El Diario del CISO El Diario del CISO (The CISO Journal) Edición 26 | Page 26

How it works: The Army’s laser-powered drone project How Meaningless EDR Can Actually Hinder a Company’s Security Posture How Ryuk Ransomware Targets AV Solutions, Not Just Your Files How Secure are our Voting Systems for November 2018? How Strategic Threat Intelligence Informs Better Security Decisions How The ATT&CK™ Framework Can Mature Your Threat Hunting Program How to Become Your Own Security Champion How To Check If Your Twitter Account Has Been Hacked How to Detect SQL Injection Attacks Using Extended Events and SQL Monitor How to Enable AD FS Authentication (Part 2) How to Get Started with the Cloud How to Perform Manual SQL Injection With Integer Based Method How to Remove Cprmatix.com Redirect How to solve your cybersecurity skills shortage How to Tackle SSL Certificate Is Not Trusted Error How to tell if an Android App is safe to install How to win funds and modernize technology Huawei Vows To Release Foldable Phone Within A Year HUMINT: The Riskiest (And Most Valuable) Form of Intelligence Gathering ICO Receiving 500 Breach-Related Calls a Week Since GDPR Took Effect IDG Contributor Network: 5 best practices for securing your applications IDG Contributor Network: Can you hack me now? IDG Contributor Network: Enhancing cloud security for AWS deployments IDG Contributor Network: Your gardener wants access to your house safe Illegal Patch Allows Easier Access to India’s Aadhaar Biometric Database In Pursuit of Invisibility: Fileless Malware Indian Air Force online exam hacked Intel Patched A Vulnerability Leaking Intel ME Encryption Keys Interac: One Phish to Phish Them All Interesting approach: Skill Squatting with Amazon Echo iPhone XR Could Account for Over Half of New iPhone Sales in Second Half of 2018 iPhone XS and iPhone XS Max Now Available for Pre-Order iPhone XS and iPhone XS Max Pre-Orders Now Preparing to Ship iPhone XS Max and Apple Watch Series 4 Shipping Estimates Begin Slipping iPhone XS vs. iPhone XR: Design, Tech Specs, and Price Comparison iPhone XS, iPhone XS Max and Apple Watch Series 4 Pre-Orders Now Preparing to Ship Iran-Linked OilRig APT group targets high-ranking office in a Middle Eastern nation IRS Call Scammers Sentenced in Texas Is hiring a hacker ever a good idea? Is two-factor authentication (2FA) as secure as it seems? ISC Stormcast For Friday IT Security News Daily Summary 2018-09-13 IT Security News Daily Summary 2018-09-14 IT Security News Daily Summary 2018-09-15 IT Security: Bomgar to Become BeyondTrust Two billion devices still vulnerable to Blueborne flaws a year after discovery Two Russian Spies detained in Netherlands and deported to the Russian Federation Two-Thirds Of German Manufacturers Hit By Cyber Attacks, Costing $50 Billion U.S. Cyber Command looks to grow its acquisition capacity U.S. needs quantum investment, coordinated strategy, experts say UK Business Leaders Warned About Cybersecurity Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge Understanding the risk SQL injection vulnerabilities pose University Cyber Attacks Down To Students, Staff Unpatched Systems Continue To Fall To WannaMine Worm Unsuccessfully Defaced Websites Update now! Microsoft’s September 2018 Patch Tuesday is here US Congress Grill Google On China Censorship Plans US loses extradition battle with Russia for Bitcoin kingpin US Rep. Introduced Legislation for Cybersecurity Apprenticeship Program Using MITRE ATT&CK When Researching Attacker Behavior in a Post-Compromise World Veeam holds its hands up, admits database leak was plain ‘complacency’ Veeam leaves MongoDB database wide open, exposes 445m records Veeam Left Nearly Half-A-Billion! Records Exposed Veeam Manages to Expose Data in MongoDB Snafu Veeam Publicly Exposed 445 Million Customers Records Of its Marketing Database Venafi Survey: 86 Percent Of Security Professionals Say World At Cyber War Visualize CMPivot results in Configuration Manager Technical Preview 1809 VMworld 2018: Top 3 Takeaways Vuln: Linux Kernel CVE-2018-5391 Remote Denial of Service Vulnerability Vuln: Linux Kernel CVE-2018-6554 Multiple Denial of Service Vulnerabilities Vuln: Linux Kernel CVE-2018-6555 Multiple Denial of Service Vulnerabilities Vulnerabilities Found on Two Major VPN Services Wanted: Data breach risk ratings, because not all breaches are equal Week in review: API security, malware-less email attacks, reversing the cybersecurity skills shortage Week in security with Tony Anscombe Weekly Update 104 What Cloud Migration Means for Your Security Posture What is Artificial Intelligence (AI)? What Is Corda? What is DNS Attack and How Does it Work? What is Vulnerability Management Anyway? What the Healthcare Industry Needs: Cybersecurity Pros What to do if Windows Defender updates don’t work What Your Organization Needs To Know To Undergo A Secure Digital Transformation What’s the difference between WAN optimization and WAN acceleration? When Cybersecurity Talent is Scarce When You Can Pre-Order iPhone XS, XS Max and Apple Watch Series 4 in Every Time Zone Whiplr Messenger Places Uses at Risk with Insecure Account Verification Whitepaper: The next generation of connected experience