El Diario del CISO El Diario del CISO (The CISO Journal) Edición 17 | Page 8
Noviembre (November), Volumen 17/2019
Fuentes de Información / Sources
Noticias
Noticias
Noticias
Data firm broke Canadian privacy laws
with involvement in Brexit, U.S. campaigns Who or what is the CISO anyway?
-probe Noticias
Microsoft Word - YDI - Substitute Notice
4830-9600-8621 v.1 Nigerians have a new phishing technique OneTrust acquires Privacy Core Intel CPUs affected by ZombieLoadv2
ISO 22301:2019 vs. ISO 22301:2012: Key
changes [Infographic] Over 3.13 lakh cyber security incidents
reported this year till Oct White Paper – The Skill Set Needed to
Implement a Global Privacy Standard:
ISO/IEC 27701 alignment with IAPP CIPM
and CIPP/E certifications T-Mobile discloses data breach affecting
prepaid wireless customersSecurity Affairs
Password data for ~2.2 million users of
currency and gaming sites dumped online Turkish cybercriminals hack Tripura ATMs,
steal huge cash Miners not taking cybersecurity risks
seriously, report finds Three Reasons Why Call Detail Records
Analysis Is Not “Junk Science” Security Trends from 2019 Into 2020 Privacy, cyber security, and ISO 27001 Can Your Investigation Interpret Emoji? Clarity App New Reports Details How Ransomware Is
Concealed in YouTube Videos Chinese smartphone vendor OnePlus
discloses a new data breachSecurity
Affairs
A Ransomware infected the network of
the cybersecurity firm ProsegurSecurity
Affairs
7 Big Ideas from Cybersecurity Leaders
We’ve Interviewed
The Total Economic Impact™ of the
IntSights External Threat Protection Suite An open conversation about cyber-risk
reporting to the BOD
Russia’s Sandworm Attacks Thousands of
Android Phones
110 Nursing Homes Cut Off from Health
Records in Ransomware Attack Building Your Cyber Security Strategy: A
Step-By-Step Guide
CISOs: Focus On These Fundamentals For
Long-Term Success
DDoS-for-Hire Boss Gets 13 Months Jail
Time Cybersecurity Due Diligence Checklist
It’s Way Too Easy to Get a .gov Domain
Name Five CISO Priorities
Artificial Intelligence: The Next Frontier in
Information Security
How To Use Magnet AXIOM In Mac USB
Investigations
How To Decrypt BitLocker Volumes With
Passware
Hunting For Attackers’ Tactics And
Techniques With Prefetch Files
How To Transfer A Password Recovery
Process To A Different Computer Using
Passware
Mi.com.co Correo Corporativo :: Digital
transformation redefines cybersecurity
skills, careers
New NextCry Ransomware Encrypts Data
on NextCloud Linux Servers
Articles
Security attacks: 3 habits of the most
resilient companies
Hot Wallet of Upbit Ransacked, $48.5
Million worth ETH Stolen
How To Conduct A Live Forensic Scan Of A
Windows Computer
Walkthrough: Quin-C Social Analyzer
Widget From AccessData
The Potential Importance Of Information
From Password Managers
Digital Forensics For National Security
Symposium Loudoun Medical Group D/B/A
Comprehensive Sleep Care Center
Provides Notice Of Data Privacy Event
Multi-Platform Malware "ACBackdoor"
Attack Both Windows & Linux Users
7 Best Ways to Turn Your Cyber Security
Skills Into a $100,000 Career
DePriMon Malware Registers Itself as
Windows Default Print Monitor
Dexphot Malware Attacking Windows
Computer to Mine Cryptocurrency Digital Forensic Techniques To Investigate
Password Managers GIF Processing Vulnerability Affects More
than 28,300 Android Apps #cybersecurity Pegasus like spyware could
be snooping on you right now!! Greatest Data Protection Fails By Massive
Cyber Attack in 2019 #deepweb In new world of data breaches
and dark web deals, identity theft goes
mainstream: JPSO Practical Tips Leaders Can Use to Build a
Culture of Cybersecurity
CISOs: Dedicated investment in security is
still lacking
Virginia builds new model for quantifying
cybersecurity risk
‘Magic: The Gathering’ game maker
exposed 452,000 players’ account data
Over 12,000 Google Users Hit by
Government Hackers in 3rd Quarter of
2019
Russian Hacker Behind NeverQuest
Banking Malware Gets 4 Years in U.S.
Prison
Important Consideration To Prevent
Insider Cyber Security Threats 'Dexphot': A Sophisticated, Everyday
Threat Magento Marketplace Suffers Data Breach
Exposing Users' Account Info
How To Use The Griffeye Intelligence
Database
CISO MAG study: 1 in 3 CISOs feel the
biggest challenge of endpoint solution is
its complexity
NACD BoardTalk Keeping Up with
Breaches: What Your Board Can Learn
from Proxy Disclosures
Ransomware Bites 400 Veterinary
Hospitals
Sale of 4 Million Stolen Cards Tied to
Breaches at 4 Restaurant Chains
Iran’s APT33 sharpens focus on industrial
control systems
Why cryptocoin scams work, and how to
avoid them
Website Security Tips for Black Friday &
Cyber Monday Adobe Hacked - Hackers Exploit the
Vulnerability in Magento Marketplace How To Be An Informed Skeptic About
Security Predictions
This Week in Security News: Skimming and
Phishing Scams Ahead of Black Friday and
Polish Hacking Team Wins Capture the
Flag Competition
This Week in Security News: Trend Micro
Unveils New Cloud Security Platform and
Thousands of Disney+ Accounts are
Compromised
Waterloo Brewing loses $2.1 million in
'sophisticated' cyberattack
69% Indian companies at risk of data
breach
Phone application: ‘Apps breaching your Massive Data Leak - 1.2 Billion People
Personal & Social Data Exposed #hacking Government-Backed Cyber
Attacks Impacted At Least 500 Indian
Users
#school Hacker’s paradise: Louisiana’s
ransomware disaster far from over OnePlus Hacked - Customers' Personal
Information Accessed by Hackers The latest healthcare data breaches in
2019 Louisiana activates cybersecurity team in
response to attack on state agencies
Pipka - New JavaScript Skimmer that
Attacks eCommerce Website What is the role of CISO in network
security? Hackers steal $48.7M in Ethereum from
South Korean cryptocurrency exchange
Upbit
Raccoon Stealer Malware Attacks Financial
Organization
RIPlace - New Evasion Technique Let
Ransomware to Encrypt Undetected
Roboto Botnet Exploiting Linux Webmin As cybersecurity insurance coverage
becomes common, buyer beware
5G security and privacy for smart cities
Advanced threat predictions for 2020
T-Mobile Suffers Data Breach Affecting
Prepaid Wireless Customers
Dozens of Severe Flaws Found in 4 Popular
Open Source VNC Software
Data-Enriched Profiles on 1.2B People
Exposed in Gigantic Leak
NSO Group President Defends
Controversial Tactics
ID Thieves Turn to Snail Mail as Juicy
8