El Diario del CISO El Diario del CISO (The CISO Journal) Edición 27 | Page 8
A weakness in Apple’s DEP authentication leaves users open to attack
House committee leaders submit white paper urging U.S. to address AI
security concerns
Attackers use evolved code injection technique to target Turkey with Adwind
Mastermind behind Scan4you gets 14 years, helped steal $20 billion
RAT
Australian Apple hacker avoids jail, gets eight months probation
Hide and seek Iot botnet updates include new Android ADB exploit
Chegg forces password reset on 40 million users
Secret Service warns banks of ATM ‘Wiretapping’ attacks
Seven additional modules make Fancy Bear's VPNFilter malware even more
Cyber Reflection: Real-World Events & New Era of Risk
versatile
DanaBot trojan sets sights on Europe, new features
To Find the Right Security Tool, Know Thyself Or Navigating the Security Maze
DDoS attack on education vendor hinders access to districts' online portals
Torii malware could be gateway to more sophisticated IoT botnet attacks
Decline in Chinese cyberattacks against U.S. suggests attacks getting more
Uber efforts to hide breach, delayed notification leads to $148M fine,
efficient
settlement
Docs reveal how Fruitfly Mac spyware initially spread
United Nations data found exposed on web: Researcher
Facebook breach exposes info on 50M users
USB malware and cryptominers are threat to emerging markets
Cisco Removes Default Password From Video Surveillance Manager
Notorious Hackers Serve SpicyOmelette to Unsuspecting Victims
Credential Stuffing Attacks Are Reaching DDoS Proportions
Operator of Counter AV Service Sentenced to 14 Years in Prison
EU Lawmakers Push for Cybersecurity, Data Audit of Facebook
Over 6 Million Users Hit by Breach at Fashion Retailer SHEIN
Researchers Find 'Authentication Weakness' in Apple's Device Enrollment
Facebook Admits Phone Numbers May be Used to Target Ads
Program
Facebook Says 50M User Accounts Affected by Security Breach
Russian Cyberspies Use UEFI Rootkit in Attacks
Hide 'N Seek IoT Botnet Now Targets Android Devices
Senate Committee Approves Several Cybersecurity Bills
Industrial Cybersecurity Firm Nozomi Networks Raises $30 Million
Vulnerabilities in PureVPN Client Leak User Credentials
Meet Torii, a Stealthy, Versatile and Highly Persistent IoT Botnet
When Good Apps Go Bad: Protecting Your Data Through App Permissions
Man Sentenced to Prison for ATM Jackpotting
Without Handcuffs: Creating A Culture of Compliance
Android App Verification Issues Pave Way For Phishing Attacks
Malware on SHEIN Servers Compromises Data of 6.4M Customers
Local-Privilege Escalation Flaw in Linux Kernel Allows Root Access
Once Popular Online Ad Format Opens Top Tier Sites to XSS Attacks
Assessing the Human Element in Cyber Risk Analysis
Perimeter Defenses are Dead, So Now What?
Cybercriminals Target Kodi Media Player for Malware Distribution
Tricky DoS Attack Crashes Mozilla Firefox
Facebook Data Breach Impacts Almost 50 Million Accounts
Weakness in Apple MDM Tool Allows Access to Sensitive Corporate Info
“Everything is fine” vs. “we’re doomed” isn’t the way to frame election
Hey Facebook: Quit discouraging people from using 2FA
security
Are long passphrases the answer to password problems?
Researchers discover malicious cryptomining campaign targeting Kodi
Brewery became victim of targeted ransomware attack via job vacancy ad
Securing the Multi-Cloud: 3 Steps for Maintaining Control and Visibility
Facebook security and privacy issues revealed
The potential costs of cybercrime that can’t be calculated