good and the Bad Hacker claims to have stolen personal data of Universiti Malaysia Sabah students Hackerpom ThreatFeed Massive Cyberattack Slams Country of Georgia Maze Ransomware Attacks Italy in New Email Campaign McAfee: Malicious Voicemails Target Office365 Users Australian organisations suffering ‘cyber fatigue’ Cybercriminals using Google Analytics to enhance phishing efforts Hackers Eavesdrop and Obtain Sensitive Data of Users Through Home Smart Assistants Measure and Improve the Maturity of Your Incident Response Team Avast fends off hacker who breached its internal network in copycat CCleaner attack CyberheistNews Vol 9 #45 [Heads-Up] Scam of the Week: Phishing Attacks Using Better Benefits and Pay Raise Bait Half of all Organizations Unprepared to Handle Cyber-Attacks: Report Media Giant Nikkei Loses $29 Million to BEC Scammers Banks do not report most cybercrimes, says top cop Cybersecurity Considerations for Drones Beam Me Up, Alexa: Digital Assistants Cybersecurity experts say insider spying is Have you updated your browser yet? Severe Chrome Zero-day vulnerability getting actively exploited Healthcare Data Breaches Costs Industry Medical data is being leaked by NHS pagers, and then broadcast for the world to see... Microsoft Ignite 2019: How CISOs Should 12