El Diario del CISO El Diario del CISO (The CISO Journal) Edición 28 | Page 10
An Open Letter to Security Managers: Stop Trying to Do It All
As IoT Security Concerns Rise, Are Solutions Keeping Up?
Don't Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured
Data
Gazorp Malware Builder Offers Free, Customized AZORult Attacks on the
Dark Web
Sednit APT Group Uses First UEFI Rootkit Detected in the Wild to Execute
LoJax Malware
New ATM Attack Uses Custom Skimmers to Steal Credit Card Data and PINs SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks
The Inconvenient Truth About Your Eight-Character Password
The Vinyasa of Security: Why Continuous Improvement Is Essential for Any
Cybersecurity Strategy
The Wild West of Data Risk Management in the Age of Cloud, Mobile and
Digital Transformation
Viro Botnet Uses Spamming and Keylogging Capabilities to Spread
Ransomware
Visibility and Control: A One-Two Punch for Securing iOS Devices in the
Enterprise
Why Healthcare Cyberattacks Should Concern Consumer Data Collectors
2.2 bn Facebook users must log out, re-login across devices: Experts Facebook hack: Facebook faces $1.63 billion in EU fine over fresh data breach
Apple, Amazon deny Bloomberg report on Chinese hardware attack Facebook India: Latest Facebook breach piles on India worries
facebook: Post-breach, Facebook resets access tokens of 50mn users; asks
them to reboot account
Astaroth Trojan Malware Returns to Infect South American Users
Artificial Intelligence is key cybersecurity weapon in the IoT era: Research
Continental ties up with IIT Madras for Cyber Security in Powertrain
applications
Encryption is the traditional but core enabler to maintain data privacy: Ian
Yip, CTO, McAfee APAC
Threatpost
Artificial Intelligence: A Cybersecurity Tool for Good, and Sometimes Bad
Dark Web Azorult Generator Offers Free Binaries to Cybercrooks
Facebook Breach Sparks Concerns Around Third-Party Apps, Website
Security
Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
Sony Smart TV Bug Allows Remote Access, Root Privileges
ThreatList: 83% of Routers Contain Vulnerable Code
Threatpost New Wrap Podcast For Oct. 5
Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
Securitynow
7 Russian Spies Indicted in US for Hacking Anti-Doping Agencies
Attackers Can Compromise Corporate Email Accounts for $150
facebook: What is the impact of the Facebook hack on you?
IBM: Free flow of data should not be confused with data security: IBM's
Harriet Green
Securerityboulevar
100K Routers Hijacked for Phishing in GhostDNS Campaign
Canada advances cybersecurity strategy to fend off nation-state attacks
Google Cracks Down on Malicious Chrome Extensions
Is Formal Education Critical for a Career in Cybersecurity?
Ponemon Study Finds AI Can Help Close Security Gaps
Privacy: Who’s Listening in the Workplace?
Sophisticated IoT Botnet Torii Uses 6 Persistence Methods
TheHackersNews
Bank Servers Hacked to Trick ATMs into Spitting Out Millions in Cash
Chinese Spying Chips Found Hidden On Servers Used By US Companies