El Diario del CISO El Diario del CISO (The CISO Journal) Edición 21 | Page 11
Researchers discovered Calisto MacOS Malware, a Predecessor of Proton
Malware
Zero-Day Coverage Update – Week of July 23, 2018 -
ITproportal
Phishing grows to become top email threat to businesses
Russian bank hit in major cyberattack
Techtarget
ComplyRight data breach affects 662,000, gets lawsuit
McAfee CISO: Leadership buy-in essential to boost cybersecurity
McAfee CISO: The importance of a strong cybersecurity culture
IIot-world
9 questions you should ask before choosing a security vendor
How Adaptive Cyber Security Can Enable Digital Health Adoption
Malwarebyte
Hidden Bee' miner delivered via improved drive-by download toolkit
Trojans: What's the real deal?
Timeofisrael
Israel Electric Corp. sets up cybersecurity center in New York
Israeli startup seeks to head off hacking threats from connected cars
Dataprivacysecurityinsider
FERC Requires New NERC Reliability Standards for Reporting Cyber Incidents
Virginia Bank, Hacked Twice with Phishing Schemes, Losing $2.4 Million
Infosecinstitute
10 Steps to Take after Clicking a Phishing Scam
The Current Job Outlook for Threat Hunters
Tripwire
How the Federal Government Is Working to Improve Its Cybersecurity
Workforce
Russian Hacking Campaign Targeting U.S. Electric Utilities
BBC
Russian hackers penetrate US power stations
US warns of supply chain cyber-attacks
Inforisktoday
Ex-Fraudster: Why I Share My Story
Health Data Breach Tally: Lots of Hacks, Fewer Victims
Cyberscoop
In the opaque world of government hacking, private firms grapple with Newly uncovered 'Leafminer' hacking group hitting wide array of Middle
allegiances
Eastern targets
Simple News
5 Deadly Information Security Mistakes to Avoid
A New Bluetooth Security Vulnerability Has Been Revealed, But Apple Already Has it Covered
Are CISOs Prepared to Detect Cyber-Security Breaches?
Concerns grow over cyber security skills gap
Continued Russian Attacks Show Weakness of Industrial Control Systems
Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down?
Cyber Experts Tell Lawmakers That Security Requires Oversight by Senior Leadership
Cybersecurity Fallout From the Partisan Divide Over Russian Election Interference?
Daily horrors of cybersecurity detailed in California's data breach reports
Data Privacy and Protection: A Q&A with Malcolm Harkins of Cylance
kirkpatrickprice.com
www.mactrast.com
www.lepide.com
www.personneltoday.com
www.securitynow.com
www.infosecisland.com
brica.de
www.lawfareblog.com
venturebeat.com
governmenttechnologyinsider.com