El Diario del CISO El Diario del CISO (The CISO Journal) Edición 21 | Page 11

Researchers discovered Calisto MacOS Malware, a Predecessor of Proton Malware Zero-Day Coverage Update – Week of July 23, 2018 - ITproportal Phishing grows to become top email threat to businesses Russian bank hit in major cyberattack Techtarget ComplyRight data breach affects 662,000, gets lawsuit McAfee CISO: Leadership buy-in essential to boost cybersecurity McAfee CISO: The importance of a strong cybersecurity culture IIot-world 9 questions you should ask before choosing a security vendor How Adaptive Cyber Security Can Enable Digital Health Adoption Malwarebyte Hidden Bee' miner delivered via improved drive-by download toolkit Trojans: What's the real deal? Timeofisrael Israel Electric Corp. sets up cybersecurity center in New York Israeli startup seeks to head off hacking threats from connected cars Dataprivacysecurityinsider FERC Requires New NERC Reliability Standards for Reporting Cyber Incidents Virginia Bank, Hacked Twice with Phishing Schemes, Losing $2.4 Million Infosecinstitute 10 Steps to Take after Clicking a Phishing Scam The Current Job Outlook for Threat Hunters Tripwire How the Federal Government Is Working to Improve Its Cybersecurity Workforce Russian Hacking Campaign Targeting U.S. Electric Utilities BBC Russian hackers penetrate US power stations US warns of supply chain cyber-attacks Inforisktoday Ex-Fraudster: Why I Share My Story Health Data Breach Tally: Lots of Hacks, Fewer Victims Cyberscoop In the opaque world of government hacking, private firms grapple with Newly uncovered 'Leafminer' hacking group hitting wide array of Middle allegiances Eastern targets Simple News 5 Deadly Information Security Mistakes to Avoid A New Bluetooth Security Vulnerability Has Been Revealed, But Apple Already Has it Covered Are CISOs Prepared to Detect Cyber-Security Breaches? Concerns grow over cyber security skills gap Continued Russian Attacks Show Weakness of Industrial Control Systems Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down? Cyber Experts Tell Lawmakers That Security Requires Oversight by Senior Leadership Cybersecurity Fallout From the Partisan Divide Over Russian Election Interference? Daily horrors of cybersecurity detailed in California's data breach reports Data Privacy and Protection: A Q&A with Malcolm Harkins of Cylance kirkpatrickprice.com www.mactrast.com www.lepide.com www.personneltoday.com www.securitynow.com www.infosecisland.com brica.de www.lawfareblog.com venturebeat.com governmenttechnologyinsider.com