El Diario del CISO El Diario del CISO (The CISO Journal) Edición 16 | Page 13

Noviembre (November), Volumen 16/2019 Hacked By Lasers an issue beyond Twitter $4 Billion by Year's End, 2020 Will Be Worse Reports New Black Book Survey Bed Bath & Beyond Discloses Customer Login Credentials Breach Cybersecurity in a World of Emerging Technologies Healthcare Data Breaches Predicted to Cost Industry $4 Billion in 2019 Best Ways To Manage The Cybersecurity Threats Of Cryptocurrency Cybersecurity requires the right partner Healthcare data breaches will cost industry $4 billion by year's end, and 2020 is poised to be worse BeyondTrust Announces its Top Security Predictions for 2020 and Beyond Cybersecurity tips for CIOs and CISOs dealing with the widely dispersed data of healthcare Here's Why 'Raccoon' Infostealer Is Popular With Criminals BlueKeep (CVE 2019-0708) exploitation spotted in the wild Cyber-security: why your school is a target BlueKeep Attacks Observed Months after Initial Release Cyware Weekly Threat Intelligence, November 04 - 08, 2019 BlueKeep Attacks seen in the wild! Cyware Weekly Threat Intelligence, October 21 - 25, 2019 BlueKeep is back. For now, attackers are just using it for cryptomining Cyware Weekly Threat Intelligence, October 28 - November 01, 2019 BlueKeep Malware Finally Lands, Starts Spawning, Vanishes Abruptly Breaches at NetworkSolutions, Register.com, and Web.com — Krebs on Security Brooklyn Hospital Loses Patient Data In Ransomware Attack Brooklyn Hospital lost patient records after a ransomware infectionSecurity Affairs Data Breach Reports Increase in Canada after Privacy Law Simplify Security While Protecting Organizations Microsoft Reports Global Cyberattacks on Sporting and Anti-Doping Organizations from Russian Espionage Actors Microsoft Warns of More Harmful Windows BlueKeep Attacks, Patch Now Microsoft works with researchers to detect and protect against new RDP exploits HHS Proposes Changes to Permit Donation More BlueKeep Attacks Can Impact of Cybersecurity Technology Vulnerable Windows Machines My review of Sandworm: an essential HHS Updates Security Risk Assessment guide to the new, reckless world of Tool "cyberwarfare" / Boing Boing High-Tech Woes: Milwaukee IT Experts N.D. Recruits New CISO in Broadening Talk Cybersecurity Cybersecurity Effort NCR Barred Mint, QuickBooks from How adversaries use politics for Banking Platform During Account compromise Takeover Storm — Krebs on Security How Cybersecurity Salaries Fit Experience New Chrome 0-day Bug Under Active and Specialization Attacks – Update Your Browser Now! Data Breaches Cost Hospitals $4B Annually How much do data breaches affect stock prices? New CyberX Report Details ICS Security Vulnerabilities Data of 7.5 Million Creative Cloud Users Exposed Online How safe browsing fails to protect user privacy New Office 365 Phishing Scams Using Audio Voicemail Recordings DDoS attack sidelines AWS DNS web service for hours How the Space Cybersecurity Working Group fosters communication Nikkei worker tricked into transferring $29 million into scammer’s bank account Building Secure Security Teams DNA-Testing Company Veritas Customer Data Breached How to Automatically Delete Your Google Data, and Why You Should Building Your Secure Cloud-Ready Branch Edtech Startup Vedantu Confirms Data Breach Of 687K Accounts How to keep IT security team ahead of alert fatigue Email addresses exposed in West Berkshire Council data breach Energy Sector’s Reliance on IoT Increases Cyber Vulnerabilities Essential Business Functions for Success in 2020 Europe grappling with a shortage of 291,000 cyber security professionals Synthetic Identity Theft: The “Frankenstein” of Identity Crime - Identity Theft Resource Center How to Regulate Cybersecurity of the Internet of Things How to Start Building an Insider Threat Program How Transparent Should Government Be After a Cyberattack? How Well Is The Nuclear Industry Protected From Cyber Threats? NordVPN Says Server Compromised Due to Misconfiguration Not even half of organizations worldwide are prepared for cyberattacks, reveals a new report Ohio governor signs into law measure to increase cybersecurity of elections Patch Management: Your Biggest Ally in the War Against Cybercrime Takeaways from the $566M BriansClub breach — Krebs on Security White House cybersecurity chief quits, says leadership is inviting an attack Pegasus is Not Just a 'WhatsApp Hack', and Its Implications are Far More Serious Pegasus malware explained: All you need to know about the spyware affecting high profile targets- Technology News, Firstpost Targeted Ransomware Attacks Hit Several Spanish Companies Who 'owns' cyber security? TechCrunch Who's Responsible When Your Car Gets Hacked? Buran ransomware detailed, found to be based on VegaLocker Business Email Compromise: Battling Advanced Attackers Businesses know cybersecurity is bad, but still aren’t sure how to fix it Call for Action: Election Security a 'National Emergency' Paradise Ransomware Decryptor Gets Your Files Back for Free Where top VCs are investing in cybersecurity The CISO Speaks: LogMeIn's Gerald Philadelphia DPH Breach Exposes Hepatitis Beuchelt on the Importance of Developing Patients’ Data Employee Awareness of Cybersecurity Responsibilities Why governments, hospitals and, yes, schools are being held up for ransom. Phishing Campaign Uses Salary Increase Ploy: Report The City of Johannesburg Hit by Ransomware Attack Why Is Third-Party Risk Management So Complex? Phishing Schemes Continue to Plague the Healthcare Sector Please tell us why you're not securing yourselves, UK.gov asks businesses • The The DarkUniverse: mysterious APT framework #27 The Five Phishing Tactics Used in Ransomware (Contributed) Why is working culture so important for the benefit of the business? Why organizations feel vulnerable to insider attacks On the inside of a hacking catastrophe One-third of hospital executives purchase cybersecurity solutions blindly: report Parabellum: The Next-Gen SOC, a Financial CISO’s Perspective The week in security: Mobiles are a real threat to security The week in security: Security staff struggling harder to keep up here than overseas This is the impact of a data breach on enterprise share prices This old trojan malware is back with a new trick to help it hide in plain sight This Week in Security News: Amazon Echo Hacked at Pwn2Own Tokyo 2019 and Ransomware Attacks Hit Spanish Companies - This Week in Security News: Pwn2Own Adds Industrial Control Systems to Hacking Contest and Cyber Crooks Target ESports - Threat Roundup for October 25 to November 1 Three Charged in $11 Million BEC Scam 13