El Diario del CISO El Diario del CISO (The CISO Journal) Edición 21 | Page 8

CSOo nline
Informationsecurity buzz
Bankinfosecurity
Securityweek
Highly Sophisticated Parasite RAT Emerges on the Dark Web Intel Smart Sound Tech Vulnerable to Three High-Severity Bugs
ThreatList : Supply-Chain Defenses Need Improvement Spectre Will Haunt Us For a Long Time
Kronos Banking Trojan Surfaces After Years of Silence
Accessible Security Tools : Solving the Skills Shortage
Microsoft Uncovers Multi-Tier Supply Chain Attack
AVEVA Patches Critical Flaws in HMI / SCADA Tools Following Schneider
Merger
Parasite HTTP RAT Packs Extensive Protection Mechanisms
Car Sharing Apps Vulnerable to Hacker Attacks : Kaspersky
Kronos Banking Trojan Has Returned
Cross-Vector Threats : The Web Begins Where Email Ends
The Evolution of SOAR Platforms
Cybersecurity , Compliance Slowing U . S . Government ' s Digital
Transformation
The Foundation of Cyber-Attacks : Credential Harvesting
Industrial IoT : Protecting the Physical World from Cyber Attacks
Twitter Curbs Access for 143,000 Apps in New Crackdown
Iranian Hackers Use QUADAGENT Backdoor in Recent Attacks
Unpacking the Impact of NIST 1.1 Updates on ICS
GDPR and the Next Generation of Privacy Legislation
Head of Hacked Bitcoin Exchange Pleads Guilty to US Charges
Achieving True Breach Defense
Preparing for 3-D Secure : The Next Generation
An FBI Update on Fighting Against Russian Election Meddling
Shipping Giant Cosco Hit by Ransomware Attack
Ex-Fraudster : Why I Share My Story
The Best of Infosecurity Europe 2018
Facebook Battles Election Interference , Internal Criticism
Under GDPR , Data Breach Reports in UK Have Quadrupled
Facebook ' s Security and Privacy Overhaul Comes at a Price Why Third-Party Risk Management Is a Top Priority for CISOs
Critical National Infrastructure Sector Lacks Skilled Cyber Security Workers Critical Vulnerability In IBM Cloud Functions Serverless Platform Cyber Thieves Stole £ 11m Of Client Money In A Year Facebook ' s Departing Security Chief ' s Memo Calls For Privacy Reforms How Ransomware Is Still Hitting Businesses With Heavy Costs
Intent Based Networking : Turning Intentions Into Reality Training Customer Service Agents To Become Security Defenders Russian Hackers Breach US Utility Networks Sensitive Data Exposed Belonging To Tesla , Toyota , VW And More Swann ' s Home Security Camera Recordings Could Be Hijacked
Impact Study Of Nuance Security Suite Finds Fortune 100 Bank Saved £ 18M
In Fraud Reduction And Operational Costs
8
types of malware and how to recognize them Information security lessons from Theranos C-suite is a weak link when it comes to email-based attacks
Keeping pace with security automation