El Diario del CISO El Diario del CISO (The CISO Journal) Edición 16 | Page 13
Noviembre (November), Volumen 16/2019
Hacked By Lasers an issue beyond Twitter $4 Billion by Year's End, 2020 Will Be
Worse Reports New Black Book Survey
Bed Bath & Beyond Discloses Customer
Login Credentials Breach Cybersecurity in a World of Emerging
Technologies Healthcare Data Breaches Predicted to
Cost Industry $4 Billion in 2019
Best Ways To Manage The Cybersecurity
Threats Of Cryptocurrency Cybersecurity requires the right partner Healthcare data breaches will cost
industry $4 billion by year's end, and 2020
is poised to be worse
BeyondTrust Announces its Top Security
Predictions for 2020 and Beyond Cybersecurity tips for CIOs and CISOs
dealing with the widely dispersed data of
healthcare Here's Why 'Raccoon' Infostealer Is
Popular With Criminals
BlueKeep (CVE 2019-0708) exploitation
spotted in the wild Cyber-security: why your school is a target BlueKeep Attacks Observed Months after
Initial Release Cyware Weekly Threat Intelligence,
November 04 - 08, 2019 BlueKeep Attacks seen in the wild! Cyware Weekly Threat Intelligence,
October 21 - 25, 2019 BlueKeep is back. For now, attackers are
just using it for cryptomining Cyware Weekly Threat Intelligence,
October 28 - November 01, 2019 BlueKeep Malware Finally Lands, Starts
Spawning, Vanishes Abruptly
Breaches at NetworkSolutions,
Register.com, and Web.com — Krebs on
Security
Brooklyn Hospital Loses Patient Data In
Ransomware Attack
Brooklyn Hospital lost patient records
after a ransomware infectionSecurity
Affairs Data Breach Reports Increase in Canada
after Privacy Law
Simplify Security While Protecting
Organizations
Microsoft Reports Global Cyberattacks on
Sporting and Anti-Doping Organizations
from Russian Espionage Actors
Microsoft Warns of More Harmful
Windows BlueKeep Attacks, Patch Now
Microsoft works with researchers to
detect and protect against new RDP
exploits
HHS Proposes Changes to Permit Donation More BlueKeep Attacks Can Impact
of Cybersecurity Technology
Vulnerable Windows Machines
My review of Sandworm: an essential
HHS Updates Security Risk Assessment
guide to the new, reckless world of
Tool
"cyberwarfare" / Boing Boing
High-Tech Woes: Milwaukee IT Experts
N.D. Recruits New CISO in Broadening
Talk Cybersecurity
Cybersecurity Effort
NCR Barred Mint, QuickBooks from
How adversaries use politics for
Banking Platform During Account
compromise
Takeover Storm — Krebs on Security
How Cybersecurity Salaries Fit Experience New Chrome 0-day Bug Under Active
and Specialization
Attacks – Update Your Browser Now!
Data Breaches Cost Hospitals $4B Annually How much do data breaches affect stock
prices? New CyberX Report Details ICS Security
Vulnerabilities
Data of 7.5 Million Creative Cloud Users
Exposed Online How safe browsing fails to protect user
privacy New Office 365 Phishing Scams Using
Audio Voicemail Recordings
DDoS attack sidelines AWS DNS web
service for hours How the Space Cybersecurity Working
Group fosters communication Nikkei worker tricked into transferring $29
million into scammer’s bank account
Building Secure Security Teams DNA-Testing Company Veritas Customer
Data Breached How to Automatically Delete Your Google
Data, and Why You Should Building Your Secure Cloud-Ready Branch Edtech Startup Vedantu Confirms Data
Breach Of 687K Accounts How to keep IT security team ahead of
alert fatigue Email addresses exposed in West
Berkshire Council data breach
Energy Sector’s Reliance on IoT Increases
Cyber Vulnerabilities
Essential Business Functions for Success in
2020
Europe grappling with a shortage of
291,000 cyber security professionals
Synthetic Identity Theft: The
“Frankenstein” of Identity Crime - Identity
Theft Resource Center How to Regulate Cybersecurity of the
Internet of Things
How to Start Building an Insider Threat
Program
How Transparent Should Government Be
After a Cyberattack?
How Well Is The Nuclear Industry
Protected From Cyber Threats? NordVPN Says Server Compromised Due
to Misconfiguration
Not even half of organizations worldwide
are prepared for cyberattacks, reveals a
new report
Ohio governor signs into law measure to
increase cybersecurity of elections
Patch Management: Your Biggest Ally in
the War Against Cybercrime Takeaways from the $566M BriansClub
breach — Krebs on Security White House cybersecurity chief quits,
says leadership is inviting an attack Pegasus is Not Just a 'WhatsApp Hack',
and Its Implications are Far More Serious
Pegasus malware explained: All you need
to know about the spyware affecting high
profile targets- Technology News,
Firstpost Targeted Ransomware Attacks Hit Several
Spanish Companies Who 'owns' cyber security? TechCrunch Who's Responsible When Your Car Gets
Hacked?
Buran ransomware detailed, found to be
based on VegaLocker
Business Email Compromise: Battling
Advanced Attackers
Businesses know cybersecurity is bad, but
still aren’t sure how to fix it
Call for Action: Election Security a
'National Emergency'
Paradise Ransomware Decryptor Gets
Your Files Back for Free
Where top VCs are investing in
cybersecurity
The CISO Speaks: LogMeIn's Gerald
Philadelphia DPH Breach Exposes Hepatitis Beuchelt on the Importance of Developing
Patients’ Data
Employee Awareness of Cybersecurity
Responsibilities Why governments, hospitals and, yes,
schools are being held up for ransom.
Phishing Campaign Uses Salary Increase
Ploy: Report The City of Johannesburg Hit by
Ransomware Attack Why Is Third-Party Risk Management So
Complex?
Phishing Schemes Continue to Plague the
Healthcare Sector
Please tell us why you're not securing
yourselves, UK.gov asks businesses • The The DarkUniverse: mysterious APT
framework #27
The Five Phishing Tactics Used in
Ransomware (Contributed) Why is working culture so important for
the benefit of the business?
Why organizations feel vulnerable to
insider attacks
On the inside of a hacking catastrophe
One-third of hospital executives purchase
cybersecurity solutions blindly: report
Parabellum: The Next-Gen SOC, a Financial
CISO’s Perspective
The week in security: Mobiles are a real
threat to security
The week in security: Security staff
struggling harder to keep up here than
overseas
This is the impact of a data breach on
enterprise share prices
This old trojan malware is back with a new
trick to help it hide in plain sight
This Week in Security News: Amazon Echo
Hacked at Pwn2Own Tokyo 2019 and
Ransomware Attacks Hit Spanish
Companies -
This Week in Security News: Pwn2Own
Adds Industrial Control Systems to
Hacking Contest and Cyber Crooks Target
ESports -
Threat Roundup for October 25 to
November 1
Three Charged in $11 Million BEC Scam
13