El Diario del CISO El Diario del CISO (The CISO Journal) Edición 26 | Page 23

Back to school with the Cisco Umbrella Chromebook client Barrage of Mobile Fraud Attacks Will Increase BEC scam artist ordered to pay back $2.5 million, lands hefty prison sentence BEC Scammer To Serve Five Years And Pay $2.5 Million Beginners Guide to Blockchain Technology (Part 2) Benefits Of Biometrics Best Way to Find the Stolen Android Phones with the Help of Google BlackBerry Massively Steps Up Security Efforts to Address Threat Storm Blockchain betting app mocks competitor for getting hacked. Gets hacked four days later Blockchain hustler beats the house with smart contract hack Bomgar announces acquisition of BeyondTrust to expand PAM offerings Bomgar Buys BeyondTrust British Airways Customer Data Stolen in Website and Mobile App Hack British Airways data breach may be the work of Magecart British Airways data breach shows why every company needs a Cyber Incident Response and Crisis Communication Plan British Airways Hack Update: Caused by Injected Script & PCI DSS Non-Compliance is Suspected British Airways Site Infected with Card Skimming Code Browser security hole on Macs and iPhones – just how bad is it? California bill regulates IoT for first time in US Can Google Cloud IAM Be Used as a Directory? Canadian town forced to pay Bitcoin after nasty ransomware attack Channel Scoop: September 14, 2018 Chaotic Digital Transformation Strategies And Disjointed Network Environments – The Perfect Legal Storm Is Brewing Checklist: Essential Factors to Consider While Switching to HTTPS China’s MSS Leveraging Students In, From U.S. China-linked APT10 group behind new attacks on the Japanese media sector China-linked APT10 Hackers Update Attack Techniques Chinese Cyber Espionage Group APT10 Delivers UPPERCUT Backdoor Via Malicious Word Documents Chrome 69 Shows the WWW & M Subdomains Again, but It’s Only Temporary City of Stockholm Selects MobileIron Threat Defense to Detect and Mitigate Mobile Threats Click Here to Kill Everybody Reviews and Press Mentions Cloud data management firm exposes database with over 440M emails & IP addresses Cloud-Native Attacks Executed Against Known CVEs Cobalt crime gang is using again CobInt malware in attacks on former soviet states Cold Boot Attack from 2008 Still Affects PCs and Macs Cold Boot Attacks – Hackers Can Unlock All the Modern Computers and Steal Encryption Keys & Passwords Cold-Boot Attack Steals Passwords In Under Two Minutes Companies Should Gear Up To Handle Data Privacy Laws Critical infrastructure will have to operate if there’s malware on it or not CrowdStrike Makes The Forbes Cloud 100 List for Second Straight Year Rising to No. 6 Cryptomining malware infects Windows and Linux Kodi users Culture change starts with you: How you can take steps to improve your working life Current Security Measures Not Enough to Protect Data in Lost or Stolen Laptops, Experts Warn Nasty Piece Of CSS Code Crashes And Restarts iPhones NCSC: Time for Boards to Get Cyber Literate New Android Botnet Pops Up on Malware-as-a-Service Market New Brrr Dharma Ransomware Variant Released New cold boot attack affects “nearly all modern computers” New Cold Boot Attack Gives Hackers the Keys to PCs, Macs New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs New Cold Boot Attacks Can Evade Current Mitigations New Copyright Powers, New “Terrorist Content” Regulations: A Grim Day For Digital Rights in Europe New CSS Attack Restarts an iPhone or Freezes a Mac New Firmware Flaws Resurrect Cold Boot Attacks New GandCrab ransomware variant hammers Florida school district New GandCrab Variant Attacks Florida School District New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value New infosec products of the week: September 14, 2018 New modification of the old cold boot attack leaves most systems vulnerable New PyLocky Ransomware Attack on Various Organization that Encrypt More than 100 File Extensions New PyLocky Ransomware stands out for anti-machine learning capability New Ransomware Named PyLocky Discovered News of the Week: September 15, 2018 Nigerian Fraudster Who Stole Millions Heads to U.S. Prison North Korea claims hacker responsible for WannaCry outbreak does not exist North Korea Claims NHS And Sony Hack Suspect Doesn’t Exist Novel Browser Locker Technique Hijacks Google Chrome Npower Investigating Personal Data Breach Official mobile version of Tor Browser released for Android – Download now Offline: Activists and Technologists Still Face Grave Threats for Expression OilRig APT Continues Its Ongoing Malware Evolution OilRig Launching Attack Campaigns With Updated BONDUPDATER Trojan One Year Later, Over 2 Billion Devices Still Exposed to BlueBorne Attacks One-Third of Data Breaches Led to People Losing Jobs: Kaspersky Open Source Security Research Group gets a new office Operator at kayo.moe found a 42M Record Credential Stuffing Data ready to use Outdated Duplicator Plugin RCE Abused Over 3000 Tech Support Scam Ads Eschewed by Microsoft Over 60 Vulnerabilities Patched In Microsoft September Updates Overcoming information governance inertia Partner Perspectives: VMRay + Carbon Black Bridge the Gap Between Threat Hunting & Incident Response Partnerstroka: Large tech support scam operation features latest browser locker Paul Manafort Guilty Plea Highlights Increased Enforcement of Foreign Agents Registration Act Persistent EternalBlue-Powered Wannamine Cryptominer Still Alive Phished credentials caused twice as many breaches than malware in the past year Police hit Australian immigration centre over alleged AU$3m business email scam Potential Hurricane Florence Phishing Scams Preventing exfiltration of sensitive docs by flooding systems with hard-to-detect fakes