El Diario del CISO El Diario del CISO (The CISO Journal) Edición 24 | Page 6

Other Important News 6 Reasons Security Awareness Programs Go Wrong 7 Serious IoT Vulnerabilities A False Sense of Security Adobe Software at Center of Two Vulnerability ... AI-Based POC, DeepLocker, Could Conceal Targeted ... Attackers Using 'Legitimate' Remote Admin Tool in ... Augusta University Health Reports Major Data Breach CA Man Arrested for Conspiracy to Launder BEC Earnings Data Privacy Careers Are Helping to Close the IT ... Wickr Adds New Censorship Circumvention Feature to ... DNC Reports Attempted Cyberattack on its Voter Database Embedding Security into the DevOps Toolchain Google Updates: Cloud HSM Beta, Binary ... Hackers Use Public Cloud Features to Breach, ... Half of Small Businesses Believe They're Not ... How Better Intel Can Reduce, Prevent Payment Card Fraud How Threats Increase in Internet Time How to Gauge the Effectiveness of Security ... Data Privacy Careers Are Helping to Close the IT Gender Gap “Your Mac Might Be Infected” Scam (Redirect Virus) 39% of UK CEOs admit that cyber attacks are unavoidable 4 Effective Targeted Techniques to Market GDPR – CISO/Security Vendor Relationship Series AdvisorsBot Trojan Removal — Identify and Delete Active Infections Analysis of Web Apps Reveals Current Top Security Threats Back to the Basics: The problem with forcing regular password expiry Critical National Infrastructures on the Radar; British MPs Say Attack Is Imminent What Does GDPR Mean for Intelligent Video? DDoS Attack Volume Rose 50% in Q2 2018 Demystifying Insider Threats It Takes an Average 38 Days to Patch a Vulnerability Latin America Served with 'Dark Tequila' Banking ... Lazarus Group Builds its First MacOS Malware Make Security Boring Again Microsoft Sinkholes 6 Fancy Bear/APT28 Internet Domains Modular Downloaders Could Pose New Threat for ... New Apache Struts Vulnerability Leaves Major ... New Insurance Product Adds Coverage for ... New Mirai Variants Leverage Open Source Project Ohio Man Sentenced To 15 Months For BEC Scam Open-Source Hybrid Analysis Portal Gets a Boost Proving ROI: How a Security Road Map Can Sway the ... Real Estate Industry Remains Rich Target for Cybercrime Researcher Cracks San Francisco's Emergency Siren ... The GDPR Ripple Effect The Uncertain Fate of WHOIS, & Other Matters of ... The Votes Are In: Election Security Matters Turla Threat Group Uses Email PDF Attachments to ... MacOS: BitCoinMiner-AS Malware – How to Remove It from Your Mac Manufacturing: A Rising Target for Cybercriminals Microsoft Pushes Microcode Updates for Foreshadow CPU Flaws Microsoft Seizes Domains Set Up by Russian Cyberspies Mirai IoT Malware Variant Abuses Linux Cross-Compilation Framework Ransomware Strains: The Stealthy Cyberthreat Ready or Not, Here Comes the Next Big Digital Attack Remove WHY Ransomware Virus – Restore .WHY Files Shadow IT: An Essential Component for Enterprise Security Top Cryptomining Malware. Top Ransomware.