El Diario del CISO El Diario del CISO (The CISO Journal) Edición 27 | Page 8

A weakness in Apple’s DEP authentication leaves users open to attack House committee leaders submit white paper urging U.S. to address AI security concerns Attackers use evolved code injection technique to target Turkey with Adwind Mastermind behind Scan4you gets 14 years, helped steal $20 billion RAT Australian Apple hacker avoids jail, gets eight months probation Hide and seek Iot botnet updates include new Android ADB exploit Chegg forces password reset on 40 million users Secret Service warns banks of ATM ‘Wiretapping’ attacks Seven additional modules make Fancy Bear's VPNFilter malware even more Cyber Reflection: Real-World Events & New Era of Risk versatile DanaBot trojan sets sights on Europe, new features To Find the Right Security Tool, Know Thyself Or Navigating the Security Maze DDoS attack on education vendor hinders access to districts' online portals Torii malware could be gateway to more sophisticated IoT botnet attacks Decline in Chinese cyberattacks against U.S. suggests attacks getting more Uber efforts to hide breach, delayed notification leads to $148M fine, efficient settlement Docs reveal how Fruitfly Mac spyware initially spread United Nations data found exposed on web: Researcher Facebook breach exposes info on 50M users USB malware and cryptominers are threat to emerging markets Cisco Removes Default Password From Video Surveillance Manager Notorious Hackers Serve SpicyOmelette to Unsuspecting Victims Credential Stuffing Attacks Are Reaching DDoS Proportions Operator of Counter AV Service Sentenced to 14 Years in Prison EU Lawmakers Push for Cybersecurity, Data Audit of Facebook Over 6 Million Users Hit by Breach at Fashion Retailer SHEIN Researchers Find 'Authentication Weakness' in Apple's Device Enrollment Facebook Admits Phone Numbers May be Used to Target Ads Program Facebook Says 50M User Accounts Affected by Security Breach Russian Cyberspies Use UEFI Rootkit in Attacks Hide 'N Seek IoT Botnet Now Targets Android Devices Senate Committee Approves Several Cybersecurity Bills Industrial Cybersecurity Firm Nozomi Networks Raises $30 Million Vulnerabilities in PureVPN Client Leak User Credentials Meet Torii, a Stealthy, Versatile and Highly Persistent IoT Botnet When Good Apps Go Bad: Protecting Your Data Through App Permissions Man Sentenced to Prison for ATM Jackpotting Without Handcuffs: Creating A Culture of Compliance Android App Verification Issues Pave Way For Phishing Attacks Malware on SHEIN Servers Compromises Data of 6.4M Customers Local-Privilege Escalation Flaw in Linux Kernel Allows Root Access Once Popular Online Ad Format Opens Top Tier Sites to XSS Attacks Assessing the Human Element in Cyber Risk Analysis Perimeter Defenses are Dead, So Now What? Cybercriminals Target Kodi Media Player for Malware Distribution Tricky DoS Attack Crashes Mozilla Firefox Facebook Data Breach Impacts Almost 50 Million Accounts Weakness in Apple MDM Tool Allows Access to Sensitive Corporate Info “Everything is fine” vs. “we’re doomed” isn’t the way to frame election Hey Facebook: Quit discouraging people from using 2FA security Are long passphrases the answer to password problems? Researchers discover malicious cryptomining campaign targeting Kodi Brewery became victim of targeted ransomware attack via job vacancy ad Securing the Multi-Cloud: 3 Steps for Maintaining Control and Visibility Facebook security and privacy issues revealed The potential costs of cybercrime that can’t be calculated